Navigation

Set your main menu in Appearance > Menus

Software Asia Limited
MENUMENU
MENUMENU
  • ABOUT US
    • COMPANY OVERVIEW
    • OUR PARTNERS
    • JOIN US TODAY
      • AS OUR SOFTWARE PUBLISHERS
      • AS OUR PROCUREMENT MANAGERS
      • AS OUR RESELLERS
    • CAREER WITH LOGON
    • CONTACT US
  • INFORMATION SECURITY
    • Vulnerability Management
    • Multifactor Authentication
    • Threat Intelligence
    • Network Management Solutions
    • Security Information and Event Management
    • Remote Access Software
    • Systems Administration Tools
    • Robotic Process Automation
    • Data Loss Prevention
    • Data / Password Recovery
    • Asset Management Solutions
    • Identity and Access Management
    • Antivirus
    • Activity Monitoring and Surveillance
    • Forensic Solutions
    • Content Disarm and Reconstruction
  • SOFTWARE DEVELOPMENT
    • Integrated Development Environments
    • Development Components
      • UI Components
      • Networking Components
      • Office Components
      • Barcode Components
      • Communication
    • Imaging Solutions
    • Software Localization
    • Release Automation & Management
    • eLearning Authoring Solutions
    • Charting Solutions
    • PDF Solutions
    • Reporting Solutions
    • Testing & QA
    • Text Retrieval/Enterprise Search
    • Database
  • Services
    • TRAINING SERVICES
    • IMPLEMENTATION SERVICES
    • AFTER-SALES SERVICES
    • BEST PRACTICES CONSULTING
  • WHAT'S NEW
    • EVENTS
    • LATEST UPDATES
    • SPECIAL OFFERS
  • SEARCH

Set your main menu in Appearance > Menus

Email Us Service Hotline: +852 25128491
Software Asia Limited
MENUMENU
MENUMENU
  • ABOUT US
    • COMPANY OVERVIEW
    • OUR PARTNERS
    • JOIN US TODAY
      • AS OUR SOFTWARE PUBLISHERS
      • AS OUR PROCUREMENT MANAGERS
      • AS OUR RESELLERS
    • CAREER WITH LOGON
    • CONTACT US
  • INFORMATION SECURITY
    • Vulnerability Management
    • Multifactor Authentication
    • Threat Intelligence
    • Network Management Solutions
    • Security Information and Event Management
    • Remote Access Software
    • Systems Administration Tools
    • Robotic Process Automation
    • Data Loss Prevention
    • Data / Password Recovery
    • Asset Management Solutions
    • Identity and Access Management
    • Antivirus
    • Activity Monitoring and Surveillance
    • Forensic Solutions
    • Content Disarm and Reconstruction
  • SOFTWARE DEVELOPMENT
    • Integrated Development Environments
    • Development Components
      • UI Components
      • Networking Components
      • Office Components
      • Barcode Components
      • Communication
    • Imaging Solutions
    • Software Localization
    • Release Automation & Management
    • eLearning Authoring Solutions
    • Charting Solutions
    • PDF Solutions
    • Reporting Solutions
    • Testing & QA
    • Text Retrieval/Enterprise Search
    • Database
  • Services
    • TRAINING SERVICES
    • IMPLEMENTATION SERVICES
    • AFTER-SALES SERVICES
    • BEST PRACTICES CONSULTING
  • WHAT'S NEW
    • EVENTS
    • LATEST UPDATES
    • SPECIAL OFFERS
  • SEARCH

THREAT INTELLIGENCE

Detect and Prioritise Threats with

THREAT INTELLIGENCE

Having an in-depth understanding of your external and internal threat landscape gives you real-time information necessary to protect your business from cyberattacks.We offer solutions and services that help automate the threat investigation process and delivers actionable intelligence so that you can focus only on the most relevant threats to your organization.

91
Yes
detail
detail
list
1
1000000
Name...
/threat-intelligence-security/

Silobreaker Products

Detail
Sort By:

Categories:

Silobreaker
Silobreaker Online Image
Silobreaker Online
Details
Silobreaker API Image
Silobreaker API
Details
Silobreaker
Silobreaker Online Image
Silobreaker Online
Silobreaker Online is our flagship product. A hosted and secure online offering that includes all analytical tools and visualisations and comes with links to open source data in multiple languages from hundreds of thousands of news, blog... Read More
Details
Silobreaker API Image
Silobreaker API
An optional addition to your Silobreaker Online subscription, the API enables you to make Silobreaker your own. Integrate our data and results within your own environment or leverage third-party products with the strength of Silobreaker?... Read More
Details
9
Yes
detail
detail
list
1
1000000
Name...
/threat-intelligence-security/

Flexera Vulnerability Intelligence

Detail
Sort By:

Categories:

AdminStudio Image
AdminStudio
Details
Flexera- Software Vulnerability Manager Image
Flexera- Software Vulnerability Manager
Details
Flexera- Software Vulnerability Research Image
Flexera- Software Vulnerability Research
Details
AdminStudio Image
AdminStudio
New releases. New apps. Windows 10 migrations. Virtualization. AdminStudio is a complete application readiness solution. Now you can identify and mitigate issues before pulling the deploy trigger–with no more surprises.
Details
Flexera- Software Vulnerability Manager Image
Flexera- Software Vulnerability Manager
Stay ahead of emerging threats. Shut down breaches before they start. Flexera Software Vulnerability Manager empowers IT Security and IT Operations with intelligence to continuously track, prioritize and remediate vulnerable applications... Read More
Details
Flexera- Software Vulnerability Research Image
Flexera- Software Vulnerability Research
Sprint ahead of software vulnerability threats. Access trusted vulnerability research covering more than 55,000 applications. Provide timely alerts on potential risks. Empower your IT team to manage proactively. Optimized vulnerability m... Read More
Details

