








IS Decisions products make it easy to manage and secure your Microsoft Windows and Active Directory Infrastructure.


At the front line of your business security
We serve customers in multiple vertical industries in Asia by delivering the best software solutions, technical support, consulting and training services.






















Our Key Solutions & Services
Discover leading cybersecurity solutions for your organization to help identify and reduce risks.
Secure your web and mobile applications and your network Infrastructure with
Vulnerability Management Solutions
We implement state of the art solutions that scan your applications, glean critical data from across your environment, monitor for malicious behavior, investigate and shut down attacks, and automate IT security operations.
Control your IT Environment with
Asset Management Solutions
We help implement your IT Asset Management solution that will help save your IT budget, utilize your current IT assets to their fullest potential, powerful reporting to assist with strategic planning, and ensure compliance with corporate, contractual, and regulatory requirements
Improve your security in an increasingly cloud-oriented world with
Zero Trust Security Solutions
We help customers reduce your organization’s attack surface and prevent lateral attacks by making unauthorized resources unreachable or even invisible.
Protect your Business Data with
Data Loss Prevention
A good DLP solution is very effective for preventing accidental disclosures and ending bad business processes around the use of sensitive data. We help you find the best DLP solution that meets your requirements and supports all your OS environments.
Detect and Prioritise Threats with
Threat Intelligence Solutions
We offer solutions and services that help automate the threat investigation process and delivers actionable intelligence so that you can focus only on the most relevant threats to your organization.
Stay updated with the latest cyber trend
Gain insights from news, blogs and press releases from global leading publishers
What is the potential of artificial intelligence to improve cybersecurity posture? | Bfore.AI
Top 5 Most Common API Vulnerabilities You Should Know About | Reflectiz
The SolarWinds Supply Chain Attack: Implementing a Layered Security Approach | Reflectiz
[SCAM ALERT 035] -AmericaFirst | Bfore.AI
Managing cyber risks related to remote working | Bfore.AI
Zecurion Webinar | The Next Generation DLP: know more, risk less
3 ways to stimulate and reinvent effective risk management in the face of uncertainty | Bfore.AI
InstallShield 2022 Now Available!
Crisis management is at the heart of ransomware resilience | Bfore.AI
What is Remote Code Execution (RCE)? | Lansweeper
How to limit the risks related to cyber attacks on the supply chain? | Bfore.AI
“Zero Trust” and “Cybersecurity Mesh” : the enemy can be anywhere | Bfore.AI
The evolution of the concept of “Defense in Depth” in the age of the cloud and digitalization | Bfore.AI
What is a Zero-day Vulnerability? | Lansweeper
What’s next for AI? | Bfore.AI
AI defense against today’s cyber threats | Bfore.AI
Simplify MFA & Session Management With the New, Intuitive UserLock Web App | IS Decisions
Expanding enterprise attack surface | Bfore.AI
AdminStudio 2022 is Here! | Flexera
Lansweeper’s 2022 Spring Launch: ‘Aymon’
The Essential Guide to Preventing JavaScript Injection | Reflectiz
A Step-by-step Guide to Preventing Formjacking Attacks | Reflectiz
How to protect the network from insider threats | Emsisoft
Stop Crypto Kleptos in Their Tracks | DomainTools
Zecurion Partners with LOGON Software to Provide Insider Threat Prevention for Organizations in Hong Kong, India, Malaysia, Singapore and Thailand
PCI-DSS Got an Update – What Does Version 4.0 Mean for Your Compliance Requirements? | Reflectiz
A Closer Look at Identity and Access Management in 2022 | Devolutions
DevSecOps: How to get there from DevOps | Acunetix
Burp Scanner can now crawl static sites between 6x – 9x faster | PortSwigger
Why WAF and Firewall Solutions Will Not Help Against Third-Party Website Attacks | Reflectiz
SPM55: Ascending the Ranks of Indonesian Phishing As A Service Offerings | DomainTools
New in 2022.4: Endpoint Detection and Response Beta with deep threat insights | Emsisoft
