Home IT LogPoint
Logpointreviews

LogPoint

SIEM platform for unified simplicity
our rating 4.5 out of 5 Stars

LogPointProduct Overview

  1. About LogPoint
  2. Pros of LogPoint
  3. Cons of LogPoint
  4. Breakdown of core features

LogPoint product overview

LogPoint delivers a unified SIEM, SOAR, and UEBA tool that accelerates threat detection and response. It provides real-time data analysis, early detection of data breaches, data collection, data storage, and accurate reporting. Moreover, it bolsters organizations in the fight against evolving threats by giving them a single source of truth — an intuitively designed platform with the capabilities necessary to ensure their safety.

Powered by machine learning and backed by an industry-leading support team, LogPoint’s complete cybersecurity operations platform identifies emerging threats within the infrastructure, integrating with numerous threat intelligence feeds. Analysts can automate event interrogation, screening hundreds of thousands of indications of compromise to evaluate the data based on known attacks.

Pros of LogPoint

Back to top ↑

  • Its Incident Prioritization feature guides the response to the incidents that matter most. It reduces the impact the organization faces from threats.
  • Its single taxonomy simplifies pivoting around the network across data sources, gathering information, and filtering.

Cons of LogPoint

Back to top ↑

  • According to users, it lacks documentation for complex deployment.

Breakdown of core features

Back to top ↑

Advanced cyber threat detection

LogPoint makes use of several approaches to combat advanced cyber threats and includes analytics in the form of alert rules, dashboards and data mappings. Using LogPoint’s threat intelligence application, it’s possible for analysts to devise correlation rules. In addition, they can employ machine learning and data exploration to observe unusual activity patterns across devices for advanced cyber threat detection.

Threat hunting

The platform uses threat intelligence feeds to automate some aspects of threat hunting. It utilizes threat intelligence feeds at the time of ingest, evaluating data against all known configured threats. It also applies threat intelligence during analysis. As a result, users can submit any amount of historical data for assessment against the most recent threat intelligence feeds to see if they match any new knowledge about attacks.

MITRE ATT&CK

Security functionality in LogPoint closely connects to the MITRE ATT&CK framework to assist in battling threats. The software develops all queries and future technological enhancements around the common ATT&CK taxonomy. Furthermore, alerts are configured to the different stages of the ATT&CK model, accelerating getting situational awareness of the entire system.

The LogPoint ATT&CK Navigator provides more information about the tactics and techniques and indicates which are covered by LogPoint SIEM and LogPoint UEBA. Security analysts can use the navigator to match system alerts with their relevance to ATT&CK, from initial access to privilege escalation to lateral movements to data exfiltration.

User and Entity Behavior Analytics (UEBA)

LogPoint UEBA is based on advanced machine learning. It analyzes the behavior of users and entities to find interesting or malicious behaviors and patterns within the infrastructure. This feature makes the security team smarter by accelerating detection and response to threats without increasing the workload of security analysts. UEBA improves the efficiency of security and operations staff and assists them in finding otherwise difficult to identify threats.

(Last updated on 04/15/2022 by Liz Laurente-Ticong)

Quick Facts

  • Industry Specialties
    All Industries
  • Pricing
    High-end
  • Works Best For
    Any Sized Businesses

Screenshots

Logpoint1Logpoint2Logpoint3Logpoint4

Video

Features

  • Security Information and Event Management (SIEM)
  • User and Entity Behavior Analytics (UEBA)
  • Security Orchestration, Automation, and Response (SOAR)
  • Log sources management
  • Threat intelligence
  • Threat detection
  • Director Console

Integrations

  • Office 365
  • SAP
  • Cortex XSOAR

Pricing Model

  • Per-device basis

Languages

  • Danish
  • German
  • English
  • French
  • Norwegian
  • Swedish