Navigation

Set your main menu in Appearance > Menus

Software Asia Limited
MENUMENU
  • ABOUT US
    • COMPANY OVERVIEW
    • OUR PARTNERS
    • JOIN US TODAY
      • AS OUR SOFTWARE PUBLISHERS
      • AS OUR PROCUREMENT MANAGERS
      • AS OUR RESELLERS
    • CAREER WITH LOGON
    • CONTACT US
  • INFORMATION SECURITY
    • Vulnerability Management
    • Multifactor Authentication
    • Threat Intelligence
    • Network Management Solutions
    • Security Information and Event Management
    • Remote Access Software
    • Systems Administration Tools
    • Robotic Process Automation
    • Data Loss Prevention
    • Data / Password Recovery
    • Asset Management Solutions
    • Identity and Access Management
    • Antivirus
    • Activity Monitoring and Surveillance
    • Forensic Solutions
    • Content Disarm and Reconstruction
  • SOFTWARE DEVELOPMENT
    • Integrated Development Environments
    • Development Components
      • UI Components
      • Networking Components
      • Office Components
      • Barcode Components
      • Communication
    • Imaging Solutions
    • Software Localization
    • Release Automation & Management
    • eLearning Authoring Solutions
    • Charting Solutions
    • PDF Solutions
    • Reporting Solutions
    • Testing & QA
    • Text Retrieval/Enterprise Search
    • Database
  • Services
    • TRAINING SERVICES
    • IMPLEMENTATION SERVICES
    • AFTER-SALES SERVICES
    • BEST PRACTICES CONSULTING
  • WHAT'S NEW
    • EVENTS
    • LATEST UPDATES
    • SPECIAL OFFERS
  • SEARCH

Set your main menu in Appearance > Menus

Email Us Service Hotline: +852 25128491
Software Asia Limited
MENUMENU
  • ABOUT US
    • COMPANY OVERVIEW
    • OUR PARTNERS
    • JOIN US TODAY
      • AS OUR SOFTWARE PUBLISHERS
      • AS OUR PROCUREMENT MANAGERS
      • AS OUR RESELLERS
    • CAREER WITH LOGON
    • CONTACT US
  • INFORMATION SECURITY
    • Vulnerability Management
    • Multifactor Authentication
    • Threat Intelligence
    • Network Management Solutions
    • Security Information and Event Management
    • Remote Access Software
    • Systems Administration Tools
    • Robotic Process Automation
    • Data Loss Prevention
    • Data / Password Recovery
    • Asset Management Solutions
    • Identity and Access Management
    • Antivirus
    • Activity Monitoring and Surveillance
    • Forensic Solutions
    • Content Disarm and Reconstruction
  • SOFTWARE DEVELOPMENT
    • Integrated Development Environments
    • Development Components
      • UI Components
      • Networking Components
      • Office Components
      • Barcode Components
      • Communication
    • Imaging Solutions
    • Software Localization
    • Release Automation & Management
    • eLearning Authoring Solutions
    • Charting Solutions
    • PDF Solutions
    • Reporting Solutions
    • Testing & QA
    • Text Retrieval/Enterprise Search
    • Database
  • Services
    • TRAINING SERVICES
    • IMPLEMENTATION SERVICES
    • AFTER-SALES SERVICES
    • BEST PRACTICES CONSULTING
  • WHAT'S NEW
    • EVENTS
    • LATEST UPDATES
    • SPECIAL OFFERS
  • SEARCH

Fraud Risk Assessment

Vulnerability assessments of users in your IT environment to find out how resilient they are to social engineering such as phishing, spear phishing, and ransomware attacks.

Request Quote
Evaluation

Fraud Risk Assessment

Vulnerability assessments of users in your IT environment to find out how resilient they are to social engineering such as phishing, spear phishing, and ransomware attacks.

How resilient are your users to email attacks?

Many organizations experience that it is not the IT environment itself that is the greatest security risk in their organization, but rather the users who are in it. Systems and computers can be protected, assessed and monitored to ensure they are safe, but how safe are your users and how do you test them? Less than 1% of all organizations measure how resilient their users are and thus they do not know what happens when exposed to phishing, spear phishing and ransomware attacks.

Features of the Fraud Risk Assessment Platform

Simulate social engineering & build a human firewall

Simulate social engineering & build a human firewall

Holm Security VMP contains an innovative and powerful tool to increase the resilience to social engineering. With this service, you simulate attacks by e-mail and, to increase resilience, customized awareness training is automatically presented to each user based on the specific user’s behavior. You will also get valuable statistics that provide the basis for further action.

