Navigation
  • Solutions
    • Information Security SolutionsLeading cyber security solutions to identify and prevent advanced security threats
          • Vulnerability Management
          • Multifactor Authentication
          • Content Disarm and Reconstruction
          • Data / Password Recovery
          • IT Service Management
          • File Integrity Management
          • Threat Intelligence
          • Identity and Access Management
          • Zero Trust Security
          • Forensic Solutions
          • IT Asset Management
          • Systems Administration Tools
          • Data Loss Prevention
          • Security Information and Event Management
          • Network Management Solutions
          • Remote Access Software
          • Activity Monitoring and Surveillance
    • Software Development SolutionsExplore a wide variety of development components & libraries
          • Integrated Development Environments
          • Release Automation & Management
          • Reporting Solutions
          • Testing & QA
          • Text Retrieval / Enterprise Search
          • Development Components
            • UI Components
            • Networking Components
            • Communication Components
            • Office Components
            • Barcode Components
          • Software Localization
          • eLearning Authoring Solutions
          • Charting Solutions
          • Imaging Solutions
          • PDF Solutions
          • Database
  • Services
        • Training ServicesCertified Training courses delivered by our trained and experienced specialists that enable your team to learn the skills, tools, and processes needed to become productive, implement best practices and achieve high quality standards.
        • Implementation ServicesWe know that your satisfaction is dependent on both the right software and a fast and successful implementation. We accelerate Time-To-Value by delivering high-quality implementations to meet customer priorities and processes.
        • After-Sales ServicesOur relationship with you does not end when we close a sale. It develops from it. Our experienced support team responds promptly to queries, deliver scheduled health checks so you gain maximum benefits from our solutions.
        • Best Practices ConsultingOur customer success stories prove the successful application of our methods and tools. Our experts rely on tested methods and help organizations in Asia find the answers they need to optimize their cybersecurity posture.
  • What's New
        • Our EventsDon’t miss out on our upcoming events
        • October 2022
          Oct 12 - 13
          Local Time:
          Oct 11 - 12 2022 |

          LOGON Software Asia in Cyber Security World 2022

          Marina Bay Sands
          No event found!
        • Latest UpdatesCatch on the latest updates and news of our partners
        • What is the potential of artificial intelligence to improve cybersecurity posture? | Bfore.AI
          Bfore.AI Blog Blog
          What is the potential of artificial intelligence to improve cybersecurity posture? | Bfore.AI
          Top 5 Most Common API Vulnerabilities You Should Know About | Reflectiz
          Blog Reflectiz Blog
          Top 5 Most Common API Vulnerabilities You Should Know About | Reflectiz
          The SolarWinds Supply Chain Attack: Implementing a Layered Security Approach | Reflectiz
          Blog Reflectiz Blog
          The SolarWinds Supply Chain Attack: Implementing a Layered Security Approach | Reflectiz
          [SCAM ALERT 035] -AmericaFirst  | Bfore.AI
          Bfore.AI Blog Blog
          [SCAM ALERT 035] -AmericaFirst | Bfore.AI
        • Special OffersView our special offers on our available solutions and upgrades
        • 3-Month Full License of PreCrime Network | Bfore.AI
          3-Month Full License of PreCrime Network | Bfore.AI
          Reflectiz | Free Security Assessment of Your Website
          Reflectiz | Free Security Assessment of Your Website
  • About
        • About Us
        • Locations
        • Our Partners
        • Careers@LOGON - We are hiring !
        • Partner with LOGON
          • Publishers - Join our network
          • Resellers - Expand your portfolio
          • Procurement Managers
  • Search

    More results...

