Logpoint and ThreatConnect compete in the cybersecurity field. ThreatConnect appears to have the upper hand due to its stronger feature set, which may justify its higher cost and complexity.
Features: Logpoint offers advanced log management, seamless data integration, and real-time analytics. ThreatConnect provides enriched threat intelligence, automated workflows, and strategic decision-making support.
Room for Improvement: Logpoint could enhance its threat intelligence capabilities and automation features. Additionally, refining its integration capabilities with third-party tools and expanding out-of-the-box analytics would be beneficial. ThreatConnect might work on simplifying its deployment process and improving cost-effectiveness. Enhancing user support services and offering more user-friendly analytics tools would be advantageous.
Ease of Deployment and Customer Service: Logpoint's straightforward deployment model and responsive customer service facilitate quick setup. Although ThreatConnect's deployment may be more complex, it benefits from dedicated support services that help maximize its features.
Pricing and ROI: Logpoint is known for competitive pricing and a more immediate ROI with lower initial costs. ThreatConnect has higher initial setup costs but offers long-term ROI through its comprehensive threat intelligence capabilities.
Since we started working with Torq, I am handling much fewer alerts. It is becoming really easy for me to handle an alert.
By the time we officially bought Torq, we already had two workflows that were very helpful to us.
It pretty much took until we got to our first renewal where we said that this is the value we see, this is the things we want more, but that is the first place where we said we are happy enough that we want to renew.
We have reduced manual analyst effort by thirty to forty percent.
This trust has led to an increase in sales because customers are confident we can protect their data.
The speed and quality of their answers have been pretty good, as I usually get a response within 24 hours, and they follow up well.
We can always get an answer, and the support team are experts in their own system.
Nine out of ten times, they give me a solution even if it is not the solution I wanted, and I still can get to the result.
Logpoint's customer support is not sufficient with only one engineer in the US.
The technical support for Logpoint is very good, and I would rate it as nine out of ten.
I recommend a submission to Logpoint because I worked with it before.
They have been responsive, knowledgeable, and helpful.
I just like their customer support because, within a short period of contacting them, they are able to help navigate issues.
Our case management is super scalable.
In terms of scalability, you can do as long as you can build it, and they can support it.
Regarding the ability of the solution to grow in your work environment, if it is scalable, if it fits your business requirements, and if there is room to scale up, the answer is yes, for sure.
It is web-based and accommodates the expansion of our organization.
Logpoint is scalable and capable of expanding.
ThreatConnect supports scalability by allowing us to identify threats and share information within our team networks.
Most of the time, the system is stable as long as the components that they integrate with are stable.
I have never faced any downtime or issues.
Regarding stability, I have noticed some lagging, crashing, and downtime, which is one of my largest gripes.
I have received reports indicating glitches and downtimes with Logpoint.
Sometimes, when using the solution, it slows down, affecting our ability to mitigate threats.
Torq should offer default templates that can directly scan firewall data and automate actions.
It was able to capture data but was unable to differentiate between the agent hostname we are using and the hostname that resides on the back end of the Internet.
From an engineering perspective, I think more error messages and error handling information for our engineering team would be very helpful.
Dealing with foreign entities for support was a challenge, leading us to switch providers due to lack of adequate support.
Logpoint needs to be cloud-native, as currently, it is not.
Logpoint's UEBA is a weak point, while Exabeam's UEBA has extra AI through automation.
The pricing is high for smaller organizations, so it would be beneficial to have tiered pricing.
ThreatConnect Threat Intelligence Platform (TIP) could be improved by simplifying the user interface to better fit day-to-day analyst workflow.
When they bring more and more value into the platform, it makes more sense to pay that price, but still, it is expensive.
Before deciding to implement Torq, I considered that compared to our old case management platform, Torq was a much better price and had a lot better value for what you get out of the platform, which was a key consideration for the company.
It is an expensive solution, not an inexpensive solution, but we get through the flexibility.
I rate the pricing at eight, suggesting it's relatively good or affordable.
The pricing seems a bit high for smaller companies.
Generally, the pricing and setup cost are on the higher side.
