Ratings and Reviews 1 Rating

Total
ease
features
design
support

Ratings and Reviews 0 Ratings

Total
ease
features
design
support

This software has no reviews. Be the first to write a review.

Write a Review

Alternatives to Consider

  • Graylog Reviews & Ratings
    417 Ratings
    Company Website
  • ManageEngine Log360 Reviews & Ratings
    168 Ratings
    Company Website
  • Blumira Reviews & Ratings
    150 Ratings
    Company Website
  • ManageEngine EventLog Analyzer Reviews & Ratings
    210 Ratings
    Company Website
  • AdRem NetCrunch Reviews & Ratings
    158 Ratings
    Company Website
  • Grafana Cloud Reviews & Ratings
    850 Ratings
    Company Website
  • groundcover Reviews & Ratings
    32 Ratings
    Company Website
  • Cloudflare Reviews & Ratings
    2,002 Ratings
    Company Website
  • Bitdefender Ultimate Small Business Security Reviews & Ratings
    3 Ratings
    Company Website
  • ManageEngine OpManager Reviews & Ratings
    1,683 Ratings
    Company Website

What is LogPoint?

LogPoint delivers an efficient and straightforward implementation of security analytics. Its intuitive interface is compatible with any IT setup, making integration seamless. With its cutting-edge SIEM and UEBA, LogPoint provides sophisticated analytics and automation driven by machine learning, empowering clients to secure, manage, and evolve their operations effectively. This capability results in reduced costs for deploying a SIEM solution, whether on-premises or in the cloud. The platform can connect with every device within the network, offering a detailed and interconnected view of events across the IT landscape. LogPoint's advanced software standardizes all data into a unified format, facilitating comparisons of events among various systems. This standardized language simplifies the processes of searching, analyzing, and reporting data, ensuring users can derive meaningful insights effortlessly. Ultimately, LogPoint enhances the organization's ability to respond to security challenges proactively.

What is Elastic Security?

Elastic Security equips analysts with essential tools designed to effectively detect, mitigate, and manage threats. This platform, which is both free and open-source, encompasses a variety of features like SIEM, endpoint security, threat hunting, and cloud monitoring. Its intuitive interface enables users to search, visualize, and analyze multiple data types—whether sourced from the cloud, users, endpoints, or networks—within mere seconds. Analysts have the advantage of investigating years of data, readily accessible through searchable snapshots. With flexible licensing models, organizations can leverage information from their entire ecosystem, irrespective of its volume, variety, or age. This solution plays a crucial role in safeguarding against damage and losses by providing comprehensive protection against malware and ransomware throughout the environment. Users can quickly implement analytical content developed by Elastic and the broader security community to strengthen defenses against threats identified by the MITRE ATT&CK® framework. By employing analyst-driven, cross-index correlation, machine learning tasks, and technique-based approaches, the platform enhances the detection of complex threats with improved efficiency. Furthermore, practitioners benefit from a user-friendly interface and partnerships that refine incident management workflows. In summary, Elastic Security emerges as a formidable solution for organizations dedicated to safeguarding their digital landscapes and ensuring robust cybersecurity measures are in place. Its adaptability and comprehensive feature set make it a valuable asset in the ever-evolving landscape of cybersecurity.

Media

Media

Integrations Supported

Airlock
Amazon Web Services (AWS)
Azure Marketplace
Beats
Chronicle SOAR
Cyber Triage
Elasticsearch
GoSecure
Microsoft Azure
NXLog
Picus
Recorded Future
SOC Prime Platform
Tenable One
Tines
Validato
cPacket

Integrations Supported

Airlock
Amazon Web Services (AWS)
Azure Marketplace
Beats
Chronicle SOAR
Cyber Triage
Elasticsearch
GoSecure
Microsoft Azure
NXLog
Picus
Recorded Future
SOC Prime Platform
Tenable One
Tines
Validato
cPacket

API Availability

Has API

API Availability

Has API

Pricing Information

Pricing not provided.
Free Trial Offered?
Free Version

Pricing Information

Pricing not provided.
Free Trial Offered?
Free Version

Supported Platforms

SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux

Supported Platforms

SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux

Customer Service / Support

Standard Support
24 Hour Support
Web-Based Support

Customer Service / Support

Standard Support
24 Hour Support
Web-Based Support

Training Options

Documentation Hub
Webinars
Online Training
On-Site Training

Training Options

Documentation Hub
Webinars
Online Training
On-Site Training

Company Facts

Organization Name

LogPoint

Date Founded

2001

Company Location

Denmark

Company Website

www.logpoint.com

Company Facts

Organization Name

Elastic

Date Founded

2012

Company Location

United States

Company Website

www.elastic.co/security

Categories and Features

Application Performance Monitoring (APM)

Baseline Manager
Diagnostic Tools
Full Transaction Diagnostics
Performance Control
Resource Management
Root-Cause Diagnosis
Server Performance
Trace Individual Transactions

Computer Security

Anti Spam
Antivirus
Audit Trail
Compliance Management
Database Security Audit
File Access Control
Financial Data Protection
Maintenance Scheduling
Real Time Monitoring
Security Event Log
Virus Definition Update
Vulnerability Protection

Network Security

Access Control
Analytics / Reporting
Compliance Reporting
Firewalls
Internet Usage Monitoring
Intrusion Detection System
Threat Response
VPN
Vulnerability Scanning

SIEM

Application Security
Behavioral Analytics
Compliance Reporting
Endpoint Management
File Integrity Monitoring
Forensic Analysis
Log Management
Network Monitoring
Real Time Monitoring
Threat Intelligence
User Activity Monitoring

Categories and Features

Endpoint Detection and Response (EDR)

Behavioral Analytics
Blacklisting/Whitelisting
Continuous Monitoring
Malware/Anomaly Detection
Prioritization
Remediation Management
Root Cause Analysis

SIEM

Application Security
Behavioral Analytics
Compliance Reporting
Endpoint Management
File Integrity Monitoring
Forensic Analysis
Log Management
Network Monitoring
Real Time Monitoring
Threat Intelligence
User Activity Monitoring

Popular Alternatives

Popular Alternatives

VictoriaMetrics Cloud Reviews & Ratings

VictoriaMetrics Cloud

VictoriaMetrics
EventSentry Reviews & Ratings

EventSentry

NETIKUS.NET ltd