Navigation

Set your main menu in Appearance > Menus

Software Asia Limited
MENUMENU
  • ABOUT US
    • COMPANY OVERVIEW
    • OUR PARTNERS
    • JOIN US TODAY
      • AS OUR SOFTWARE PUBLISHERS
      • AS OUR PROCUREMENT MANAGERS
      • AS OUR RESELLERS
    • CAREER WITH LOGON
    • CONTACT US
  • INFORMATION SECURITY
    • Vulnerability Management
    • Multifactor Authentication
    • Threat Intelligence
    • Network Management Solutions
    • Security Information and Event Management
    • Remote Access Software
    • Systems Administration Tools
    • Robotic Process Automation
    • Data Loss Prevention
    • Data / Password Recovery
    • Asset Management Solutions
    • Identity and Access Management
    • Antivirus
    • Activity Monitoring and Surveillance
    • Forensic Solutions
    • Content Disarm and Reconstruction
  • SOFTWARE DEVELOPMENT
    • Integrated Development Environments
    • Development Components
      • UI Components
      • Networking Components
      • Office Components
      • Barcode Components
      • Communication
    • Imaging Solutions
    • Software Localization
    • Release Automation & Management
    • eLearning Authoring Solutions
    • Charting Solutions
    • PDF Solutions
    • Reporting Solutions
    • Testing & QA
    • Text Retrieval/Enterprise Search
    • Database
  • Services
    • TRAINING SERVICES
    • IMPLEMENTATION SERVICES
    • AFTER-SALES SERVICES
    • BEST PRACTICES CONSULTING
  • WHAT'S NEW
    • EVENTS
    • LATEST UPDATES
    • SPECIAL OFFERS
  • SEARCH

Set your main menu in Appearance > Menus

Email Us Service Hotline: +852 25128491
Software Asia Limited
MENUMENU
  • ABOUT US
    • COMPANY OVERVIEW
    • OUR PARTNERS
    • JOIN US TODAY
      • AS OUR SOFTWARE PUBLISHERS
      • AS OUR PROCUREMENT MANAGERS
      • AS OUR RESELLERS
    • CAREER WITH LOGON
    • CONTACT US
  • INFORMATION SECURITY
    • Vulnerability Management
    • Multifactor Authentication
    • Threat Intelligence
    • Network Management Solutions
    • Security Information and Event Management
    • Remote Access Software
    • Systems Administration Tools
    • Robotic Process Automation
    • Data Loss Prevention
    • Data / Password Recovery
    • Asset Management Solutions
    • Identity and Access Management
    • Antivirus
    • Activity Monitoring and Surveillance
    • Forensic Solutions
    • Content Disarm and Reconstruction
  • SOFTWARE DEVELOPMENT
    • Integrated Development Environments
    • Development Components
      • UI Components
      • Networking Components
      • Office Components
      • Barcode Components
      • Communication
    • Imaging Solutions
    • Software Localization
    • Release Automation & Management
    • eLearning Authoring Solutions
    • Charting Solutions
    • PDF Solutions
    • Reporting Solutions
    • Testing & QA
    • Text Retrieval/Enterprise Search
    • Database
  • Services
    • TRAINING SERVICES
    • IMPLEMENTATION SERVICES
    • AFTER-SALES SERVICES
    • BEST PRACTICES CONSULTING
  • WHAT'S NEW
    • EVENTS
    • LATEST UPDATES
    • SPECIAL OFFERS
  • SEARCH
View large
Acunetix-news, Notifications

Customers’ Choice in 2020 Gartner Peer Insights

Posted on at by

Acunetix is Customers’ Choice in 2020 Gartner Peer Insights

‘Voice of the Customer’: Application Security Testing

Learn why Acunetix received 99% in Willingness to recommend based on 57 reviews

See the Full Report


    LOGON is the Distributor of Acunetix in  Hong Kong,   Macau, India, Nepal flag emoji - country flags Nepal,   Thailand,   Sri Lanka and   Bangladesh.

    October 2020 Gartner Peer Insights Customers’ Choice

    Rated highest in Product Capabilities with 4.9/5 rating
    Received recognition in Midsize Enterprise, Services Industry and regionally in APAC
    Rated highest in Integration and Deployment with 4.8/5 rating
    One of the top 3 vendors with an overall rating of 4.8/5 based on 57 reviews as of 31 July 2020

    Fix Fast

    Get immediately actionable results with validation checks that confirm which vulnerabilities are real and not false positives.

    Prevent Vulnerabilities

    Schedule fast or deep scans according to your needs and immediately scan new builds, so you can catch issues before they end up in production.

    Book a Demo with our Consultants today

    Request Demo
    was last modified: November 4th, 2020 by
    Share Post
    Previous
    Flexera | Application Packaging Experts Roundtable
    Next
    Sign up for the 30-day Free Trial for Deep Freeze | Enforcing Social Distancing in Labs with Deep Freeze

    About Author

    COMPANY

    Company Overview
    Career with LOGON
    Contact Us

    JOIN US TODAY

    Resellers
    Software Publishers
    Procurement Managers

    WE ARE AVAILABLE ON

    SAP Ariba   coupa

    gem

    SERVICES

    Training Services
    Implemetation Services
    After-sales Services
    Best Practices Consulting

    WHAT'S NEW

    Events
    Latest Updates
    Special Offers

    FOLLOW US ON

    GET IN TOUCH

    Phone:+852 25128491
    Email: sales@logon-int.com

    Legal   |   Privacy Policy

    Important Links

    • Call me
    • Legal
    • Privacy Policy

    Search engine

    Use this form to find things you need on this site
    Search

    Results for {phrase} ({results_count} of {results_count_total})

    Displaying {results_count} results of {results_count_total}

    Dont see what you were looking for ? Retry the search with a different phrase ? If unsuccessful, please click here

    Generic filters
    Exact matches only
    Search in title
    Search in content
    Search in excerpt
    Newsletter
    Contact Us Today
    Book a Demo with us


    Book a Demo with us


    Free Website Risk Detection Request

      Request a Demo !

        Search

        Results for {phrase} ({results_count} of {results_count_total})

        Displaying {results_count} results of {results_count_total}

        Dont see what you were looking for ? Retry the search with a different phrase ? If unsuccessful, please click here

        Generic filters
        Exact matches only
        Search in title
        Search in content
        Search in excerpt
        UserLock Video