Logpoint Features
Orchestration (8)
Asset Management
Lets users group and organize their endpoints to gather threat intelligence on specific technologies. This feature was mentioned in 12 Logpoint reviews.
Security Workflow Automation
Based on 14 Logpoint reviews. Reduces the need for IT and security professionals to iterate repetitive tasks associated with gathering threat information.
Deployment
The process in which users integrate their existing security systems and endpoints to the threat intelligence platform. This feature was mentioned in 13 Logpoint reviews.
Sandboxing
A feature that allows security testing and information gathering to occur in a secure, resource independent environment.
Security Orchestration
As reported in 11 Logpoint reviews. Integrates additional security tools to automate security and incident response processes.
Data Collection
Collects information from multiple sources to cross reference and build contextual to correlate intelligence. This feature was mentioned in 11 Logpoint reviews.
Threat Intelligence
Stores information related to common threats and how to resolve them once incidents occur.
Data Visualization
Offer pre-built and custom reporting and dashboards for quick insights into system states. 11 reviewers of Logpoint have provided feedback on this feature.
Information (3)
Proactive Alerts
As reported in 13 Logpoint reviews. Prior to security incidents, the product will alert users when a new, relevant vulnerability or threat is discovered.
Malware Detection
Provides multiple techniques and information sources to alert users of malware occurrences. 14 reviewers of Logpoint have provided feedback on this feature.
Intelligence Reports
Based on 12 Logpoint reviews. The ability for users to produce reports outlining detailed and personalized threat information
Personalization (3)
Endpoint Intelligence
As reported in 10 Logpoint reviews. Analysis for users to examine threat intelligence data specific to their endpoint devices.
Security Validation
As reported in 11 Logpoint reviews. The product has a recurring examination process to update your intelligence reports as new threats emerge.
Dynamic/Code Analysis
The ability to examine your application, website, or database's code to uncover zero-day vulnerabilities.
Response (10)
Resolution Automation
Diagnose and resolve incidents without the need for human interaction. 16 reviewers of Logpoint have provided feedback on this feature.
Resolution Guidance
As reported in 14 Logpoint reviews. Guide users through the resolution process and give specific instructions to remedy individual occurrences.
System Isolation
As reported in 11 Logpoint reviews. Cuts off network connection or temporarily inactivate applications until incidents are remedied.
Threat Intelligence
As reported in 15 Logpoint reviews. Gathers information related to threats in order to gain further information on remedies.
Alerting
Clearly notifies users with relevant information and anomalies in a timely manner. This feature was mentioned in 11 Logpoint reviews.
Performance Baselin
As reported in 10 Logpoint reviews. Sets a standard performance baseline by which to compare log activity.
High Availability/Disaster Recovery
Allows platform to scale to size of desired environment and configured with high availability and disaster recovery capabilities.
Incident Alerts
Gives alerts when incidents arise. Some responses may be automated, but users will still be informed.
Response Orchestration
Integrates additional security tools to automate security and incident response processes.
Response Automation
Reduces time spent remedying issues manually. Resolves common network security incidents quickly
Records (3)
Incident Logs
As reported in 21 Logpoint reviews. Information on each incident is stored in databases for user reference and analytics.
Incident Reports
Produces reports detailing trends and vulnerabilities related to their network and infrastructure. This feature was mentioned in 19 Logpoint reviews.
Resource Usage
Analyzes recurring incidents and remedies to ensure optimal resource usage. This feature was mentioned in 20 Logpoint reviews.
Management (3)
Incident Alerts
As reported in 21 Logpoint reviews. Gives alerts when incidents arise. Some responses may be automated, but users will still be informed.
Database Management
Adminstrators can access and organize data related to incidents to produce reports or make data more navigable. 15 reviewers of Logpoint have provided feedback on this feature.
Workflow Management
Administrators can organize workflows to guide remedies to specific situations incident types. 17 reviewers of Logpoint have provided feedback on this feature.
Network Management (3)
Activity Monitoring
Documents the actions from endpoints within a network. Alerts users of incidents and abnormal activities and documents the access point. This feature was mentioned in 43 Logpoint reviews.
Asset Management
As reported in 39 Logpoint reviews. Keeps records of each network asset and its activity. Discovers new assets accessing the network.
Log Management
As reported in 48 Logpoint reviews. Provides security information and stores the data in a secure repository for reference.
Incident Management (3)
Event Management
Alerts users of incidents and allows users to intervene manually or triggers an automated response. This feature was mentioned in 42 Logpoint reviews.