    Generic filters
Site logo
  • Solutions
    • Information Security SolutionsLeading cyber security solutions to identify and prevent advanced security threats
          • Vulnerability Management
          • Multifactor Authentication
          • Content Disarm and Reconstruction
          • Data / Password Recovery
          • IT Service Management
          • File Integrity Management
          • Threat Intelligence
          • Identity and Access Management
          • Zero Trust Security
          • Forensic Solutions
          • IT Asset Management
          • Systems Administration Tools
          • Data Loss Prevention
          • Security Information and Event Management
          • Network Management Solutions
          • Remote Access Software
          • Activity Monitoring and Surveillance
    • Software Development SolutionsExplore a wide variety of development components & libraries
          • Integrated Development Environments
          • Release Automation & Management
          • Reporting Solutions
          • Testing & QA
          • Text Retrieval / Enterprise Search
          • Development Components
            • UI Components
            • Networking Components
            • Communication Components
            • Office Components
            • Barcode Components
          • Software Localization
          • eLearning Authoring Solutions
          • Charting Solutions
          • Imaging Solutions
          • PDF Solutions
          • Database
  • Services
        • Training ServicesCertified Training courses delivered by our trained and experienced specialists that enable your team to learn the skills, tools, and processes needed to become productive, implement best practices and achieve high quality standards.
        • Implementation ServicesWe know that your satisfaction is dependent on both the right software and a fast and successful implementation. We accelerate Time-To-Value by delivering high-quality implementations to meet customer priorities and processes.
        • After-Sales ServicesOur relationship with you does not end when we close a sale. It develops from it. Our experienced support team responds promptly to queries, deliver scheduled health checks so you gain maximum benefits from our solutions.
        • Best Practices ConsultingOur customer success stories prove the successful application of our methods and tools. Our experts rely on tested methods and help organizations in Asia find the answers they need to optimize their cybersecurity posture.
  • What's New
        • Our EventsDon’t miss out on our upcoming events
        • October 2022
          Oct 12 - 13
          Local Time:
          Oct 11 - 12 2022 |

          LOGON Software Asia in Cyber Security World 2022

          Marina Bay Sands
          No event found!
        • Latest UpdatesCatch on the latest updates and news of our partners
        • What is the potential of artificial intelligence to improve cybersecurity posture? | Bfore.AI
          Bfore.AI Blog Blog
          What is the potential of artificial intelligence to improve cybersecurity posture? | Bfore.AI
          Top 5 Most Common API Vulnerabilities You Should Know About | Reflectiz
          Blog Reflectiz Blog
          Top 5 Most Common API Vulnerabilities You Should Know About | Reflectiz
          The SolarWinds Supply Chain Attack: Implementing a Layered Security Approach | Reflectiz
          Blog Reflectiz Blog
          The SolarWinds Supply Chain Attack: Implementing a Layered Security Approach | Reflectiz
          [SCAM ALERT 035] -AmericaFirst  | Bfore.AI
          Bfore.AI Blog Blog
          [SCAM ALERT 035] -AmericaFirst | Bfore.AI
        • Special OffersView our special offers on our available solutions and upgrades
        • 3-Month Full License of PreCrime Network | Bfore.AI
          3-Month Full License of PreCrime Network | Bfore.AI
          Reflectiz | Free Security Assessment of Your Website
          Reflectiz | Free Security Assessment of Your Website
  • About
        • About Us
        • Locations
        • Our Partners
        • Careers@LOGON - We are hiring !
        • Partner with LOGON
          • Publishers - Join our network
          • Resellers - Expand your portfolio
          • Procurement Managers
  • Search

    More results...

    Generic filters
View large
-

Protected: Deal Registration

This content is password protected. To view it please enter your password below:

Related posts

More details
-

Webinar: D-Biz Programme for Cyber Security

at by

Join Venkat Ram Donga, the senior technical product manager at Flexera to learn more about the release highlights of InstallShield 2020 R1.

This post is password protected. Enter the password to view the comments.

Search engine

Use this form to find things you need on this site
Search

More results...

Generic filters

Watch On-demand Webinar

  • Name * Required

Download the free Devolutions Password Server Information Kit to receive:
Devolutions Cybersecurity Guide
Password Server Datasheet
Password Server Technical Specification
Devolutions Latest Reports
Devolutions Whitepapers

Download the free Devolutions Password Hub Information Kit to receive:
Devolutions Cybersecurity Guide
Password Hub Datasheet
Password Hub Technical Specification
Devolutions Latest Reports
Devolutions Whitepapers

Download the free Devolutions RDM Information Kit to receive:
Devolutions Cybersecurity Guide
Remote Desktop Manager Datasheet
Remote Desktop Manager Technical Specification
Devolutions Latest Reports
Devolutions Whitepapers

Download the free inDefend Information Kit to receive:
inDefend Datasheet
inDefend Comparison Chart
inDefend Use Case
inDefend Whitepaper

Download the free Bfore.AI Information Kit to receive:
PreCrime Brand Datasheet
Signify Case Study
Volksbank IT Case Study

Download the free Bfore.AI Information Kit to receive:
PreCrime Network Datasheet
6cure Case Study
Quad9 Case Study

Contact Us Today

Download the free Acronis Information Kit to receive:
Acronis Cyber Protect Cloud Case Studies
3rd Party Competitive Reports
Ebook: Acronis-Cyber Protect Cloud Preventing Cyberattacks In Microsoft365 Environments
Flyer: VAR vs MSP Business Model
Acronis Cyber Protect Cloud WhitePaper

