Navigation
  • About US
    • COMPANY OVERVIEW
    • JOIN US TODAY
      • AS OUR SOFTWARE PUBLISHERS
      • AS OUR PROCUREMENT MANAGERS
      • AS OUR RESELLERS
    • CAREER WITH LOGON
    • CONTACT US
  • Solutions
    • SEARCH BY BRANDS
    • SEARCH BY CATEGORY
      • INFORMATION SECURITY SOLUTIONS
        • Vulnerability Management
        • Multifactor Authentication
        • Threat Intelligence
        • Network Management Solutions
        • Security Information and Event Management
        • Remote Access Software
        • Systems Administration Tools
        • Robotic Process Automation
        • Data Loss Prevention
        • Data / Password Recovery
        • Asset Management Solutions
        • Identity and Access Management
        • Antivirus
        • Activity Monitoring and Surveillance
        • Forensic Solutions
        • Content Disarm and Reconstruction
      • SOFTWARE DEVELOPMENT SOLUTIONS
        • Integrated Development Environments
        • Development Components
          • UI Components
          • Networking Components
          • Office Components
          • Barcode Components
          • Communication
        • Imaging Solutions
        • Software Localization
        • Release Automation & Management
        • eLearning Authoring Solutions
        • Charting Solutions
        • PDF Solutions
        • Reporting Solutions
        • Testing & QA
        • Text Retrieval/Enterprise Search
        • Database
  • Services
    • TRAINING SERVICES
    • IMPLEMENTATION SERVICES
    • AFTER-SALES SERVICES
    • BEST PRACTICES CONSULTING
  • What’s New
    • EVENTS
    • LATEST UPDATES
    • SPECIAL OFFERS
  • Search HERE
Software Asia Limited
MENUMENU
  • About US
    • COMPANY OVERVIEW
    • JOIN US TODAY
      • AS OUR SOFTWARE PUBLISHERS
      • AS OUR PROCUREMENT MANAGERS
      • AS OUR RESELLERS
    • CAREER WITH LOGON
    • CONTACT US
  • Solutions
    • SEARCH BY BRANDS
    • SEARCH BY CATEGORY
      • INFORMATION SECURITY SOLUTIONS
        • Vulnerability Management
        • Multifactor Authentication
        • Threat Intelligence
        • Network Management Solutions
        • Security Information and Event Management
        • Remote Access Software
        • Systems Administration Tools
        • Robotic Process Automation
        • Data Loss Prevention
        • Data / Password Recovery
        • Asset Management Solutions
        • Identity and Access Management
        • Antivirus
        • Activity Monitoring and Surveillance
        • Forensic Solutions
        • Content Disarm and Reconstruction
      • SOFTWARE DEVELOPMENT SOLUTIONS
        • Integrated Development Environments
        • Development Components
          • UI Components
          • Networking Components
          • Office Components
          • Barcode Components
          • Communication
        • Imaging Solutions
        • Software Localization
        • Release Automation & Management
        • eLearning Authoring Solutions
        • Charting Solutions
        • PDF Solutions
        • Reporting Solutions
        • Testing & QA
        • Text Retrieval/Enterprise Search
        • Database
  • Services
    • TRAINING SERVICES
    • IMPLEMENTATION SERVICES
    • AFTER-SALES SERVICES
    • BEST PRACTICES CONSULTING
  • What's New
    • EVENTS
    • LATEST UPDATES
    • SPECIAL OFFERS
  • Search HERE