Automated Response
Reduces time spent remedying issues manually. Resolves common network security incidents quickly. 40 reviewers of Logpoint have provided feedback on this feature.
Incident Reporting
Based on 42 Logpoint reviews. Documents cases of abnormal activity and compromised systems.
Security Intelligence (4)
Threat Intelligence
Based on 42 Logpoint reviews. Stores information related to common threats and how to resolve them once incidents occur.
Vulnerability Assessment
Analyzes your existing network and IT infrastructure to outline access points that can be easily compromised. 38 reviewers of Logpoint have provided feedback on this feature.
Advanced Analytics
As reported in 41 Logpoint reviews. Allows users to customize analytics with granulized metrics that are pertinent to your specific resources.
Data Examination
Allows users to search databases and incident logs to gain insights on vulnerabilities and incidents. This feature was mentioned in 42 Logpoint reviews.
Visibility (3)
Dashboards and Visualizations
Presents information and analytics in a digestible, intuitive, and visually appealing way. This feature was mentioned in 30 Logpoint reviews.
Alerts and Notifications
Clearly notifies users with relevant information and anomalies in a timely manner. 29 reviewers of Logpoint have provided feedback on this feature.
Reporting
Based on 28 Logpoint reviews. Creates reports outlining log activity and relevant metrics.
Monitoring and Management (3)
Automation
As reported in 24 Logpoint reviews. Automatically allocates resources to address log anomalies.
Performance Baseline
Based on 23 Logpoint reviews. Sets a standard performance baseline by which to compare log activity.
Real-Time Monitoring
Constantly monitors logs to detect anomalies in real time. 26 reviewers of Logpoint have provided feedback on this feature.
Analysis (14)
Continuous Analysis
Constantly monitors traffic and activity. Detects anomalies in functionality, user accessibility, traffic flows, and tampering.
Behavioral Analysis
Constantly monitors acivity related to user behavior and compares activity to benchmarked patterns and fraud indicators.
Data Context
Provide insights into why trends are occurring and what issues could be related.
Activity Logging
Monitors, records, and logs both real-time and post-event activity.
Track Trends
Based on 36 Logpoint reviews. Allows user to track log trends.
Detect Anomalies
Identify and predict anomalies in real-time with outlier detection and uncover root-causes 37 reviewers of Logpoint have provided feedback on this feature.
Metric and Event Data
Based on 36 Logpoint reviews. Analyze both metric and event data on the same platform regardless of source or structure
Search
As reported in 41 Logpoint reviews. Search your logs for troubleshooting and open-ended exploration of your data
Alerts
Create alerts based on search patterns, thresholds for specific log metrics, or other conditions This feature was mentioned in 41 Logpoint reviews.
Live Tail
See your data, in real time, streaming into the system from multiple data sources This feature was mentioned in 33 Logpoint reviews.
Incident Reporting
Produces reports detailing trends and vulnerabilities related to their network and infrastructur
Network Visibility
Provides all-encompassing display and analysis of environments, resources, traffic, and activity across networks.
Metadata Enrichment
Facilitates Artificial Intelligence (AI) such as Machine Learning (ML) to enable data ingestion, performance suggestions, and traffic analysis.
Metadata Management
Indexes metadata descriptions for easier searching and enhanced insight
Detection (6)
Anomaly Detection
Constantly monitors activity related to user behavior and compares activity to benchmarked patterns.
Incident Alerts
Gives alerts when incidents arise. Some responses may be automated, but users will still be informed.
Activity Monitoring
Monitors the actions from endpoints within a network. Alerts users of incidents and abnormal activities and documents the access point.
Multi-Network Monitoring
Provides monitoring capabilities for multiple networks at once.
Asset Discovery
Detect new assets as they enter a network and add them to asset inventory.
Anomaly Detection
Constantly monitors activity related to user behavior and compares activity to benchmarked patterns
Automation (4)
Workflow Mapping
Visually displays connected applications and integrated data. Allows customization and management of workflow structures.
Workflow Automation
Streamline the flow of work processes by establishing triggers and alerts that notify and route information to the appropriate people when their action is required within the compensation process.
Automated Remediation
Reduces time spent remedying issues manually. Resolves common network security incidents quickly.
Log Monitoring
As reported in 11 Logpoint reviews. Constantly monitors logs to detect anomalies in real time.
