Navigation
  • SEARCH HERE
  • SOLUTIONS
    • Information Security Solutions
      • Application Security Solutions
      • Network & Infrastructure Security Solutions
      • Zero Trust Security
      • Security Information and Event Management
      • Remote Monitoring & Management (RMM)
      • File Integrity Management
      • Systems Administration Tools
      • Data Loss Prevention
      • Data / Password Recovery
      • IT Asset Management Solutions
      • Identity and Access Management Solutions
      • Activity Monitoring and Surveillance
      • Digital Forensic Investigation
    • Software Development Solutions
      • Integrated Development Environments
      • Development Components
        • UI Tools
        • Networking Components
        • Office Components
        • Barcode Components
        • Communication Components
      • Imaging Solutions
      • Software Localization
      • Release Automation & Management
      • eLearning Authoring Solutions
      • Charting Solutions
      • PDF Solutions
      • Reporting Solutions
      • Testing & QA
      • Text Retrieval / Enterprise Search
      • Database
  • Services
    • Live Solution Walkthroughs
    • Implementation Services
    • Best Practices Consulting
    • Pre-Sales and Post-Sales Services
  • What's New
    • Our Event
    • Our Blogs
    • Special Offers
  • About
    • About LOGON Software Asia
    • Our Partnership
  • Publishers - Join our network
  • Resellers - Expand your portfolio
  • Procurement Managers
Site logo
  • Solutions
    • Information Security Solutions
          • Identity and Access Management
            • Privileged Access Management (PAM)
            • Multi-Factor Authentication (MFA)
            • Identification Verification (IV)
            • Self-Service Password Reset (SSPR)
          • Network & Infrastructure Security
            • DDoS Mitigation and Protection
            • Digital Forensic Investigation
            • Malware Detection & Analysis
            • Network Management Software
            • Email Security
            • Log Monitoring
          • Endpoint & Device Security
            • Patch Management
            • Remote Monitoring & Management (RMM)
            • Activity Monitoring and Surveillance
          • IT Management
            • IT Asset Management Solutions
            • IT Service Management
            • Systems Administration Tools
          • Application Security
            • Application Security Testing (SAST, DAST, IAST, MAST, SCA)
            • Runtime Application Self-Protection
            • Web Application Firewall
          • Data Security
            • Data / Password Recovery
            • File Integrity Management
            • Data Loss Prevention
          • Cloud Security
            • Cloud Security Posture Management
            • Cloud Work Protection
          • External Attack Surface Management
            • Cyber Threat Intelligence
            • Third Party Risk Management
          • Security Operations & Incident Management
            • Security Information and Event Management
            • Security Orchestration, Automation and Response (SOAR)
          • Zero Trust Security
    • Software Development Solutions
      • Integrated Development Environments
      • Imaging Solutions
      • UI Tools
      • Charting Solutions
      • Developer Tools
      • Database
      • Networking Components
      • Office Components
      • Barcode Components
      • Release Automation & Management
      • Software Localization
      • Communication Components
      • Automated Testing
      • eLearning Authoring Solutions
      • Reporting Solutions
      • Text Retrieval / Enterprise Search
      • Testing & QA
  • Services
        • Live Walkthrough Sessions

          Experience the full feature of our key solutions through live platform

          View All Sessions >
        • Implementation Services
        • Pre-Sales and Post-Sales Services
        • Best Practices Consulting
  • Partners
    • Our Partners
    • Partner with LOGON Today!
      • Vendors - Join Our Network
      • Resellers - Expand Your Portfolio
      • Procurement Managers
  • Resources
        • ABOUT US

        • About Us
        • Our Locations
        • Careers@LOGON - We are hiring !
        • DISCOVER

        • Our BlogsNEW BLOGS
        • Our EventsJOIN UPCOMING EVENTS
        • LOGON to CyberSecurity PodcastNEW EPISODES
        • GET HELP

        • Contact Us
        • Help Desk
        • Request a Demo
        • Request a Quote
  • More results...

Your Cyber Security Partner in Asia

Empowering all vertical industries in Asia since 1993, LOGON provides software products, technical support, consulting and training service for our customers

Contact Us Today

At the front line of your business security

We serve customers in multiple vertical industries in Asia by delivering the best software solutions, technical support, consulting and training services.

