Navigation
  • SOLUTIONS
    • INFORMATION SECURITY SOLUTIONS
      • Vulnerability Management
      • Multifactor Authentication
      • Network Management Solutions
      • Security Information and Event Management
      • Remote Access Software
      • File Integrity Management
      • Systems Administration Tools
      • Data Loss Prevention
      • Data / Password Recovery
      • Asset Management Solutions
      • Identity and Access Management
      • Antivirus
      • Activity Monitoring and Surveillance
      • Forensic Solutions
    • SOFTWARE DEVELOPMENT SOLUTIONS
      • Integrated Development Environments
      • DEVELOPMENT COMPONENTS
        • UI Tools
        • Networking Components
        • Office Components
        • Barcode Components
        • Communication Components
      • Imaging Solutions
      • Software Localization
      • Release Automation & Management
      • eLearning Authoring Solutions
      • Charting Solutions
      • PDF Solutions
      • Reporting Solutions
      • Testing & QA
      • Text Retrieval / Enterprise Search
      • Database
  • SERVICES
    • Training Services
    • Implementation Services
    • Best Practices Consulting
    • After-Sales Services
  • WHAT'S NEW
    • Event
    • Latest Updates
    • Special Offers
  • ABOUT
    • About LOGON Software Asia
    • Our Partners
    • Career
    • Partnership with LOGON
      • Join us as our Publishers
      • Join us as our Resellers
      • Join us as our Procurement Managers
Software Asia Limited
  • Solutions
    • Information Security
          • Vulnerability Management
          • Identity and Access Management
          • Security Information and Event Management
          • File Integrity Management
          • Multifactor Authentication
          • Threat Intelligence
          • Network Management Solutions
          • Remote Access Software
          • IT Asset Management
          • IT Service Management
          • Systems Administration Tools
          • Activity Monitoring and Surveillance
          • Content Disarm and Reconstruction
          • Forensic Solutions
          • Data / Password Recovery
          • Data Loss Prevention
    • Software Development
          • Integrated Development Environments
          • Reporting Solutions
          • Testing & QA
          • Database
          • Development Components
            • UI Components
            • Networking Components
            • Communication Components
            • Office Components
            • Barcode Components
          • Text Retrieval / Enterprise Search
          • eLearning Authoring Solutions
          • PDF Solutions
          • Imaging Solutions
          • Software Localization
          • Release Automation & Management
          • Charting Solutions
  • Services
        • Training Services
          Certified Training courses delivered by our trained and experienced specialists that enable your team to learn the skills, tools, and processes needed to become productive, implement best practices and achieve high quality standards.
        • Implementation Services
          We know that your satisfaction is dependent on both the right software and a fast and successful implementation. We accelerate Time-To-Value by delivering high-quality implementations to meet customer priorities and processes.
        • After-Sales Services
          Our relationship with you does not end when we close a sale. It develops from it. Our experienced support team responds promptly to queries, deliver scheduled health checks so you gain maximum benefits from our solutions.
        • Best Practices Consulting
          Our customer success stories prove the successful application of our methods and tools. Our experts rely on tested methods and help organizations in Asia find the answers they need to optimize their cybersecurity posture.
  • What's New
        • Our Events
          Don’t miss out on our upcoming events
        • 26 August 2021
          Local Date: Aug 25 2021 |

          ArcusTeam | Powerful Tips to Prevent Threats from Connected Devices

          Online

          View Detail
          No event found!
        • Latest Updates
          Catch on the latest updates and news of our partners
        • Falcongaze SecureTower 6.5 – better control, stronger protection | Falcongaze
          Falcongaze SecureTower 6.5 – better control, stronger protection | Falcongaze
          Introduction to web cache poisoning | Netsparker
          Introduction to web cache poisoning | Netsparker
          Do you have a web application security program or are you merely testing? | Netsparker
          Do you have a web application security program or are you merely testing? | Netsparker
          Addressing User Access in IT Security Compliance | IS Decisions
          Addressing User Access in IT Security Compliance | IS Decisions
        • Special Offers
          View our special offers on our available solutions and upgrades
        • Upgrade to InstallShield Premier | Get 25% Off the Upgrade Price
          Upgrade to InstallShield Premier | Get 25% Off the Upgrade Price
          InstallShield Pro | Get 50% Off a Standalone Build License
          InstallShield Pro | Get 50% Off a Standalone Build License
  • About
        • About Us
        • Locations
        • [email protected] - We are hiring !
        • Our Partners
        • Partner with LOGON
          • Publishers - Join our network
          • Resellers - Expand your portfolio
          • Procurement Managers
  • SEARCH

