Ratings and Reviews 1 Rating

Total
ease
features
design
support

Ratings and Reviews 6 Ratings

Total
ease
features
design
support

Alternatives to Consider

  • Splunk Enterprise Reviews & Ratings
    1,428 Ratings
    Company Website
  • ManageEngine EventLog Analyzer Reviews & Ratings
    179 Ratings
    Company Website
  • Blumira Reviews & Ratings
    144 Ratings
    Company Website
  • ManageEngine Log360 Reviews & Ratings
    112 Ratings
    Company Website
  • AdRem NetCrunch Reviews & Ratings
    147 Ratings
    Company Website
  • groundcover Reviews & Ratings
    32 Ratings
    Company Website
  • Cynet All-in-One Cybersecurity Platform Reviews & Ratings
    386 Ratings
    Company Website
  • Delska Reviews & Ratings
    14 Ratings
    Company Website
  • Uptime.com Reviews & Ratings
    327 Ratings
    Company Website
  • SpamTitan Reviews & Ratings
    813 Ratings
    Company Website

What is LogPoint?

LogPoint delivers an efficient and straightforward implementation of security analytics. Its intuitive interface is compatible with any IT setup, making integration seamless. With its cutting-edge SIEM and UEBA, LogPoint provides sophisticated analytics and automation driven by machine learning, empowering clients to secure, manage, and evolve their operations effectively. This capability results in reduced costs for deploying a SIEM solution, whether on-premises or in the cloud. The platform can connect with every device within the network, offering a detailed and interconnected view of events across the IT landscape. LogPoint's advanced software standardizes all data into a unified format, facilitating comparisons of events among various systems. This standardized language simplifies the processes of searching, analyzing, and reporting data, ensuring users can derive meaningful insights effortlessly. Ultimately, LogPoint enhances the organization's ability to respond to security challenges proactively.

What is IBM QRadar SIEM?

As a leader in the industry, QRadar SIEM is engineered to outpace adversaries through improved speed, scalability, and accuracy. With the rise of digital threats and increasingly sophisticated cyber attackers, the role of SOC analysts has never been more critical. QRadar SIEM equips security teams to address contemporary threats proactively by integrating advanced AI, comprehensive threat intelligence, and cutting-edge resources, thereby enhancing analysts' capabilities. Whether you need a cloud-native solution designed for hybrid setups or a system to augment your existing on-premises infrastructure, IBM provides a SIEM solution tailored to your unique requirements. Additionally, IBM's enterprise-grade AI is designed to elevate the productivity and expertise of each member within the security team. By implementing QRadar SIEM, analysts can reduce the burden of time-consuming manual processes such as case management and risk assessment, enabling them to focus on vital investigations and remediation actions, ultimately strengthening their overall security posture. This innovative approach not only streamlines operations but also fosters a more resilient security environment.

Media

Media

Integrations Supported

Chronicle SOAR
NXLog
Recorded Future
SOC Prime Platform
AirShield
Azure Marketplace
Claroty
Cynerio
Dragos Platform
HUMAN Bot Defender
IBM QRadar EDR
Junos Traffic Vision
Logsign
Microsoft Azure
Netenrich
SCADAfence
Saint Security Suite
Symantec Network Forensics
Varonis Data Security Platform
Veza

Integrations Supported

Chronicle SOAR
NXLog
Recorded Future
SOC Prime Platform
AirShield
Azure Marketplace
Claroty
Cynerio
Dragos Platform
HUMAN Bot Defender
IBM QRadar EDR
Junos Traffic Vision
Logsign
Microsoft Azure
Netenrich
SCADAfence
Saint Security Suite
Symantec Network Forensics
Varonis Data Security Platform
Veza

API Availability

Has API

API Availability

Has API

Pricing Information

Pricing not provided.
Free Trial Offered?
Free Version

Pricing Information

Pricing not provided.
Free Trial Offered?
Free Version

Supported Platforms

SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux

Supported Platforms

SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux

Customer Service / Support

Standard Support
24 Hour Support
Web-Based Support

Customer Service / Support

Standard Support
24 Hour Support
Web-Based Support

Training Options

Documentation Hub
Webinars
Online Training
On-Site Training

Training Options

Documentation Hub
Webinars
Online Training
On-Site Training

Company Facts

Organization Name

LogPoint

Date Founded

2001

Company Location

Denmark

Company Website

www.logpoint.com

Company Facts

Organization Name

IBM

Date Founded

1911

Company Location

United States

Company Website

www.ibm.com/products/qradar-siem

Categories and Features

Application Performance Monitoring (APM)

Baseline Manager
Diagnostic Tools
Full Transaction Diagnostics
Performance Control
Resource Management
Root-Cause Diagnosis
Server Performance
Trace Individual Transactions

Computer Security

Anti Spam
Antivirus
Audit Trail
Compliance Management
Database Security Audit
File Access Control
Financial Data Protection
Maintenance Scheduling
Real Time Monitoring
Security Event Log
Virus Definition Update
Vulnerability Protection

Network Security

Access Control
Analytics / Reporting
Compliance Reporting
Firewalls
Internet Usage Monitoring
Intrusion Detection System
Threat Response
VPN
Vulnerability Scanning

SIEM

Application Security
Behavioral Analytics
Compliance Reporting
Endpoint Management
File Integrity Monitoring
Forensic Analysis
Log Management
Network Monitoring
Real Time Monitoring
Threat Intelligence
User Activity Monitoring

Categories and Features

Incident Response

Attack Behavior Analytics
Automated Remediation
Compliance Reporting
Forensic Data Retention
Incident Alerting
Incident Database
Incident Logs
Incident Reporting
Privacy Breach Reporting
SIEM Data Ingestion / Correlation
SLA Tracking / Management
Security Orchestration
Threat Intelligence
Timeline Analysis
Workflow Automation
Workflow Management

Network Traffic Analysis (NTA)

Anomalous Behavior Detection
High Bandwidth Usage Monitoring
Historical Behavior Data
Identify High Network Traffic Sources
Network Transaction Visibility
Stream Data to IDR or Data Lake
Traffic Decryption

SIEM

Application Security
Behavioral Analytics
Compliance Reporting
Endpoint Management
File Integrity Monitoring
Forensic Analysis
Log Management
Network Monitoring
Real Time Monitoring
Threat Intelligence
User Activity Monitoring

Vulnerability Scanners

Asset Discovery
Black Box Scanning
Compliance Monitoring
Continuous Monitoring
Defect Tracking
Interactive Scanning
Logging and Reporting
Network Mapping
Perimeter Scanning
Risk Analysis
Threat Intelligence
Web Inspection

Popular Alternatives

Popular Alternatives

EventSentry Reviews & Ratings

EventSentry

NETIKUS.NET ltd