0
+
Years
0
+
International Offices
0
+
Customers
0
+
Resellers
0
+
Languages

Our Leading Solutions

We proudly partner with market leaders, providing the best solution for your requirements and budget.

biometric-access

Identity & Access Management

internet-security

Network & Infrastructure Security

endpoint-protection

Endpoint & Device Security

asset

IT Management

program

Application Security

server

Data Security

protection

Cloud Security

cyber-attack

External Attack Surface Management

zero trust security icon

Zero Trust Security

security

Security Operations & Incident Management

View Our Key Partners

Trusted by 1,000+ organizations

Stay updated with the latest cyber trends

Review on Darknet Diaries Ep10: A Use Case for IT Asset Management in Government Cybersecurity
Blog IT Management Blog Lansweeper Blog LOGON Blog

Review on Darknet Diaries Ep10: A Use Case for IT Asset Management in Government Cybersecurity

Maximize your Cybersecurity ROI: Strategies for Smart Risk Prioritization
Blog EASM Blog LOGON Blog

Maximize your Cybersecurity ROI: Strategies for Smart Risk Prioritization

Integrate AI into Application Security Testing: Best Practices for Continuous Security
Application Security Blog Artificial Intelligence Blog LOGON Blog

Integrate AI into Application Security Testing: Best Practices for Continuous Security

When Visibility Ends, Risk Begins: How A Bank Took Control of Its Digital Footprint with EASM
Blog EASM Blog LOGON Blog

When Visibility Ends, Risk Begins: How A Bank Took Control of Its Digital Footprint with EASM

Accelerating Patch Management: The 48-Hour Rule and NIST Guidelines
Blog Endpoint Security Blog LOGON Blog Patch Management Blog

Accelerating Patch Management: The 48-Hour Rule and NIST Guidelines

Navigating Hong Kong’s New Cybersecurity Law (CI Bill): What to Do Next
Application Security Blog Blog LOGON Blog SaaS Procurement and Management Blog Software License Management Blog

Navigating Hong Kong’s New Cybersecurity Law (CI Bill): What to Do Next

“Banana Bait” – Click the Links, Fall for Scams: How Hong Kong is Battling Cyber Scams with Smart Identity and Access Management
Blog Identity and Access Management Blog LOGON Blog

“Banana Bait” – Click the Links, Fall for Scams: How Hong Kong is Battling Cyber Scams with Smart Identity and Access Management

ConvoC2: A Red Teamer’s Tool to Exploit Microsoft Teams for Remote Command Execution
Blog Endpoint Security Blog LOGON Blog

ConvoC2: A Red Teamer’s Tool to Exploit Microsoft Teams for Remote Command Execution

The New Fileless Remcos RAT Malware
Blog Identity and Access Management Blog LOGON Blog Phishing Attack Ransomware Zero Trust Security Blog

The New Fileless Remcos RAT Malware

Over 470,000 Personal Data at risk: Data Breach at Oxfam Local Hong Kong
Data Security Blog LOGON Blog Ransomware Security Compliance Threat Intelligence.

Over 470,000 Personal Data at risk: Data Breach at Oxfam Local Hong Kong

Hong Kong Hospital Cyber Attack 2024: Lessons Learned and Steps Forward
LOGON Blog Ransomware

Hong Kong Hospital Cyber Attack 2024: Lessons Learned and Steps Forward

2023 Rewind: What to Expect for Cyber Security in 2024?
Artificial Intelligence LOGON Blog Security Compliance Third-Party Risk Threat Intelligence. Zero Trust Security Blog

2023 Rewind: What to Expect for Cyber Security in 2024?

Security in Cloud Environment
Cloud Security Blog LOGON Blog Security Compliance

Security in Cloud Environment

AI and its impact on Cybersecurity
Artificial Intelligence Cloud Security Blog LOGON Blog Security Compliance

AI and its impact on Cybersecurity

Top Crypto-Focused Malware Unveiled Amid Escalating Cyber Threats
LOGON Blog Ransomware Threat Intelligence.

