Download PDF version Contact company

Logpoint announced the new release of capabilities to its cybersecurity operations platform, converging SIEM, SOAR, UEBA, endpoint security, and Business-Critical Security (BCS) technologies.

The new capabilities enable security analysts to protect the organisation against threats by increasing observability and decreasing the time to respond to threats. 

New case management

According to a Forrester Study, SOC teams receive over 11,000 security alerts daily and struggle to get an overview of the alerts and then address them. The release comes with a new overview of incidents, cases, and system resources, which provides security analysts with easy access to the most relevant information.

In addition, the new case management interface provides a quick outline and groups related incidents into the same case, allowing analysts to run playbooks within a case to solve incidents faster.  

Gaining situational awareness

In the new case management system, our technology collates incidents that relate to specific attacks"

Gaining situational awareness is key for security teams. In the new case management system, our technology collates incidents that relate to specific attacks and provides a capability for the analyst to run suggested playbooks that fit the data, the TTP and the adversary at hand. Not only does the system greatly accelerate the detection, triage and response, but it increases the precision and efficacy as well,” says Christian Have, Logpoint CTO.

He adds, “We always strive to speed up threat detection, investigation, and response for our customers. Our platform’s new capabilities improve observability and make it easier for our customers to take action on incidents threatening the organisation and its digital assets.”

New release

The release includes updates to the core SIEM, SOAR, UEBA, and Director technologies, offering a better overview, new security content and improved playbooks, more precise detection of anomalies, better observability across tenants from a central location for MSSPs, and much more. 

With the new release, we’re taking further steps to simplify and improve security operations,” says Christian Have. “Our source management capabilities now support dynamic workloads such as cloud containers, remote workers and ephemeral systems."

He adds, "With this enhancement our new endpoint agent has greater reach, more capabilities and ultimately provides a larger suite of tools to the fingertips of the analyst. ”

Logpoint’s security operations

The release is the first since Logpoint launched its endpoint solution AgentX. It gives security analysts more precise detection of malicious malware and the ability to respond to endpoint threats. 

Logpoint’s security operations platform protects the entire business by providing comprehensive threat detection, investigation, and response across clients, servers, network systems, cloud workloads, endpoints, and business-critical applications. The platform is available on-prem, in private cloud, and as SaaS.

Download PDF version Download PDF version

In case you missed it

Honeywell - how disruptive technologies make security systems better
Honeywell - how disruptive technologies make security systems better

The shift from standalone systems to fully integrated solutions is one of the biggest shifts the security industry has experienced in recent years.  There is a higher demand...

AMPELMANN GmbH enhances security with ASSA ABLOY eCLIQ solution
AMPELMANN GmbH enhances security with ASSA ABLOY eCLIQ solution

The Ampelmännchen (“little traffic light man”) from the former GDR is a cult figure around the globe. For tourists, the shops of AMPELMANN GmbH in Berlin are a big...

What are the unique challenges of the government market for security?
What are the unique challenges of the government market for security?

Factors such as stable demand and large contracts make the government market particularly enticing for security companies and professionals. However, entering and thriving in the g...

Quick poll
Which feature is most important in a video surveillance system?