Anbieter Profil

LogPoint

Copenhagen, Denmark
2012
101-500
Logpoint Logo - Dark Mode

Ãœber LogPoint

Fostering a Culture of Success for a Thriving Community Rooted in the core values of passion, innovation, teamwork, and client satisfaction, Logpoint's culture has been the driving force behind our success across SIEM, UEBA, SOAR, and SAP security technologies. Our integrated security operations platform is committed to safeguarding the digital core of organizations. As a proud member of the Summa family, Logpoint stands as a trusted partner in securely guiding organizations through the digital landscape. While the corporate world continues to evolve, our dedication to fostering a culture of excellence remains constant. At Logpoint, we believe our distinct corporate culture sets us apart. By emphasizing collaboration, innovation, and a genuine commitment to client satisfaction, we consistently deliver unparalleled solutions that empower our clients to succeed.

Was sie auszeichnet

5 Reasons Why Logpoint Unified Source for IT and Security Logpoint provides a complete overview of all log processes, uniting IT and cybersecurity on a single platform while ensuring compliance and transparency. 90% Faster Log Searches The integrated taxonomy in Logpoint sorts data logically during collection, saving you significant time. The fast, efficient search across months or years enables forensic analysis. Predictable Costs, Transparent Pricing With its licensing model, Logpoint offers cost-transparent scalability. It provides robust security features for Microsoft E3 customers without the substantial costs associated with the MS Azure Cloud that tools like MS Sentinel would incur. Efficient Use of Your IT Resources Logpoint operates more efficiently with less hardware than other solutions, making it ideal for conserving IT resources. Compliance Made Easy Avoid non-compliance costs with our predefined dashboards that help you meet requirements such as NIS2.

Top Fähigkeiten

Incident Response Services
Expertenservices, wie z. B. Incident Response Retainer und Forensik.
Kritische Infrastrukturen (KRITIS)
Die Beratung für kritische Infrastrukturen (KRITIS) umfasst die Beratung von Organisationen bei der Erfüllung spezieller gesetzlicher Anforderungen zum Schutz wichtiger Systeme und Anlagen.
NDR – Network Detection & Response
Network Detection and Response (NDR) ist ein Sicherheitstool, das den Netzwerkverkehr eines Unternehmens überwacht, um auf der Grundlage fortschrittlicher Funktionen wie der Verhaltensanalyse Einblick in potenzielle Cyberbedrohungen zu erhalten.
Security Compliance Management
Testen und validieren Sie, ob Ihre implementierten Sicherheitskontrollen wie vorgesehen funktionieren. Dies kann je nach den jeweiligen Frameworks in einem manuellen oder automatisierten Ansatz erfolgen.
Threat Detection
Die Erkennung von Bedrohungen (Threat Detection) hat zum Ziel, potenzielle Sicherheitsvorfälle in Echtzeit zu identifizieren und darauf zu reagieren. Dieser proaktive Ansatz hilft Unternehmen, Bedrohungen zu erkennen und zu entschärfen, bevor sie erheblichen Schaden anrichten oder Datenverletzungen verursachen können.

Top Branchen

Behörden
Bildungssektor
Finanzen- & Bankenbanche
Gesundheitswesen
Kritische Infrastruktur

Alle Fähigkeiten

GRC (Governance, Risk, Compliance)
ISMS (Information Security Management System)
Zertifizierung (ISO 27001, IEC 62443, ...)
Application Security
Data Governance
Datenschutz
Netzwerksicherheit
Schwachstellen Scanner
MDR (Managed Detection and Response)
NDR (Network Detection and Response)
SIEM (Security Information and Event Management)
Threat Detection
Forensik
Incident Response
SOC (Security Operations Center)

Anbieter Kontakt

sven bagemihl
Sven Bagemihl
Regional Director CEMEA
Nach oben scrollen