115
Yes
detail
detail
list
1
1000000
Name...
/threat-intelligence-security/

ANET

Detail
Sort By:
SureLog SIEM Image
SureLog SIEM
Details
SureLog SIEM Image
SureLog SIEM
SureLog is a next-generation Security Information and Event Management (SIEM) tool that monitors logs from network hardware and software to spot security threats, detect and prevent breaches, and provide forensic ana... Read More
Details
141
Yes
detail
detail
list
1
1000000
Name...
/threat-intelligence-security/

Holm Security

Detail
Sort By:
Network Scanning Image
Network Scanning
Details
Fraud Risk Assessment Image
Fraud Risk Assessment
Details
Network Scanning Image
Network Scanning
Automated and continuous vulnerability management for public and local systems, as well as cloud services. Cloud Scanners and virtual appliance for local scanning.
Details
Fraud Risk Assessment Image
Fraud Risk Assessment
Vulnerability assessments of users in your IT environment to find out how resilient they are to social engineering such as phishing, spear phishing, and ransomware attacks.
Details
96
Yes
detail
detail
list
1
1000000
Name...
/threat-intelligence-security/

DomainTools

Detail
Sort By:
DomainTools
Iris Investigation Platform Image
Iris Investigation Platform
Details
APIs Image
APIs
Details
Domain Risk Score Image
Domain Risk Score
Details
DomainTools
Iris Investigation Platform Image
Iris Investigation Platform
Iris is a proprietary threat intelligence and investigation platform that combines enterprise-grade domain intelligence and risk scoring with industry-leading passive DNS data from Farsight Security
Details
APIs Image
APIs
For Security Operations Centers (SOCs), Fraud Analysts and Solution Vendors that need to integrate DomainTools data into their existing workflows.
Details
Domain Risk Score Image
Domain Risk Score
Most domain or IP reputation feeds rely on observing dangerous behavior, meaning that someone gets hurt before the domain or IP gets blacklisted.
Details

LOGON is a pan-asian company operating in China, Hong Kong (HK), India, Singapore, Malaysia, Indonesia, Vietnam, Philippines and Thailand. LOGON has local dedicated trained product specialists in Hong Kong, Guangzhou, Kuala Lumpur, Mumbai and Bangalore. LOGON acts both as value added reseller and sole distributor for award winning software solutions. Customers can buy new licenses, purchase upgrades and renewals from any of our local offices. Contact us for first line support during evaluations, PoCs. We offer best practices consulting services and classroom & online training. Check our site for latest offers, special discounts, bundle deals, etc..

was last modified: September 29th, 2020 by logon

COMPANY

Company Overview
Career with LOGON
Contact Us

JOIN US TODAY

Resellers
Software Publishers
Procurement Managers

WE ARE AVAILABLE ON

SAP Ariba   coupa

gem

SERVICES

Training Services
Implemetation Services
After-sales Services
Best Practices Consulting

WHAT'S NEW

Events
Latest Updates
Special Offers

FOLLOW US ON

GET IN TOUCH

Phone:+852 25128491
Email: [email protected]

Legal   |   Privacy Policy

Important Links

  • Call me
  • Legal
  • Privacy Policy

Search engine

Use this form to find things you need on this site
Search

Results for {phrase} ({results_count} of {results_count_total})

Displaying {results_count} results of {results_count_total}

Dont see what you were looking for ? Retry the search with a different phrase ? If unsuccessful, please click here

Generic filters
Exact matches only
Search in title
Search in content
Search in excerpt
Newsletter
  • QUOTE

  • EVALUATION

  • CONTACT US

Request for Training Quote
  • Please enter a number from 1 to 20.
Request for Training Quote
  • Please enter a number from 1 to 20.
Request for Training Quote
  • Please enter a number from 1 to 20.
Request for Training Quote
  • Please enter a number from 1 to 20.
Request for Training Quote
  • Please enter a number from 1 to 20.
Request for Training Quote
  • Please enter a number from 1 to 20.
Request for Training Quote
  • Please enter a number from 1 to 20.
Request for Training Quote
  • Please enter a number from 1 to 20.
Request for Training Quote
  • Please enter a number from 1 to 20.
Chat with us on Line

Follow us on WeChat

Follow us on Weibo

Get In Touch
Contact Us Today
Book a Demo with us


Book a Demo with us


Free Website Risk Detection Request

    Request Quote

      * License text

      Evaluation Request

        Request a Demo !

          Search

          Results for {phrase} ({results_count} of {results_count_total})

          Displaying {results_count} results of {results_count_total}

          Dont see what you were looking for ? Retry the search with a different phrase ? If unsuccessful, please click here

          Generic filters
          Exact matches only
          Search in title
          Search in content
          Search in excerpt
          UserLock Video

            Get Your Document