What is LogPoint?
LogPoint delivers an efficient and straightforward implementation of security analytics. Its intuitive interface is compatible with any IT setup, making integration seamless. With its cutting-edge SIEM and UEBA, LogPoint provides sophisticated analytics and automation driven by machine learning, empowering clients to secure, manage, and evolve their operations effectively. This capability results in reduced costs for deploying a SIEM solution, whether on-premises or in the cloud. The platform can connect with every device within the network, offering a detailed and interconnected view of events across the IT landscape. LogPoint's advanced software standardizes all data into a unified format, facilitating comparisons of events among various systems. This standardized language simplifies the processes of searching, analyzing, and reporting data, ensuring users can derive meaningful insights effortlessly. Ultimately, LogPoint enhances the organization's ability to respond to security challenges proactively.
Pricing
Integrations
Company Facts
Product Details
Product Details
LogPoint Categories and Features
SIEM Software
Computer Security Software
Application Performance Monitoring (APM) Software
More LogPoint Categories
LogPoint Customer Reviews
Write a Review-
Would you Recommend to Others?1 2 3 4 5 6 7 8 9 10
All functionality included
Date: Aug 16 2023SummaryInstalled and customized in a day and first results / use cases and alerts active implemented.
Easy to learn with 100's of supported templates ready to use.
MITRE ATT&CK Framework integrated and OOTB usable with overview and easy to activate use cases.PositiveEase of use and easy installation and customisation, no Linux or Unix knowhow needed, Excellent Support that also helps with how to questions, Supported Normalization of hundreds of log sources. Non programming SOAR with easy to use graphical workbook editor & very nice case management, Predefined and supported collectors and fetchers, Dashboards, Reports, Alert Rules etc.
NegativeIf we must find something, user administration and rule based access is not always 100% transparent and might lead to duplicates.
Read More...
- Previous
- You're on page 1
- Next