Find weaknesses where you are the most vulnerable
Automated and continuous scanning of web applications detects vulnerabilities related to bad code, misconfigured systems, weak passwords, and exposed system information and personal data.
Automatic & continuous
Just in a month there are thousands of new known vulnerabilities. Scheduled and continuous scans find new vulnerabilities fast.
Systematic & proactive
Our platform provides a great foundation for systematic and risk-based work with your cyber security defense.
Risk-based
Don’t get lost by all the data. Our platform helps you understand what vulnerabilities to remediate first through a number of automated and simple tools.
Complete coverage
We cover every type of web application, public as well as local. Intranets, commercial websites, portals, and more.

OWASP top 10
Our web application scanner finds a wide range of vulnerabilities in your web applications.


Meet future compliance
Along with the growing threat picture, there are new legal requirements, standards and certifications. We help you meet existing and future requirements.
Features & functions

Cloud & on-premise – one technology
Our platform can be distributed in two ways. Safe and secure from several global datacenters as a cloud service, or installed within your own infrastructure as on-premise with local storage. You simply choose what distribution option that suits your organization best.
Cloud
Safe and secure management and storage in the cloud. Select what physical datacenter that suits you. Get started in just minutes.
On-premise
Installed and operating within your own infrastructure, with local data storage. Automatic software and vulnerability test updates.

Centralized, powerful administration & orchestration
Security Center
Security Center is our easy-to-use web-based control panel that gives comprehensive insights and helps you manage vulnerabilities. Through flexible dashboards and reports, you get a visual overview of current data, development over time, and more. Security Center supports Role-Based Access Control (RBAC).
Organizer
Organizer enables different people, groups of users, departments, or countries to be given isolated access to relevant vulnerability data while maintaining a centralized administration. Get the best of two worlds – decentralized management to engage your teams, while still having support for centralized management.
LOGON works with corporate clients and systems integrators by offering Vulnerability Management that offer continuous monitoring, vector analytics and modeling, integration with Software Development Life Cycle, Threat intelligence platforms and deliver Graphical attack modeling and compliance reporting. LOGON offers products from Acunetix, NetSparker, Flexera / Secunia etc. Other security solutions include Veracode, Whitehat, OPSWAT, Tenable, QUALYS, etc.. These solutions offer both Static Analysis (SAST) and Dynamic Analysis (DAST) that help Penetration Testers test Vulnerability Remediation, Cyber Exposure needs and Risk Assessment.