The assessment is done without any risk to the user or your IT systems. The simulation uses e-mail messages and web pages. The service includes a variety of templates that you can easily edit, or you can create your own e-mail messages and web pages. In this way, you can carry out more or less advanced social engineering and so-called spear phishing attacks targeted at your entire organization or a specific group of users within your organization.

GDPR compliance

GDPR compliance

How prone are your users to leaking personal data? With the Fraud risk assessment service you can measure how resilient the users are to disclosing different types of personal data – an insight that is important in relation to GDPR.

Automated awareness training

Automated awareness training

Depending on the behaviour of each user in the simulation, customized awareness training is automatically composed and presented to the user. The information in the training is very useful for the user and is based on ready-made templates in the form of text and illustrations. The sender and the templates can be changed freely and it is possible to refer to your own training material. With a few clicks, automation helps you to not only get invaluable statistics, but also to automatically train your users – simple and very powerful.

Statistics

Statistics

The results of the assessment consist of statistics of opened e-mails, clicks, e-mail replies and posted forms. The statistics are not connected to users, but are completely anonymized. You can easily compare the results from assessments at different times to evaluate whether the actions you have taken between the assessments have given the desired effect.

Privacy by design

Privacy by design

This service is based on the privacy by design principle, which means that the user’s personal integrity will never be compromised. All users are anonymous in the assessment and no sensitive data is stored.

Details

Understand how resilient your users are against social engineering, through simulation of social engineering e-mails, like phishing, spear phishing and ransomware
GDPR compliance – measure tendency to leak personal data and prevent leakage Sandbox technology – the assessment is carried out completely without any risk to the user and your IT systems
Privacy by design – does not compromise personal integrity or store sensitive data
Automated and customised awareness training based on specific user behaviour Recipient import function
Grouping (tagging) of recipients
A large number of ready-made and customisable templates
Placeholders for e-mail address, first and last names and name of your organisation
Administration via Security Center

Resources

Fraud Risk Assessment (PDF file)
Quick Guide - IT Security, GDPR and NIS (PDF file)
Request Quote
Evaluation

LOGON works with corporate clients and systems integrators by offering Vulnerability Management that offer continuous monitoring, vector analytics and modeling, integration with Software Development Life Cycle, Threat intelligence platforms and deliver Graphical attack modeling and compliance reporting. LOGON offers products from Acunetix, NetSparker, Flexera / Secunia etc. Other security solutions include Veracode, Whitehat, OPSWAT, Tenable, QUALYS, etc.. These solutions offer both Static Analysis (SAST) and Dynamic Analysis (DAST) that help Penetration Testers test Vulnerability Remediation, Cyber Exposure needs and Risk Assessment.

was last modified: September 29th, 2020 by logon

COMPANY

Company Overview
Career with LOGON
Contact Us

JOIN US TODAY

Resellers
Software Publishers
Procurement Managers

WE ARE AVAILABLE ON

SAP Ariba   coupa

gem

SERVICES

Training Services
Implemetation Services
After-sales Services
Best Practices Consulting

WHAT'S NEW

Events
Latest Updates
Special Offers

FOLLOW US ON

GET IN TOUCH

Phone:+852 25128491
Email: [email protected]

Search engine

Use this form to find things you need on this site
Search

Results for {phrase} ({results_count} of {results_count_total})

Displaying {results_count} results of {results_count_total}

Dont see what you were looking for ? Retry the search with a different phrase ? If unsuccessful, please click here

Generic filters
Exact matches only
Search in title
Search in content
Search in excerpt
Newsletter
  • QUOTE

  • EVALUATION

  • CONTACT US

Chat with us on Line

Follow us on WeChat

Follow us on Weibo

Get In Touch
Contact Us Today
Book a Demo with us


Book a Demo with us


Free Website Risk Detection Request

    Request Quote

      * License text

      Evaluation Request

        Request a Demo !

          Search

          Results for {phrase} ({results_count} of {results_count_total})

          Displaying {results_count} results of {results_count_total}

          Dont see what you were looking for ? Retry the search with a different phrase ? If unsuccessful, please click here

          Generic filters
          Exact matches only
          Search in title
          Search in content
          Search in excerpt
          UserLock Video

            Get Your Document