Download the free InstallShield Information Kit to receive:
Datasheet: InstallShield 2022
Datasheet: InstallShield 2022 Version Comparison
InstallShield 2022 Release Notes
Whitepaper: Tips for Faster Software Installation Builds

Take advantage of the new features and enhancements of AdminStudio 2022

Start PreCrime Network for Free

Book a Demo session with our specialist

Download the free Devolutions Information Kit to receive:
Devolutions Cybersecurity Guide
Remote Desktop Manager Information Package
Devolutions Password Hub Information Package
Devolutions Server Information Package
Infographic: How to Stop Security Breaches
Report: Remote Desktop Security & Password Management
Report: Remote Desktop Security for the SMB
Report: State of Cybersecurity in SMBs in 2020-2021
Devolutions Whitepapers

Download the free DomainTools Information Kit to receive:
SIEM Buyers Guide
Iris Investigation Platform Information Package
Domain Risk Score Information Package
PhishEye Information Package
Case Studies
Domain and DNS Intelligence Solution Brief
Formulating a Robust Pivoting Methodology
SANS 2021 Report: Top Skills Analysts Need to Master
Whitepaper: SANS 2021 Top New Attacks and Threat Report
Whitepaper: Conceptualizing a Continuum of Cyber Threat Attribution

Download the free FastPass Information Kit to receive:
Datasheet: FastPass Password Manager
Datasheet: FastPass V4 Overview
Datasheet: ServiceNow - Protect Password Reset Process in ServiceDesk
Datasheet: What is Enterprise Password Management
FastPass Password Sync for SAP
How FastPass is made secure for you
Whitepaper: Secure Identity Verification of Users

Download the free Surelog SIEM Information Kit to receive:
Datasheet: Surelog SIEM
Datasheet: What makes Surelog SIEM unique?
Datasheet: Surelog SIEM Hot Storage
Datasheet: Surelog SIEM Hot Storage Costs Advantages
Datasheet: Surelog SIEM Intellligent Response
Use Cases: Surelog SIEM

Download the free VNC Connect Information Kit to receive:
VNC Connect Datasheets
A series of RealVNC eBook
RealVNC Whitepaper

Download the free Lansweeper Information Kit to receive:
Lansweeper Datasheet
Whitepaper: The Illusion of Control Interactive

Download the free Invicti Information Kit to receive:
Web Application Security Buyers Guide
Web Application Security Buyers Guide Checklist
Invicti For Web Application Security
DevSecOps with Invicti
5 clear steps to a robust web application security program
Whitepaper: Security at the Speed of Software

Download the free Acunetix Information Kit to receive:
Learn about Invicti Security
Sample Acunetix Reports
Acunetix Comparison with Industry Products
Live Demo Videos
Acunetix Useful Links
Acunetix DataSheets
Acunetix AcuSensor
Acunetix Web Vulnerability Report 2021 edition
Whitepaper: Using DAST to get the most out of WAFs

Download the free Netsparker Information Kit to receive:
Datasheet: Netsparker Overview
WhitePaper: Proof-Based Scanning
Datasheet: Making a Difference with True IAST
Datasheet: What is a "Target"
Datasheet: What is IAST
Netsparker System Requirements

Download the free ArcusTeam Information Kit to receive:
ArcusTeam DeviceTotal Solution Overview
WhitePaper: BoM Potential Zero-Days
WhitePaper: Contextual Risk Assessment

Download the free Reflectiz Information Kit to receive:
Case Study: Revolutionizing eCommerce Website Digital Security Standards
Use Case: Promoting Business Enablement with Optimal Tag Manager Security
Reflectiz Risk Areas and Capabilities
Reflectiz Key Takeaways for 2021
The Key Threats and Risks That Third-Parties Create to Websites

Get Your Free Trial
  • This field is for validation purposes and should be left unchanged.

Get Your Free Trial
  • This field is for validation purposes and should be left unchanged.

Request a Demo with our specialist

Request for Training Quote
  • Please enter a number from 1 to 20.

Request for Training Quote
  • Please enter a number from 1 to 20.

Request for Training Quote
  • Please enter a number from 1 to 20.

Request for Training Quote
  • Please enter a number from 1 to 20.

Request for Training Quote
  • Please enter a number from 1 to 20.

Request for Training Quote
  • Please enter a number from 1 to 20.

Request for Training Quote
  • Please enter a number from 1 to 20.

Request for Training Quote
  • Please enter a number from 1 to 20.