Set your main menu in Appearance > Menus

Email Us Service Hotline: +852 25128491
Software Asia Limited
MENUMENU
  • About US
    • COMPANY OVERVIEW
    • JOIN US TODAY
      • AS OUR SOFTWARE PUBLISHERS
      • AS OUR PROCUREMENT MANAGERS
      • AS OUR RESELLERS
    • CAREER WITH LOGON
    • CONTACT US
  • Solutions
    • SEARCH BY BRANDS
    • SEARCH BY CATEGORY
      • INFORMATION SECURITY SOLUTIONS
        • Vulnerability Management
        • Multifactor Authentication
        • Threat Intelligence
        • Network Management Solutions
        • Security Information and Event Management
        • Remote Access Software
        • Systems Administration Tools
        • Robotic Process Automation
        • Data Loss Prevention
        • Data / Password Recovery
        • Asset Management Solutions
        • Identity and Access Management
        • Antivirus
        • Activity Monitoring and Surveillance
        • Forensic Solutions
        • Content Disarm and Reconstruction
      • SOFTWARE DEVELOPMENT SOLUTIONS
        • Integrated Development Environments
        • Development Components
          • UI Components
          • Networking Components
          • Office Components
          • Barcode Components
          • Communication
        • Imaging Solutions
        • Software Localization
        • Release Automation & Management
        • eLearning Authoring Solutions
        • Charting Solutions
        • PDF Solutions
        • Reporting Solutions
        • Testing & QA
        • Text Retrieval/Enterprise Search
        • Database
  • Services
    • TRAINING SERVICES
    • IMPLEMENTATION SERVICES
    • AFTER-SALES SERVICES
    • BEST PRACTICES CONSULTING
  • What's New
    • EVENTS
    • LATEST UPDATES
    • SPECIAL OFFERS
  • Search HERE

Is Your Website Hackable?

70% are. Detect and action with Acunetix

Is Your Website Hackable?

70% are. Detect and action with Acunetix

How can we assist you?

I AM AN END USER

Request a PoC

REQUEST POC

Book a Demo with our Consultants

BOOK A DEMO

Request a Quote

QUOTATION

Want us to call you right away ?

BOOK A CALL
I AM A RESELLER

Sign up as a reseller and build a profitable business

SIGN UP

Register your opportunities and enjoy deal protection and additional discounts

REGISTER DEAL

Request PoC on behalf of your customer

REQUEST POC

Book a Demo with our consultants

BOOK A DEMO

Request a Quote

QUOTATION

Want us to call you right away ?

BOOK A CALL

LOGON’s reseller partners in each country can discuss your requirements for penetration testing and web security analysis and recommend best implementation practices and licensing options. Call us today for an interactive demo, free evaluation or PoC.

We are Distributors of Acunetix in Hong Kong,  Macau, India, Nepal flag emoji - country flags Nepal,  Thailand,  Sri Lanka and  Bangladesh.


What Acunetix does

Prevent potential attacks

Manage web and network security

Automate your scanning

Detect SQLi, XSS, and other issues

Integrate with your SDLC


As the first company to build a fully dedicated and fully automated web vulnerability scanner, Acunetix carries unparalleled experience in the field of web security. The Acunetix web vulnerability scanner is recognized as a leading solution for most of the demanding sectors including many fortune 500 companies.


Technology Leader in Automated Web Application Security

Acunetix are the pioneers in automated web application security testing with innovative technologies including:

  • DeepScan Technology

    For crawling of AJAX-heavy client-side Single Page Applications (SPAs).
    Industry’s most advanced SQL Injection and Cross-site Scripting testing – includes advanced detection of DOM-based XSS.

  • AcuSensor Technology

    Combines black box scanning techniques with feedback from its sensors placed inside source code.

5
Yes
detail
detail
list
1
1000000
Name...
/acunetix/

Acunetix

Detail
Sort By:

Categories:

acunetix
Acunetix Premium Image
Acunetix Premium
Details
Acunetix 360 Image
Acunetix 360
Details
acunetix
Acunetix Premium Image
Acunetix Premium
Acunetix tests for SQL Injection, XSS, XXE, SSRF, Host Header Injection and over 4500 other web vulnerabilities, advanced scanning techniques generating the least false positives and simplifies web application security process through it... Read More
Details
Acunetix 360 Image
Acunetix 360
Acunetix 360 is an enterprise-class web vulnerability assessment and web vulnerability management solution.
Details

Resources

DataSheet
Brochure
Acunetix Editions
Acunetix Quick Start Guide
What is a "Target"?
Acunetix Business Logic Recorder
Acunetix Login Sequence Recorder
Technical Presentation
Pre-seeding/ Pre-crawling
Proof of Exploit
Configuring Scanning Options
Scanning a SOAP Web Service for Vulnerabilities
Network Scanning
AcuMonitor Technology
Acusensor IAST Technology
Acunetix Reporting

