Navigation
  • SEARCH HERE
  • SOLUTIONS
    • Information Security Solutions
      • Application Security Testing Solutions
      • Network & Infrastructure Security Solutions
      • Zero Trust Security
      • Security Information and Event Management
      • Remote Monitoring & Management (RMM)
      • File Integrity Management
      • Systems Administration Tools
      • Data Loss Prevention
      • Data / Password Recovery
      • IT Management Solutions
      • Identity and Access Management Solutions
      • Employee Activity Monitoring (EAM)
      • Digital Forensic Investigation
    • Software Development Solutions
      • Integrated Development Environments
      • Development Components
        • UI Tools
        • Networking Components
        • Office Components
        • Barcode Components
        • Communication Components
      • Imaging Solutions
      • Software Localization
      • Release Automation & Management
      • eLearning Authoring Solutions
      • Charting Solutions
      • PDF Solutions
      • Reporting Solutions
      • Testing & QA
      • Text Retrieval / Enterprise Search
      • Database
  • Services
    • Live Solution Walkthroughs
    • Implementation Services
    • Best Practices Consulting
    • Pre-Sales and Post-Sales Services
  • What's New
    • Our Event
    • Our Blogs
    • Special Offers
  • About
    • About LOGON Software Asia
    • Our Partnership
  • Publishers - Join our network
  • Resellers - Expand your portfolio
  • Procurement Managers
Site logo
  • Solutions
    • Information Security Solutions
          • Identity and Access Management
            • Privileged Access Management (PAM)
            • Multi-Factor Authentication (MFA)
            • Identification Verification (IV)
            • Self-Service Password Reset (SSPR)
          • Network & Infrastructure Security
            • DDoS Mitigation and Protection
            • Digital Forensic Investigation
            • Malware Detection & Analysis
            • Network Monitoring Software
            • Email Security
            • Log Monitoring
          • Endpoint & Device Security
            • Patch Management
            • Remote Monitoring & Management (RMM)
            • Employee Activity Monitoring (EAM)
            • Mobile Device Management (MDM)
          • IT Management
            • IT Service Management
            • IT Asset Management
            • Software Asset Management
            • Hardware Asset Management
            • Software License Management
            • Systems Administration Tools
          • Application Security
            • Application Security Testing (SAST, DAST, IAST, MAST, SCA)
            • Runtime Application Self-Protection
            • Web Application Firewall
          • Data Security
            • Data / Password Recovery
            • File Integrity Management
            • Data Loss Prevention
          • Cloud Security
            • Cloud Security Posture Management
            • Cloud Work Protection
          • External Attack Surface Management
            • Cyber Threat Intelligence
            • Third Party Risk Management
          • Security Operations & Incident Management
            • Security Information and Event Management
            • Security Orchestration, Automation and Response (SOAR)
          • Zero Trust Security
    • Software Development Solutions
      • Integrated Development Environments
      • Imaging Solutions
      • UI Tools
      • Charting Solutions
      • Developer Tools
      • Database
      • Networking Components
      • Office Components
      • Barcode Components
      • Release Automation & Management
      • Software Localization
      • Communication Components
      • Automated Testing
      • eLearning Authoring Solutions
      • Reporting Solutions
      • Text Retrieval / Enterprise Search
      • Testing & QA
  • Services
        • Live Walkthrough Sessions

          Experience the full feature of our key solutions through live platform

          View All Sessions >
        • Implementation Services
        • Pre-Sales and Post-Sales Services
        • Best Practices Consulting
  • Partners
    • Our Partners
    • Partner with LOGON Today!
      • Vendors - Join Our Network
      • Resellers - Expand Your Portfolio
      • Procurement Managers
  • Resources
        • ABOUT US

        • About Us
        • Our Locations
        • Careers@LOGON - We are hiring !
        • DISCOVER

        • Our BlogsNEW BLOGS
        • Our EventsJOIN UPCOMING EVENTS
        • LOGON to CyberSecurity PodcastNEW EPISODES
        • GET HELP

        • Contact Us
        • Help Desk
        • Request a Demo
        • Request a Quote
  • More results...

