Provider Profile

LogPoint

Copenhagen, Denmark
2012
101-500
Logpoint Logo - Dark Mode

About LogPoint

Fostering a Culture of Success for a Thriving Community Rooted in the core values of passion, innovation, teamwork, and client satisfaction, Logpoint's culture has been the driving force behind our success across SIEM, UEBA, SOAR, and SAP security technologies. Our integrated security operations platform is committed to safeguarding the digital core of organizations. As a proud member of the Summa family, Logpoint stands as a trusted partner in securely guiding organizations through the digital landscape. While the corporate world continues to evolve, our dedication to fostering a culture of excellence remains constant. At Logpoint, we believe our distinct corporate culture sets us apart. By emphasizing collaboration, innovation, and a genuine commitment to client satisfaction, we consistently deliver unparalleled solutions that empower our clients to succeed.

What Differentiates Them From Competitors?

5 Reasons Why Logpoint Unified Source for IT and Security Logpoint provides a complete overview of all log processes, uniting IT and cybersecurity on a single platform while ensuring compliance and transparency. 90% Faster Log Searches The integrated taxonomy in Logpoint sorts data logically during collection, saving you significant time. The fast, efficient search across months or years enables forensic analysis. Predictable Costs, Transparent Pricing With its licensing model, Logpoint offers cost-transparent scalability. It provides robust security features for Microsoft E3 customers without the substantial costs associated with the MS Azure Cloud that tools like MS Sentinel would incur. Efficient Use of Your IT Resources Logpoint operates more efficiently with less hardware than other solutions, making it ideal for conserving IT resources. Compliance Made Easy Avoid non-compliance costs with our predefined dashboards that help you meet requirements such as NIS2.

Top Capabilities

Critical Infrastructure
Consulting for critical infrastructure (KRITIS) entails advising organizations on meeting specialized regulatory requirements to protect essential systems and assets.
Incident Response Services
Expert services like incident response retainers and forensics.
NDR – Network Detection / Response
Network Detection and response (NDR) is a security tool that monitors an enterprise's network traffic to gain visibility into potential cyberthreats relying on advanced capabilities like behaviorial analytics.
Security Compliance Management
Test and validate, if your implemented security controls are working as intended. This can be done in a manual or automated approach depending on the respective controls.
Threat Detection
Threat Detection focuses on identifying and responding to potential security incidents in real-time. This proactive approach helps organizations recognize and mitigate threats before they can cause significant damage or data breaches.

Top Industries

Critical Infrastructure
Education
Finances & Banking
Healthcare
Public Authorities

All Capabilities

Certification (ISO 27001, IEC 62443, ...)
GRC (Governance, Risk, Compliance)
ISMS (Information Security Management System)
Application Security
Data Governance
Data Protection
Network Security
Vulnerability Scanner
MDR (Managed Detection and Response)
NDR (Network Detection and Response)
SIEM (Security Information and Event Management)
Threat Detection
Forensics
Incident Response
SOC (Security Operations Center)

Provider Contact

sven bagemihl
Sven Bagemihl
Regional Director CEMEA
Scroll to Top