Cyber-Attacks, Vulnerabilities and How Patch Management Can Help You | Faronics
8 Best Content Security Policies for 2022 | Reflectiz
7 web application security best practices | Acunetix
6 Reasons an Agent is Crucial for Your Cyber Security Defense | Holm Security
New in 2022.2: Improved user experience | Emsisoft
Reflectiz Version 4.3.1 is now live
HaloITSM awarded with 6 badges for G2 Spring 2022
Input validation errors: The root of all evil in web application security | Invicti
Stimulsoft Reports and Dashboards. New version 2022.2 released
Ways to protect the password before the user receives their first password | FastPassCorp
Meet Salesforce MFA Requirements via SSO With Active Directory Identities | IS Decisions
Remote Desktop Manager Now Complies with FIPS 140-2 Annex A Approved Encryption Functions | Devolutions
How to ensure REST API security | Invicti
Master Your Data Lifecycle to Improve Data Security | IS Decisions
3-Month Full License of PreCrime Network | Bfore.AI
DAST, IAST, SCA: Deeper coverage in a single scan | Invicti
Back At Home? Top Tips For Remote Endpoint Management | Faronics
Secure SSO for Cloud Access Using Existing On-Premise Active Directory Identities | IS Decisions
What’s New for UserLock 11 | IS Decisions
Apple Mobile Devices and iOS Acquisition Methods | Elcomsoft
How to use Azure AD single sign-on to log in to PRTG | Paessler
How to avoid API blind spots in web application security testing | Netsparker
What is server-side request forgery (SSRF)? | Acunetix
PRTG v. 22.1.74 comes with 3 beta sensors and security improvements | Paessler
Invicti Webinar | เพิ่มความปลอดภัยบน Web Applications สำหรับบริษัทที่ให้บริการธุรกรรมทางการเงินได้ง่ายๆ ด้วย Invicti
New in 2022.2: Improved user experience | Emsisoft
Why Monitoring Your Network Monitor is the Fail-Safe You Didn’t Know You Need | Nagios
What Makes A Good IT Ticket Management System? | Faronics
FastPass IVM certified for ServiceNow Store
Is the reactiveness of your security system enough? | Bfore.AI
Agent-based full file system and keychain extraction: now up to iOS 14.8 | Elcomsoft
Y2K22 Exchange Bug Cripples Emails | Lansweeper
December 2021 update for Netsparker Standard 6.3
New in 2022.1: Improved user interfaces on desktop and in web app | Emsisoft
Infiltrating Internal Networks with Log4Shell | Reflectiz
This is How You Can Spot Fake Domains | Bfore.AI
Why Using SMS Authentication for 2FA Is Not Secure | IS Decisions
Gartner Report Takes a New Look At Vulnerability Management | ArcusTeam
The Log4J Vulnerability in Bing Domain | Reflectiz
December Major Update of ImmuniWeb Discovery
Flexible working is here to stay | RealVNC
Scanning for the Log4J In Your Digital Vendors | Reflectiz
New version of FastReport Mono 2022.1 | Fast Reports
New version of FastReport .NET 2022.1 | Fast Reports
PRTG v. 21.4.73 comes with a new user interface, API and a new probe | Paessler
How to get monitoring data from REST interfaces | Paessler
Real-Time Surveillance via Apple iCloud | Elcomsoft
Building a secure SDLC for web applications | Netsparker
Active Scanning: Detailed Asset Data in Seconds | Lansweeper
What is website security – how to protect your website from hacking | Acunetix
The secret to getting results, not noise, from your DAST solution | Netsparker
How can remote access save the day for healthcare IT professionals? | RealVNC
The CDNjs’ Remote Control Execution | Reflectiz
How to Assure The Security of Cloud Technologies | Falcongaze
СyberSecurity and the Healthcare | Falcongaze
[New Release] Devolutions Server 2021.2 Is Now Available! | Devolutions
How much of your channel process can you really “get away with” automating? | Channelyze
[New Release] Password Hub Business 2021.2 Is Now Available! | Devolutions
Robinhood data breach – What was leaked? | FastPassCorp
Vital Tips to Help You Create a Secure React Web Application | GrapeCity
Netsparker adds IAST support for Node.js | Netsparker
How to use screen recording in VNC Connect | RealVNC
Live Webinar | Know your Devices Security Posture with Lansweeper & ArcusTeam
Onboarding your first distributor – A recipe for success | Channelyze
5 Ways Organizations can Reduce IT Costs through ITAM 2.0 | Lansweeper
[New Release] Remote Desktop Manager 2021.2 | Devolutions
Invicti Webinar | How to prevent a Hacker Attack on your website
Invicti Webinar | What is IAST and How does it work?
