Leave us a Message:

Monitor, Detect

And Handle

Cyber Threats

Combining vast experience & Cyber expertise with our proprietary technology


Managed Secuirty Service​ (MSSP)

24/7 managed monitoring and detection services of your networks, by cyber experts. 

Services for SOC systems

Build an end to end solution for SIEM, SOAR, and Big Data systems


Beginners and advanced training programs for SOC and operations staff, technical teams and for managerial level

System Maintenance

Sign Up and Stay Updated


ArcSight can do anything. Just tell us what you want, and we shall do it.
Define and customize highly complex and sophisticated SIEM systems to detect and protect against events that threatens and endangers the security of organizational information.


Cortex XSOAR is the industry’s first extended security, orchestration, automation and
response platform with native threat intel management that our exceptional team of
engineers integrate seamlessly with all SIEM and Big Data systems.

Our Mission

The integration between ELK and ArcSight systems enables the definition of different rules, and leverage the management of large amounts of data using the KIBANA sophisticated BI for advanced elastic search.

The LogPoint’s SIEM system is designed from the ground up to be simple, flexible, and scalable, providing streamlined design, deployment, and integration tools to open the use of a network security tool up to all businesses. This means that the architecture can be continuously extended with additional functionality without the need for a full major release, to continue to support your business’s growing and changing needs.



Increase the security of organizational information and anticipate threats before they cause damage, and improve the level of protection of organizational information, by providing end-to-end SIEM solution.

We offer state-of-the-art information security solutions, advanced and integrative. A systemic solution that addresses today’s threats and predicts the threats of tomorrow.
We develop and adapt the appropriate solution to your organization as a one-stop information security solution, based on the existing systems in the organization, while optimizing and enhancing capabilities and resources.


Leading solution and technology partners to bring CYBER innovation to your business


Join our cyber protected customers


Grid Field - DB Entry Mirroring​

Grid Field - DB Entry Mirroring​

Grid Field – DB Entry Mirroring This post is the 2nd part, of a two-part use case on Grid Field…
How to use a Grid Field​

How to use a Grid Field​

How to use a grid field In this post, our SOAR expert, Mr.Ben Aviv, will demonstrate how to use a…
Remote Code Execution Vulnerability CVE-2021-40444

Remote Code Execution Vulnerability CVE-2021-40444

About CVE-2021-40444  Microsoft is investigating reports of a remote code execution vulnerability in MSHTML that affects Microsoft Windows. Microsoft is…

Sign Up and Stay Updated


Leave us a Message:

Leave us a Message:


Skip to content