Head, Security Services at a non-tech company with 11-50 employees
Reseller
Top 20
2023-12-27T06:29:08Z
Dec 27, 2023
I use the product for my research and development to enhance my work. We are transitioning to a new technology, and Logpoint has proven valuable for my purposes.
Senior Information Security Specialist at Growth Arbor
Real User
Top 20
2023-05-02T08:10:00Z
May 2, 2023
We used the solution to help our clients protect their environment by identifying users and the tools they access. Multiple users in our client's admin and HR departments were accessing critical financial documents. Our clients could not stop them from accessing these documents. So they wanted data on which users were accessing the files.
Project Manager at a comms service provider with 51-200 employees
Real User
Top 20
2023-03-15T12:57:16Z
Mar 15, 2023
The main use case was SIEM integration, triage and log collection, UABA, SOAR, and security analysis of any logs. I used it last semester. It was an internship, and my mission was to integrate a new SIEM into my company. My task was only to integrate. I didn't fully work on the SIEM and used it to its full potential. My experience was quite limited. The version that I was using was probably 7.13. I'm not very sure about it.
SOC Analyst at a comms service provider with 201-500 employees
Real User
Top 10
2022-11-15T17:46:17Z
Nov 15, 2022
I'm using LogPoint as a commercial product. My company uses LogPoint for data aggregation, which is also used for creating custom use cases based on organizational leads. Then, my company triggers and escalates to the IT team responsible for solving loopholes and problems seen via LogPoint.
The main purpose was for compliance reasons because the pension funds need to comply with the Dutch Federal Bank rules. So, most of the use cases were much more focused on the separation of duties, privilege escalation, and access to sensitive data. We were not using it as an active, real-time monitoring tool. The group of people looking after security was very small, and there were only daytime operations. So, the focus was not to look after external breaches, attacks, etc. That's the main reason why the responsibility of security monitoring was not ours anymore. Accountability and responsibility had shifted from the internal organization to a contracting firm.
CEO at a tech consulting company with 1-10 employees
Real User
Top 10
2022-05-16T21:06:00Z
May 16, 2022
The use case with the business case actually is using LogPoint as a full-blown team system. And actually to orchestrate incident responses. It's a SIEM system and if you incorporate detection rules and can set alerts, severities, stuff like that. It's the center of a SOC, basically. That's the main use case for it. Of course, it's also sued to fulfill regulatory compliance, which is making a report every week, every day, every month, according to the auditor, what he wants. That's the basic use case.
Infrastructure Project Manager and Architect at a government with 5,001-10,000 employees
Real User
2022-03-20T07:50:19Z
Mar 20, 2022
We use it for our network and security devices. We also use it for all the infrastructure services, such as Active Directory, domain controllers, Exchange servers, hypervisors, and antivirus servers. In general, it is more dedicated to security than to logs.
Chief Infrastructure & Security Office at a financial services firm with 51-200 employees
Real User
2021-12-08T17:55:00Z
Dec 8, 2021
We use it as a repository of most of the logs that are created within our office systems. It is mostly used for forensic purposes. If there is an investigation, we go look for the logs. We find those logs in LogPoint, and then we use them for further analysis.
Cyber Security Analyst at a transportation company with 51-200 employees
Real User
2021-08-25T16:53:14Z
Aug 25, 2021
It monitors the users as well as the endpoints and provides data for that. It basically studies the activities, tries to understand the activities, and then does a little bit baseline for that. It then monitors the user or the endpoint to see if there is any deviation. If there is any deviation, it triggers an alarm.
Account Manager at a computer software company with 11-50 employees
Reseller
2021-02-04T07:30:37Z
Feb 4, 2021
We do SMB and schools, K through 12. We have a storage cloud and cloud-based Cisco voiceover IP cloud services that we offer, as well as on-premise-based for those who still prefer that.
Security Consultant at a government with 10,001+ employees
Consultant
2020-06-04T09:41:21Z
Jun 4, 2020
We're a health care organization and we had a specific case where LogPoint was able to help develop a special collector for an earlier version of our storage system, where we had issues with migration. Some files were missing when we migrated to the new system, and we had trouble finding out why. LogPoint was very helpful in designing some drivers which could collect the log data, so we could identify the problem. We're customers of LogPoint and I'm a security consultant.