Set your main menu in Appearance > Menus

Email Us Service Hotlines: +852 25128491 / +91 7022022744
Software Asia Limited
  • Solutions
    • Information Security
          • Vulnerability Management
          • Identity and Access Management
          • Security Information and Event Management
          • File Integrity Management
          • Multifactor Authentication
          • Threat Intelligence
          • Network Management Solutions
          • Remote Access Software
          • IT Asset Management
          • IT Service Management
          • Systems Administration Tools
          • Activity Monitoring and Surveillance
          • Content Disarm and Reconstruction
          • Forensic Solutions
          • Data / Password Recovery
          • Data Loss Prevention
    • Software Development
          • Integrated Development Environments
          • Reporting Solutions
          • Testing & QA
          • Database
          • Development Components
            • UI Components
            • Networking Components
            • Communication Components
            • Office Components
            • Barcode Components
          • Text Retrieval / Enterprise Search
          • eLearning Authoring Solutions
          • PDF Solutions
          • Imaging Solutions
          • Software Localization
          • Release Automation & Management
          • Charting Solutions
  • Services
        • Training Services
          Certified Training courses delivered by our trained and experienced specialists that enable your team to learn the skills, tools, and processes needed to become productive, implement best practices and achieve high quality standards.
        • Implementation Services
          We know that your satisfaction is dependent on both the right software and a fast and successful implementation. We accelerate Time-To-Value by delivering high-quality implementations to meet customer priorities and processes.
        • After-Sales Services
          Our relationship with you does not end when we close a sale. It develops from it. Our experienced support team responds promptly to queries, deliver scheduled health checks so you gain maximum benefits from our solutions.
        • Best Practices Consulting
          Our customer success stories prove the successful application of our methods and tools. Our experts rely on tested methods and help organizations in Asia find the answers they need to optimize their cybersecurity posture.
  • What's New
        • Our Events
          Don’t miss out on our upcoming events
        • 26 August 2021
          Local Date: Aug 25 2021 |

          ArcusTeam | Powerful Tips to Prevent Threats from Connected Devices

          Online

          View Detail
          No event found!
        • Latest Updates
          Catch on the latest updates and news of our partners
        • Falcongaze SecureTower 6.5 – better control, stronger protection | Falcongaze
          Falcongaze SecureTower 6.5 – better control, stronger protection | Falcongaze
          Introduction to web cache poisoning | Netsparker
          Introduction to web cache poisoning | Netsparker
          Do you have a web application security program or are you merely testing? | Netsparker
          Do you have a web application security program or are you merely testing? | Netsparker
          Addressing User Access in IT Security Compliance | IS Decisions
          Addressing User Access in IT Security Compliance | IS Decisions
        • Special Offers
          View our special offers on our available solutions and upgrades
        • Upgrade to InstallShield Premier | Get 25% Off the Upgrade Price
          Upgrade to InstallShield Premier | Get 25% Off the Upgrade Price
          InstallShield Pro | Get 50% Off a Standalone Build License
          InstallShield Pro | Get 50% Off a Standalone Build License
  • About
        • About Us
        • Locations
        • [email protected] - We are hiring !
        • Our Partners
        • Partner with LOGON
          • Publishers - Join our network
          • Resellers - Expand your portfolio
          • Procurement Managers
  • SEARCH
View large More details
falcongaze-news, news

Falcongaze SecureTower 6.5 – better control, stronger protection | Falcongaze

Posted on at by

was last modified: August 3rd, 2021 by

was last modified: August 3rd, 2021 by
Read More
View large More details
netsparker-news, news

Introduction to web cache poisoning | Netsparker

Posted on at by

was last modified: August 2nd, 2021 by

was last modified: August 2nd, 2021 by
Read More
View large More details
netsparker-news, news

Do you have a web application security program or are you merely testing? | Netsparker

Posted on at by

was last modified: August 2nd, 2021 by

was last modified: August 2nd, 2021 by
Read More
View large More details
Isdecision-news, news

Addressing User Access in IT Security Compliance | IS Decisions

Posted on at by

was last modified: August 2nd, 2021 by

was last modified: August 2nd, 2021 by
Read More
View large More details
netsparker-news, news

Understanding and preventing cross-site scripting vulnerabilities (XSS) | Netsparker

Posted on at by

was last modified: August 2nd, 2021 by

was last modified: August 2nd, 2021 by
Read More
View large More details
jetbrains-update, news

The Truly Hidden Gems of IntelliJ IDEA | JetBrains

Posted on at by

was last modified: July 30th, 2021 by

was last modified: July 30th, 2021 by
Read More
View large More details
fastpass-sspr-news, news