Sample Reports

PCI DSS Acunetix Report
OWASP Top 10 2017 Acunetix Report
NIST SP800 53 Acunetix Report
Developer Acunetix Report
Affected Items Acunetix Report
Quick Acunetix Report
Executive Summary Acunetix Report
HIPAA Acunetix Report
ISO_27001
Use Cases- Penetration Testing Software
Use Cases- Website Security Scanner
Use Cases- External Vulnerability Scanner
WhitePaper - How to Secure your Website ?
Case Studies - Acunetix has helped many leading companies in securing their websites and web applications. These case studies illustrate the experiences and insights of some of our clients, highlighting how Acunetix has successfully helped them meet their web security needs.
Use Cases- Web Application Security
Use Cases- Vulnerability Management Software
How to prevent Cross-site Scripting 
How to prevent SQL Injection 
How to prevent Reflected XSS
Concerned about WordPress Security? 
Web Service Security – The Technology and its Concerns 
How to prevent SQL Injection (SQLi) ?
How to prevent Directory Traversal Attacks ?
Competitive Analysis - Acunetix vs Qualys
Competitive Analysis - Acunetix vs Nessus

Latest updates

More details
Acunetix-news, Notifications

Customers’ Choice in 2020 Gartner Peer Insights

More details
acunetix-event, webinar

Acunetix Webinar | Web Vulnerability Scanner V13 Solution Walkthrough

More details
Acunetix-news, news

Acunetix now introduces Chinese Language Support in the UI

More details
Acunetix-news, news

Acunetix: Are you safe from your web vulnerabilities?

More details
Acunetix-news, news

Introducing Acunetix Version 13 !

More details
Acunetix-news

Acunetix version 12 (build 12.0.191121158) has been released

More details
acunetix-event

Acunetix Reseller Onboarding Technical Meeting

More details
acunetix-event

Acunetix Reseller Onboarding Sales Meeting

LOGON works with corporate clients and systems integrators by offering Vulnerability Management that offer continuous monitoring, vector analytics and modeling, integration with Software Development Life Cycle, Threat intelligence platforms and deliver Graphical attack modeling and compliance reporting. LOGON offers products from Acunetix, NetSparker, Flexera / Secunia etc. Other security solutions include Veracode, Whitehat, OPSWAT, Tenable, QUALYS, etc.. These solutions offer both Static Analysis (SAST) and Dynamic Analysis (DAST) that help Penetration Testers test Vulnerability Remediation, Cyber Exposure needs and Risk Assessment.

was last modified: January 15th, 2021 by logon

COMPANY

Company Overview
Career with LOGON
Contact Us

JOIN US TODAY

Resellers
Software Publishers
Procurement Managers

WE ARE AVAILABLE ON

SAP Ariba   coupa

gem

SERVICES

Training Services
Implemetation Services
After-sales Services
Best Practices Consulting

WHAT'S NEW

Events
Latest Updates
Special Offers

FOLLOW US ON

GET IN TOUCH

Phone:+91 7022022744 / +9180 49636363
Email: sales@logon-int.com

Search engine

Use this form to find things you need on this site
Search

Results for {phrase} ({results_count} of {results_count_total})

Displaying {results_count} results of {results_count_total}

Dont see what you were looking for ? Retry the search with a different phrase ? If unsuccessful, please click here

Generic filters
Exact matches only
Search in title
Search in content
Search in excerpt
Newsletter
  • QUOTE

  • EVALUATION

  • CONTACT US

Chat with us on Line

Follow us on WeChat

Follow us on Weibo

Get In Touch
Contact Us Today
Book a Demo with us


Book a Demo with us


Free Website Risk Detection Request

Request Quote

* License text

Evaluation Request

Request a Demo !

Search

Results for {phrase} ({results_count} of {results_count_total})

Displaying {results_count} results of {results_count_total}

Dont see what you were looking for ? Retry the search with a different phrase ? If unsuccessful, please click here

Generic filters
Exact matches only
Search in title
Search in content
Search in excerpt
UserLock Video

Get Your Document