We use LogPoint for log collection. We have a specific use case around a system that was not able to provide this kind of correlation. However, we are going to get rid of the legacy platform within the year and will be moving away from LogPoint.
Manager Pre-sales Information Security at VAM Systems Inc.
Real User
2019-08-04T07:38:00Z
Aug 4, 2019
The primary use case is standard compliance to help the user's ability to navigate PCI DSS compliance or GDPR compliance. Besides that, if a user needs to do the log collection and correlation, the solution makes it easy.
Logpoint is a cutting-edge security information and event management (SIEM) solution that is designed to be intuitive and flexible enough to be used by an array of different businesses. It is capable of expanding according to its users' needs.
Benefits of Logpoint
Some of the benefits of using Logpoint include:
Unifies data logs: Logpoint creates a single system of classification for collected data. It makes it easy for users to search for and find data, which aids users when they are...
I use the product for my research and development to enhance my work. We are transitioning to a new technology, and Logpoint has proven valuable for my purposes.
We use the solution for SIEM and SOAR.
Logpoint works as a SIEM system. It provides SOAR functionality as well. It helps clients with users' endpoint behavior analysis.
We used the solution to help our clients protect their environment by identifying users and the tools they access. Multiple users in our client's admin and HR departments were accessing critical financial documents. Our clients could not stop them from accessing these documents. So they wanted data on which users were accessing the files.
The main use case was SIEM integration, triage and log collection, UABA, SOAR, and security analysis of any logs. I used it last semester. It was an internship, and my mission was to integrate a new SIEM into my company. My task was only to integrate. I didn't fully work on the SIEM and used it to its full potential. My experience was quite limited. The version that I was using was probably 7.13. I'm not very sure about it.
We have certain vendors, and our work is to deploy the SIEM solution.
I'm using LogPoint as a commercial product. My company uses LogPoint for data aggregation, which is also used for creating custom use cases based on organizational leads. Then, my company triggers and escalates to the IT team responsible for solving loopholes and problems seen via LogPoint.
The main purpose was for compliance reasons because the pension funds need to comply with the Dutch Federal Bank rules. So, most of the use cases were much more focused on the separation of duties, privilege escalation, and access to sensitive data. We were not using it as an active, real-time monitoring tool. The group of people looking after security was very small, and there were only daytime operations. So, the focus was not to look after external breaches, attacks, etc. That's the main reason why the responsibility of security monitoring was not ours anymore. Accountability and responsibility had shifted from the internal organization to a contracting firm.
We are using LogPoint for MSSP.
The use case with the business case actually is using LogPoint as a full-blown team system. And actually to orchestrate incident responses. It's a SIEM system and if you incorporate detection rules and can set alerts, severities, stuff like that. It's the center of a SOC, basically. That's the main use case for it. Of course, it's also sued to fulfill regulatory compliance, which is making a report every week, every day, every month, according to the auditor, what he wants. That's the basic use case.
We use it for our network and security devices. We also use it for all the infrastructure services, such as Active Directory, domain controllers, Exchange servers, hypervisors, and antivirus servers. In general, it is more dedicated to security than to logs.
We use it as a repository of most of the logs that are created within our office systems. It is mostly used for forensic purposes. If there is an investigation, we go look for the logs. We find those logs in LogPoint, and then we use them for further analysis.
It monitors the users as well as the endpoints and provides data for that. It basically studies the activities, tries to understand the activities, and then does a little bit baseline for that. It then monitors the user or the endpoint to see if there is any deviation. If there is any deviation, it triggers an alarm.
We do SMB and schools, K through 12. We have a storage cloud and cloud-based Cisco voiceover IP cloud services that we offer, as well as on-premise-based for those who still prefer that.
We're a health care organization and we had a specific case where LogPoint was able to help develop a special collector for an earlier version of our storage system, where we had issues with migration. Some files were missing when we migrated to the new system, and we had trouble finding out why. LogPoint was very helpful in designing some drivers which could collect the log data, so we could identify the problem. We're customers of LogPoint and I'm a security consultant.
We use LogPoint for log collection. We have a specific use case around a system that was not able to provide this kind of correlation. However, we are going to get rid of the legacy platform within the year and will be moving away from LogPoint.
On a high-level, we primarily use the solution for creating security operation centers.
The primary use case is standard compliance to help the user's ability to navigate PCI DSS compliance or GDPR compliance. Besides that, if a user needs to do the log collection and correlation, the solution makes it easy.