Top Crypto-Focused Malware Unveiled Amid Escalating Cyber Threats

MOVEit Cyber Attack: cl0p Ransomware Gang Strikes Again
LOGON Blog Ransomware Threat Intelligence.

MOVEit Cyber Attack: cl0p Ransomware Gang Strikes Again

Unpacking the Cyber Threat Landscape in APAC: Insights from the Threat Intelligence Index
Blog LOGON Blog Threat Intelligence.

Unpacking the Cyber Threat Landscape in APAC: Insights from the Threat Intelligence Index

Why You Shouldn’t Overlook Identifying Exploitable Vulnerabilities in your Attack Surface
Attack Surface Data Loss Prevention LOGON Blog Third-Party Risk

Why You Shouldn’t Overlook Identifying Exploitable Vulnerabilities in your Attack Surface

The Growing Influence of ChatGPT
LOGON Blog Zero Trust Security Blog

The Growing Influence of ChatGPT

Companies in Asia need to take Ransomware More Seriously
EASM Blog LOGON Blog Ransomware

Companies in Asia need to take Ransomware More Seriously

Upcoming events & workshops

Privacy Policy Company Overview

COMPANY

Our Location Career with LOGON Our Partners

SERVICES

Training Services Implementation Services Pre-Sales and Post-Sales Services Best Practices Consulting

GET IN TOUCH

Phone:
Hong Kong: +852 2512 8491
India: +91 70220 22744 / +91 63668 26133
Email: [email protected] ©2024 LOGON International Ltd. All rights reserved
logon logo WHITE

Search engine

Use this form to find things you need on this site

More results...

Fill in the form below
  • This field is hidden when viewing the form
  • This field is hidden when viewing the form
  • This field is for validation purposes and should be left unchanged.

Watch On-demand Webinar

  • This field is for validation purposes and should be left unchanged.
Request for Training Quote
  • Please enter a number from 1 to 20.
  • This field is hidden when viewing the form
  • This field is for validation purposes and should be left unchanged.
Request for Training Quote
  • Please enter a number from 1 to 20.
  • DD slash MM slash YYYY
  • This field is for validation purposes and should be left unchanged.
Request for Training Quote
  • Please enter a number from 1 to 20.
  • DD slash MM slash YYYY
  • This field is for validation purposes and should be left unchanged.
Request for Training Quote
  • Please enter a number from 1 to 20.
  • DD slash MM slash YYYY
Request for Training Quote
  • Please enter a number from 1 to 20.
  • This field is hidden when viewing the form
  • This field is for validation purposes and should be left unchanged.
Request for Training Quote
  • Please enter a number from 1 to 20.
  • This field is hidden when viewing the form
  • This field is for validation purposes and should be left unchanged.
Request for Training Quote

Oops! We could not locate your form.

Request for Training Quote

Oops! We could not locate your form.

Get Your Free Trial
  • This field is hidden when viewing the form
  • This field is hidden when viewing the form
  • This field is for validation purposes and should be left unchanged.
Get Your Free Trial

Oops! We could not locate your form.

Book a Free Demo Today

Start PreCrime Network for Free

Oops! We could not locate your form.

Watch On-demand Webinar

  • This field is for validation purposes and should be left unchanged.

Request Quote for Lansweeper

Oops! We could not locate your form.

Partner with Us on the next episode

  • This field is for validation purposes and should be left unchanged.

Recommend a Topic

  • This field is for validation purposes and should be left unchanged.

Get Your Free UserLock Trial

  • This field is for validation purposes and should be left unchanged.

Download Your Free Trial 10-Day Trial Today

  • Downloading and evaluating Smart Package Studio is quick and easy
  • Includes a short introductory guide that suggests smart features to try
  • Access the full functionality of Smart Package Studio during the trial
  • This field is for validation purposes and should be left unchanged.

Get Free Assessment of your Web Asset

Request a free non-intrusive security assessment of your website. Get a report with an overview of client-side security risks.

  • This field is hidden when viewing the form
  • This field is for validation purposes and should be left unchanged.

Request for Priority Support with our support team

  • Drop files here or
    Max. file size: 30 MB.
    • This field is for validation purposes and should be left unchanged.
    Request for Training Quote

    Oops! We could not locate your form.