How Cyber Attacks Pose a Greater Threat After Pandemic | Bfore.AI
The Five Ways to Recover iPhone Deleted Data | Elcomsoft
The Top 6 Worst Tech Nightmares Haunting IT Pros | Lansweeper
What is continuous web application security? | Acunetix
Monitoring Modbus in industrial environments | Paessler
The First Step to Making Cloud Computing More Cost-Effective | Lansweeper
The secret world of the hidden channels – A market worth attempting? | Channelyze
Cybersecurity Month: 6 Ways to Avoid Phishing | TSFactory
iCloud Extractions Without Passwords and Tokens: When a Trusted Device is Enough | Elcomsoft
Why You Need a Digital Inventory | Reflectiz
The mysterious art of channel marketing | Channelyze
Invicti Commercial Sales Promotions | Technology Alliance Attachment Promotion
Invicti Commercial Sales Promotions | Additional Months Promotion
Acunetix Webinar Recording | Find and Fix your Vulnerabilities with Acunetix
Stop the Frustration and Risk of Unchecked Access to Files and Folders | IS Decisions
VNC Connect | Helping doctors improve patient care in difficult times
Prepare Your Online Store for the Holidays | Reflectiz
Why Passwords Haven’t Disappeared Yet & What Organizations Should Do About It | Devolutions
Take Control of Your Data Security and SIEM Systems | Nagios
Here’s a New Free Tool to Discover Unprotected Cloud Storage Instances | ImmuniWeb
The Top React Chart Library You Need To Know In 2021 | FusionCharts
Build Your Next Software Installation in the Cloud | Revenera
Work From Home Challenges for IT Support Service Desk | FastPass
How to Get the Most Out of Your Investment Analytics | FusionCharts
Remote Working & GDPR | TSFactory
Great Ways RealVNC can help IT professionals in education
LEAD Technologies Celebrates the Release of LEADTOOLS Version 22
ImmuniWeb Named to 2021 AIFinTech100 List
Silobreaker presented with Frost & Sullivan’s 2021 Best Practices Enabling Technology Leadership Award in the global threat intelligence market
The future of education: Shifting to e-learning | RealVNC
What is HTTP header injection? | Acunetix
Hybrid Cloud Storage Protection for MSPs | IS Decisions
The pitfalls of DIY application security | Netsparker
Why integrating secure remote access into your product is essential | RealVNC
New Updates on ImmuniWeb Discovery 2021
InstallShield 2021 Now Released
Integrating Acunetix with GitLab for CI/CD
Webinar | New Release of InstallShield® 2021 Deep Dive
Reflectiz Officially Receives ISO 27001 Certification
The iPhone Upgrade: How to Back Up and Restore iOS Devices Without Losing Data
Does Your Organization Have a Strategy for Employee Departures?
What does End of Life mean for your Windows Server? | SeattleLab
[Use Case] How Organizations Can Use Devolutions Web Login to Autofill Website Credentials
What to look for in a DAST solution | Netsparker
What is a digital nomad and how can VNC technology help?