Data Preparation (4)
Data Sources
As reported in 40 Logpoint reviews. Automatically collect logs from all your services, applications, and platforms
Indexing
As reported in 37 Logpoint reviews. Automate the indexing of machine data that's critical to your operations
Automated Tagging
See log data in context with automated tagging and correlation 39 reviewers of Logpoint have provided feedback on this feature.
Data Blending
Mix and match data from apps, hosts, containers, services, networks, and more This feature was mentioned in 36 Logpoint reviews.
Visualization (2)
Dashboards
Visualize log data on dashboards 41 reviewers of Logpoint have provided feedback on this feature.
Data Discovery
As reported in 37 Logpoint reviews. Drill down and explore data to discover new insights
Generative AI (6)
AI Text Summarization
Condenses long documents or text into a brief summary.
Generate Attack Scenarios
Use AI to propose possible threat actor tactics, techniques, and procedures against specific environments or assets.
Generate Threat Detection Rules
Use AI to automatically create detection rules based on observed patterns.
Generate Threat Summaries
Use AI to produce concise summaries of complex threat reports or alerts.
AI Text Generation
Allows users to generate text based on a text prompt.
AI Text Summarization
Condenses long documents or text into a brief summary.
Functionality - SAP Security Software (6)
Visualizations
Create dashboards that provide real-time data and insights for comprehensive SAP security.
Log Analysis
Provides log correlation and analysis to give a complete overview of the SAP IT landscape.
SIEM capabilities
Offers real-time security information and event management (SIEM) intelligence to offer both proactive and reactive cybersecurity measures.
Prebuilt content and integrations
Offers integrations and prebuilt content to provide quick implementation.
User Identification
Provides SSO, MFO and RBAC capabilities.
360 degree security
Offers threat detection, vulnerability management, devsecops, compliance, patching and monitoring capabilities.
Agentic AI - Threat Intelligence (4)
Autonomous Task Execution
Capability to perform complex tasks without constant human input
Multi-step Planning
Ability to break down and plan multi-step processes
Proactive Assistance
Anticipates needs and offers suggestions without prompting
Decision Making
Makes informed choices based on available data and objectives
Agentic AI - Security Information and Event Management (SIEM) (4)
Autonomous Task Execution
Capability to perform complex tasks without constant human input
Multi-step Planning
Ability to break down and plan multi-step processes
Proactive Assistance
Anticipates needs and offers suggestions without prompting
Decision Making
Makes informed choices based on available data and objectives
Agentic AI - User and Entity Behavior Analytics (UEBA) (4)
Autonomous Task Execution
Capability to perform complex tasks without constant human input
Multi-step Planning
Ability to break down and plan multi-step processes
Proactive Assistance
Anticipates needs and offers suggestions without prompting
Decision Making
Makes informed choices based on available data and objectives
Agentic AI - SAP Security Software (3)
Autonomous Task Execution
Capability to perform complex tasks without constant human input
Cross-system Integration
Works across multiple software systems or databases
Proactive Assistance
Anticipates needs and offers suggestions without prompting
Agentic AI - SAP Store (7)
Autonomous Task Execution
Capability to perform complex tasks without constant human input
Multi-step Planning
Ability to break down and plan multi-step processes
Cross-system Integration
Works across multiple software systems or databases
Adaptive Learning
Improves performance based on feedback and experience
Natural Language Interaction
Engages in human-like conversation for task delegation
Proactive Assistance
Anticipates needs and offers suggestions without prompting
Decision Making
Makes informed choices based on available data and objectives
Agentic AI - Log Analysis (7)
Autonomous Task Execution
Capability to perform complex tasks without constant human input
Multi-step Planning
Ability to break down and plan multi-step processes
Cross-system Integration
Works across multiple software systems or databases
Adaptive Learning
Improves performance based on feedback and experience
Natural Language Interaction
Engages in human-like conversation for task delegation
Proactive Assistance
Anticipates needs and offers suggestions without prompting
Decision Making
Makes informed choices based on available data and objectives
Agentic AI - Log Monitoring (7)
Autonomous Task Execution
Capability to perform complex tasks without constant human input
Multi-step Planning
Ability to break down and plan multi-step processes
Cross-system Integration
Works across multiple software systems or databases
Adaptive Learning
Improves performance based on feedback and experience
Natural Language Interaction
Engages in human-like conversation for task delegation
Proactive Assistance
Anticipates needs and offers suggestions without prompting
Decision Making
Makes informed choices based on available data and objectives
Services - Network Detection and Response (NDR) (1)
Managed Services
Offers managed network detection and response services.