Torq's unified platform approach to AI SOC automation and case management has significantly benefited us by integrating the case management platform with the automation, which saves time compared to managing multiple point solutions across our security stack.
The fact that I can build whatever I want within my own imagination and skills without relying on code is the best thing about Torq.
You can copy and paste a cURL command. If you have documentation or APIs, you usually have an example on the side. You basically have all the information on how the API call should be. You can just copy that and paste it into a step, and it will just build the step for you.
The UEBA enables us to monitor at the device level, and SOAR provides playbooks and templates that we can modify and incorporate into the platform.
It effectively facilitates logging and log storage and assists in security event management by ingesting security events.
The most valuable feature, which is endpoint security, is included in Logpoint, and an extra feature is the integration.
The features are simple to use, and the interface is user-friendly, making it easy to navigate and apply the solutions.
The API-first architecture that enables us to perform custom integration with other products and real-time distribution.
| Product | Mindshare (%) |
|---|---|
| Torq | 3.7% |
| ThreatConnect Threat Intelligence Platform (TIP) | 3.2% |
| Logpoint | 1.9% |
| Other | 91.2% |



| Company Size | Count |
|---|---|
| Small Business | 1 |
| Midsize Enterprise | 3 |
| Large Enterprise | 4 |
| Company Size | Count |
|---|---|
| Small Business | 18 |
| Midsize Enterprise | 3 |
| Large Enterprise | 4 |
| Company Size | Count |
|---|---|
| Small Business | 8 |
| Midsize Enterprise | 23 |
| Large Enterprise | 4 |
Torq is the enterprise AI SOC solution that effectively combines adaptive insights and automation to handle critical threats efficiently. It manages threat lifecycles, swiftly moving from triage to response, ensuring effective risk management.
Torq is designed to streamline security operations by aggregating telemetry across your security stack. It investigates significant risks and manages threats from triage to containment and remediation. This AI-driven tool enhances the capabilities of your SecOps team, allowing them to achieve more impactful results without introducing complicated processes.
What are the key features of Torq?In industries like finance and healthcare, Torq shows effectiveness by adapting to specific risk scenarios often encountered in these fields. Its integration with existing infrastructures makes it a valuable asset for maintaining stringent security standards, essential for protecting critical data and operations in diverse high-stakes environments.
Logpoint offers a robust SIEM system tailored for compliance with regulations like PCI DSS and GDPR, enhancing security monitoring and enabling efficient incident response.
Logpoint strengthens cybersecurity by offering essential tools for log collection, security monitoring, and forensic analysis. Its features include an intuitive dashboard, a powerful correlation engine, and extensive third-party integrations, making it a versatile asset for security operations centers. Despite its advantages, areas for improvement include ransomware protection, cloud-native deployment, and more flexible pricing. Improvements in features like SOAR and UEBA functionality can boost its competitiveness.
What are the most important features of Logpoint?Many organizations utilize Logpoint across industries as part of their security infrastructure. It supports standard compliance, orchestrating incident responses and security threat monitoring. Logpoint empowers businesses by integrating and correlating security data, improving cybersecurity posture in varied environments.
ThreatConnect Threat Intelligence Platform provides a comprehensive solution for operational threat intelligence. It effectively ingests and enriches data, aligning with intelligence requirements for seamless application across security operations.
ThreatConnect TIP stands out by integrating threat intelligence with orchestration for streamlined threat management. It simplifies the user experience with a customizable interface assisting security teams in operationalizing insights across multiple teams without disruption. The platform automates threat scoring and optimizes threat correlation and response, ensuring timely threat detection and protection. Collaboration with Polarity and Risk Quantifier accelerates actionable intelligence, while support and patch management enhance overall user experience. Although improvements in integration processes and training accessibility are necessary, the platform aggregates threat data for efficient threat mitigation.
What are the key features of ThreatConnect TIP?In industries focusing on security, ThreatConnect TIP supports teams in identifying and mitigating security threats through automation. Integrated with cybersecurity networks, it assists in endpoint protection, SOC management, and vulnerability management, being pivotal in threat investigation and intelligence dissemination.
We monitor all Security Orchestration Automation and Response (SOAR) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.