How to use VNC to remotely control a PC from your iPhone
AdminStudio Online Workshop No.1 | Power User Habits – Package Quality
Serious about web application security? Look both ways as you shift left
Falcongaze SecureTower 6.5 – better control, stronger protection | Falcongaze
Introduction to web cache poisoning | Netsparker
Do you have a web application security program or are you merely testing? | Netsparker
Addressing User Access in IT Security Compliance | IS Decisions
Understanding and preventing cross-site scripting vulnerabilities (XSS) | Netsparker
Password Obituary: But is the Humble Password Really Dead? | FastPassCorp
5 reasons why every MSSP needs a professional web application security solution | Acunetix
Importance of Password Policy and Password Security Risks | FastPassCorp
Understanding session fixation attacks | Netsparker
Why DAST is the perfect fit for agile software projects | Netsparker
Complete End-to-End Management and Security for Connected Devices | ArcusTeam & Lansweeper
ArcusTeam Webinar | Powerful Tips to Prevent Threats from Connected Devices
Is Your Business Ready for Windows 11? | Lansweeper
6 Steps Guide: Reduce the risk of data breach in 2020 with Password Self Service | FastPassCorp
Digital Security in the Travel and Tourism Industry | Reflectiz
How Lansweeper Can Help You Catch Cryptojackers | Lansweeper
Introducing DOM Invader: DOM XSS just got a whole lot easier to find | Portswigger
Silobreaker wins three Global Infosec Awards
What is SCA and why you need it | Acunetix
Are You Sitting on an Enterprise Device Security Time Bomb? | ArcusTeam
Webinar Recording Request | Reflectiz | The Next Gen Digital Security for Websites
Why your VPN connections need two-factor authentication | IS Decisions
VNC vs RDP: which remote desktop tool is the best? | RealVNC
Why SSPR fails and what to do about it | FastPassCorp
DDoS-attack: what is it and how to prevent it | Falcongaze
India Privacy and Data Protection Bill | Reflectiz
What is Vulnerability Management and Why Does Your Enterprise Need It? | ArcusTeam
Protecting Active Directory logins for remote working | IS Decisions
Security risks working from home | Holm Security
Spam: what kinds of it are there and how to understand that it is fraudulent? | Falcongaze
How Remote Access can support more flexibility for Law Firms | RealVNC
Top 5 Connected Device Security Challenges that CISOs are Facing | ArcusTeam
Why SMBs believe their data is unsafe in the cloud | IS Decisions
New Feature: An Advanced Tool for Domain Security for your Website | Reflectiz
How to Search Billions of Logs Without learning New Script Language With SureLog SIEM?
Device Vulnerability and Threat Management Solutions | ArcusTeam
Zero-Day Vulnerability Exploits 101: A Glossary | ArcusTeam
What is Vishing? | FastPassCorp
How to Avoid Weak Passwords in Active Directory | FastPassCorp
Your CMDB Is a Valuable Tool – but Only If You Can Trust It | Lansweeper
Cyber Security Challenges in the Medical Field | Holm Security
Invicti recognized on the 2021 Gartner Magic Quadrant for Application Security Testing | Acunetix
Understanding the “After Ransomware” helps MSPs protect against it | IS Decisions
Preventing Malvertising in your Organization | Lansweeper
5 Major Benefits of Early Security Testing | Acunetix
4 fantastic remote access business benefits you should know about | RealVNC
How to avoid web supply chain attacks | Acunetix
ImmuniWeb® AI Platform Major Update Q2 2021
All You Need to Know About Web Skimming Attacks | Reflectiz
Benefits of Web Asset Discovery | Acunetix
How to Spot and Stop Malware | ANET
Reflectiz Webinar | The Next Gen Digital Security for Websites
Reflectiz | Top 2020 Cybersecurity Events: Key Takeaways for 2021
Diagnose, Prevent and Fix Hardware Failure | Lansweeper
Why Intrusion Testing? | Holm Security
Reflectiz Wins Prestigious Cyber Defense Magazine Awards
Ad-hoc scanning is not enough | Acunetix
How to control your employees? | Falcongaze
Working from Home: Tips to Secure Your Remote Workforce | Lansweeper
5 Steps to Successful Vulnerability Management | Holm Security
Why Security Monitoring? | Holm Security
ImmuniWeb 5 Common Web Security Mistakes That Cost Millions
AdminStudio 2021 Now Released!