Password Obituary: But is the Humble Password Really Dead? | FastPassCorp

Posted on at by

was last modified: August 3rd, 2021 by

was last modified: August 3rd, 2021 by
Read More
View large More details
Acunetix-news, news

5 reasons why every MSSP needs a professional web application security solution | Acunetix

Posted on at by

was last modified: August 4th, 2021 by

was last modified: August 4th, 2021 by
Read More
View large More details
jetbrains-update, news

Get IntelliJ-based IDEs, Fully Localized in 3 Languages! | JetBrains

Posted on at by

was last modified: July 30th, 2021 by

was last modified: July 30th, 2021 by
Read More
View large More details
fastpass-sspr-news, news

Importance of Password Policy and Password Security Risks | FastPassCorp

Posted on at by

was last modified: August 3rd, 2021 by

was last modified: August 3rd, 2021 by
Read More
View large More details
netsparker-news, news

Understanding session fixation attacks | Netsparker

Posted on at by

was last modified: August 2nd, 2021 by

was last modified: August 2nd, 2021 by
Read More
View large More details
jetbrains-update, news

Don’t Lose Your Work! Stay Safe With DataGrip | JetBrains

Posted on at by

was last modified: July 30th, 2021 by

was last modified: July 30th, 2021 by
Read More
View large More details
netsparker-news, news

Why DAST is the perfect fit for agile software projects | Netsparker

Posted on at by

was last modified: August 2nd, 2021 by

was last modified: August 2nd, 2021 by
Read More
View large More details
arcusteam-news, lansweeper-news, news

Complete End-to-End Management and Security for Connected Devices | ArcusTeam & Lansweeper

Posted on at by

was last modified: July 14th, 2021 by

was last modified: July 14th, 2021 by
Read More
View large More details
arcusteam-news, webinar

Webinar | ArcusTeam | Powerful Tips to Prevent Threats from Connected Devices

Posted on at by

was last modified: July 16th, 2021 by

was last modified: July 16th, 2021 by
Read More
View large More details
lansweeper-news, news

Is Your Business Ready for Windows 11? | Lansweeper

Posted on at by

was last modified: August 2nd, 2021 by

was last modified: August 2nd, 2021 by
Read More
View large More details
fastpass-sspr-news, news

6 Steps Guide: Reduce the risk of data breach in 2020 with Password Self Service | FastPassCorp

Posted on at by

was last modified: July 8th, 2021 by

was last modified: July 8th, 2021 by
Read More
View large More details
news, reflectiz-news

Digital Security in the Travel and Tourism Industry | Reflectiz

Posted on at by

was last modified: August 2nd, 2021 by

was last modified: August 2nd, 2021 by
Read More
View large More details
lansweeper-news, news

How Lansweeper Can Help You Catch Cryptojackers | Lansweeper

Posted on at by

was last modified: August 2nd, 2021 by

was last modified: August 2nd, 2021 by
Read More
View large More details
news, silobreaker-news

Silobreaker wins three Global Infosec Awards

Posted on at by

was last modified: July 30th, 2021 by

was last modified: July 30th, 2021 by
Read More
← Older Posts

COMPANY

Company Overview
Career with LOGON
Contact Us

JOIN US TODAY

Resellers
Software Publishers
Procurement Managers

WE ARE AVAILABLE ON

SAP Ariba   coupa

gem

SERVICES

Training Services
Implemetation Services
After-sales Services
Best Practices Consulting

WHAT'S NEW

Events
Latest Updates
Special Offers

FOLLOW US ON

GET IN TOUCH

Phone:+852 25128491
Email: [email protected]

Legal   |   Privacy Policy

Important Links

  • Call me
  • Legal
  • Privacy Policy

Search engine

Use this form to find things you need on this site
Search
Generic filters
Newsletter
Search

Results for {phrase} ({results_count} of {results_count_total})

Displaying {results_count} results of {results_count_total}

Dont see what you were looking for ? Retry the search with a different phrase ? If unsuccessful, please click here

Generic filters
Exact matches only
Search in title
Search in content
Search in excerpt
Request for Training Quote
  • Please enter a number from 1 to 20.
Request for Training Quote
  • Please enter a number from 1 to 20.
Request for Training Quote
  • Please enter a number from 1 to 20.
Request for Training Quote
  • Please enter a number from 1 to 20.
Request for Training Quote
  • Please enter a number from 1 to 20.
Request for Training Quote
  • Please enter a number from 1 to 20.
Request for Training Quote
  • Please enter a number from 1 to 20.
Request for Training Quote
  • Please enter a number from 1 to 20.
Request for Training Quote
  • Please enter a number from 1 to 20.
Contact Us Today
Book a Demo with us


Book a Demo with us


Free Website Risk Detection Request

    Request a Demo !

      UserLock Video