Complete managed security service and platform to predict, prevent, detect, and respond to threats across your entire business.

Platforms Supported

  • Web Based
  • iPhone App
  • Android App
  • Windows App

Support Options

  • Email/Help Desk
  • FAQs/Forum
  • Knowledge Base
  • Phone Support
  • 24/7 (Live rep)
  • Chat
LogPoint's SIEM platform helps businesses secure data from threats & respond to cyberattacks in compliance with regulatory norms.

Platforms Supported

  • Web Based
  • iPhone App
  • Android App
  • Windows App

Support Options

  • Email/Help Desk
  • FAQs/Forum
  • Knowledge Base
  • Phone Support
  • 24/7 (Live rep)
  • Chat

Starting from

  • Subscription

Starting from

  • Subscription

Overall rating

3,6 /5
(22)
Ease of Use
3,1/5
Features & Functionality
3,9/5
Customer Service
4/5
Value for Money
3,8/5

Overall rating

4,7 /5
(3)
Ease of Use
4,7/5
Features & Functionality
4,3/5
Customer Service
5/5
Value for Money
4,7/5

Total features 80

  • AI/Machine Learning
  • Access Controls/Permissions
  • Activity Dashboard
  • Activity Monitoring
  • Activity Tracking
  • Alerts / Escalation
  • Alerts/Notifications
  • Anomaly Detection
  • Anomaly/Malware Detection
  • Anti Virus
  • Application Security
  • Archiving & Retention
  • Audit Trail
  • Backup and Recovery
  • Batch Processing
  • Behavior Tracking
  • Behavioral Analytics
  • Capacity Management
  • Charting
  • Compliance Management
  • Compliance Tracking
  • Continuous Monitoring
  • Customizable Reports
  • Dashboard Creation
  • Data Mapping
  • Data Visualization
  • Device Management
  • Diagnostic Tools
  • Email Alerts
  • Encryption
  • Endpoint Management
  • Event Analysis
  • Event Logs
  • Event Tracking
  • File Integrity Monitoring
  • Filtering
  • Firewalls
  • Forensic Analysis
  • HIPAA Compliant
  • Incident Management
  • Intrusion Detection System
  • Issue Management
  • Log Collection
  • Log Management
  • Log Parsing
  • Log Rotation
  • Monitoring
  • Network Monitoring
  • PCI Compliance
  • Patch Management
  • Performance Metrics
  • Policy Management
  • Predictive Analytics
  • Prioritization
  • Real Time Analytics
  • Real Time Data
  • Real Time Monitoring
  • Real Time Notifications
  • Real Time Reporting
  • Remediation Management
  • Reporting & Statistics
  • Reporting/Analytics
  • Resource Management
  • Risk Alerts
  • Risk Management
  • Role-Based Permissions
  • Root Cause Analysis
  • Search/Filter
  • Secure Data Storage
  • Security Auditing
  • Sensitive Data Identification
  • Server Logs
  • Server Monitoring
  • Signature Matching
  • Threat Intelligence
  • Threat Response
  • Threshold Alerts
  • Tokenization
  • Two-Factor Authentication
  • User Activity Monitoring
  • VPN Software
  • Visual Analytics
  • Vulnerability Scanning
  • Web Threat Management
  • Whitelisting/Blacklisting
  • Workflow Management

Total features 38

  • AI/Machine Learning
  • Access Controls/Permissions
  • Activity Dashboard
  • Activity Monitoring
  • Activity Tracking
  • Alerts / Escalation
  • Alerts/Notifications
  • Anomaly Detection
  • Anomaly/Malware Detection
  • Anti Virus
  • Application Security
  • Archiving & Retention
  • Audit Trail
  • Backup and Recovery
  • Batch Processing
  • Behavior Tracking
  • Behavioral Analytics
  • Capacity Management
  • Charting
  • Compliance Management
  • Compliance Tracking
  • Continuous Monitoring
  • Customizable Reports
  • Dashboard Creation
  • Data Mapping
  • Data Visualization
  • Device Management
  • Diagnostic Tools
  • Email Alerts
  • Encryption
  • Endpoint Management
  • Event Analysis
  • Event Logs
  • Event Tracking
  • File Integrity Monitoring
  • Filtering
  • Firewalls
  • Forensic Analysis
  • HIPAA Compliant
  • Incident Management
  • Intrusion Detection System
  • Issue Management
  • Log Collection
  • Log Management
  • Log Parsing
  • Log Rotation
  • Monitoring
  • Network Monitoring
  • PCI Compliance
  • Patch Management
  • Performance Metrics
  • Policy Management
  • Predictive Analytics
  • Prioritization
  • Real Time Analytics
  • Real Time Data
  • Real Time Monitoring
  • Real Time Notifications
  • Real Time Reporting
  • Remediation Management
  • Reporting & Statistics
  • Reporting/Analytics
  • Resource Management
  • Risk Alerts
  • Risk Management
  • Role-Based Permissions
  • Root Cause Analysis
  • Search/Filter
  • Secure Data Storage
  • Security Auditing
  • Sensitive Data Identification
  • Server Logs
  • Server Monitoring
  • Signature Matching
  • Threat Intelligence
  • Threat Response
  • Threshold Alerts
  • Tokenization
  • Two-Factor Authentication
  • User Activity Monitoring
  • VPN Software
  • Visual Analytics
  • Vulnerability Scanning
  • Web Threat Management
  • Whitelisting/Blacklisting
  • Workflow Management