How ITAM 2.0 Enables Big Opportunities For IT Cost Optimization | Lansweeper
How to use FastCube .NET in Vue SPA application | Fast Reports
SSL/TLS-certificate: what is it, how does it work, and how to learn if a web-site has it? | Falcongaze
Simplified cloud deployment for Burp Suite Enterprise Edition | Portswigger
Keeping your Remote Workers (digitally) Secure | RealVNC
Simplified cloud deployment for Burp Suite Enterprise Edition | Portswigger
How remote desktop helps schools deliver outstanding online education | RealVNC
How to Set Up a Remote Working Policy | RealVNC
InstallAnywhere 2021 Now Released
8 Remote Working Tips | RealVNC
Who to entrust your e-mails with: security measures of popular e-mail services | Falcongaze
API Scanning with Burp Suite | Portswigger
7 Burp Suite Professional-exclusive features to help you test smarter | Portswigger
How to learn more about an employee using DLP-system? | Falcongaze
How to programmatically set the default email client settings for sending emails from FastReport.NET
Detecting Unusual Activities Using SureLog Next Generation SIEM | ANET
InstallShield Module 8 | Building and Managing Multiple Operating System Targeted Product Installers
Reflectiz | Content Security Policy (CSP): Not Exactly a Magecart Vaccine
InstallShield 2020 R3 Now Available
Webinar | Automate Application Readiness with AdminStudio
InstallShield, InstallAnywhere, and AdminStudio Certified Training and Best Practices Consulting available to customers in Asia, through partnership between TLUX Technologies and LOGON Software Asia
Sign up for the 30-day Free Trial for Deep Freeze | Enforcing Social Distancing in Labs with Deep Freeze
Customers’ Choice in 2020 Gartner Peer Insights
Flexera | Application Packaging Experts Roundtable
Reflectiz | How to Keep Your e-Commerce Website Safe Before Cyber-Monday and Black-Friday
Silobreaker | Using Unstructured Data to stay ahead of Emerging Threats
Reflectiz | The Coronavirus Impacts on Cybersecurity
Lansweeper | IT Discovery: A Critical First Step in IT Security
New Releases of SLNet now live – Version 6.2/6.3
Announcing a New Partnership with our Third-Party Application Security Vendor Reflectiz
[Webinar] Application Management in a Virtualized World
Why SureLog is the Right SIEM Solution for you
Reflectiz | The Gocgle Malicious Campaign
Reflectiz Version 2.8 live now
InstallShield 2020 R2 Now Available
Acunetix now introduces Chinese Language Support in the UI
Anet Webinar | Detecting external and internal threats to your organization with SureLog SIEM and be compliant with regulations
Protected: Deal Registration
ISDecisions Webinar | Stop cyber-attacks with Multi-Factor Authentication
Reflectiz | The Hidden Risks of Third-Party Apps on Websites
Webinar: D-Biz Programme for Cyber Security
Webinar: InstallShield 2020 R1 Release Highlights
Introducing Installshield 2020 !
Acunetix | Are you safe from your web vulnerabilities?
Introducing Acunetix Version 13 !
How does system restore software work?
Acunetix version 12 is now released!
InstallAnywhere 2020 now Available !
Flexera Launches Package Feed Module for AdminStudio
New version of FastReport .Net 2019.3 hot from the oven.
What’s new in FileAudit 6 ? Now monitor files on the Cloud !
Announcing InstallShield 2019 !
Start protecting your business with us today
Our support team is excited to help you with your security needs. Book a free consultation session today with our specialist.