Image
View large More details
Blog, Notifications

Building a secure SDLC for web applications | Netsparker

A predictable and efficient software development lifecycle (SDLC) is crucial for delivering modern web applications on schedule, in scope, and within budget. Let’s see how you can integrate application security best practices to create a secure SDLC.

Read More
Image
View large More details
Notifications, Reflectiz Blog

The CDNjs’ Remote Control Execution | Reflectiz

Imagine that you’re a threat actor. You’re looking for a vulnerability to exploit night and day, turning every stone in your path until you discover a bot that lets you implement arbitrary code by automatically updating OS Repositories hosted on the largest CDN in the world.

Read More
Image
View large More details
GrapeCity Blog, Notifications

Vital Tips to Help You Create a Secure React Web Application | GrapeCity

In this article, you will learn about four methods that you can take advantage of to secure your React apps quickly. These are simple security practices that should not interrupt your workflow.

Read More
Image
View large More details
Notifications, RealVNC Blog

How to use screen recording in VNC Connect | RealVNC

On RealVNC’s latest update, screen recording is now part of VNC Connect! Read on to find out how to capture your great work in no time!

Read More
Image
View large More details
Elcomsoft Blog, Notifications

The Five Ways to Recover iPhone Deleted Data | Elcomsoft

iOS security model offers very are few possibilities to recover anything unless you have a backup, either local or one from the cloud. In Elcomsoft article you will learn what you can and what you cannot recover in modern iOS devices.

Read More
Image
View large More details
Acunetix Blog, Notifications

What is continuous web application security? | Acunetix

The term continuous security in the context of web application security is best understood when paired with well-known terms continuous integration and continuous deployment (CI/CD). Continuous security means that security is part of a continuous process – DevSecOps or, even better, SecDevOps.

Read More
Image
View large More details
Notifications, Paessler Blog

Monitoring Modbus in industrial environments | Paessler

Modbus. It’s a fieldbus protocol that’s been around longer than many of the engineers and technicians who use it. And yet it isn’t going away. What advantages does monitoring with Modbus bring? Let’s take a look at examples of how you’d use Modbus in your monitoring concept.

Read More
Image
View large More details
Notifications, TSFactory Blog

Cybersecurity Month: 6 Ways to Avoid Phishing | TSFactory

It’s nearly the end of Cybersecurity Awareness Month 2021 and TSFactory is highlighting how to prevent phishing attacks. Below are important tactics your organization can take to prevent phishing attacks. Originally published by TSFactory.

Read More
Image
View large More details
Notifications, Reflectiz Blog

Why You Need a Digital Inventory | Reflectiz

Whether monetizing, analytics, or even customer interaction, these website digital applications are integral to your website’s supply chain, as developers don’t write all of their code by themselves. They integrate external scripts and frameworks into the existing website’s code. Orginally published by Reflectiz.

Read More
Image
View large More details
Notifications, RealVNC Blog

VNC Connect | Helping doctors improve patient care in difficult times

VNC Connect™ has always been a great partner to the healthcare industry. Doctors, nurses, other medical professionals and the IT support staff – all are using our technology on a daily basis. This article aims to show our audience how VNC Connect makes medical professionals’ lives easier.

Read More
Image
View large More details
ImmuniWeb Blog, Notifications

Here’s a New Free Tool to Discover Unprotected Cloud Storage Instances | ImmuniWeb

ImmuniWeb®  new free cloud security test enables cybersecurity and IT professionals to identify unprotected cloud storage of their organizations in a simple and swift manner to prevent data leaks and security incidents.

Read More
Image
View large More details
InstallShield Blog, Notifications, Revenera Blog

Build Your Next Software Installation in the Cloud | Revenera

Revenera’s InstallShield solution—the industry standard for developers creating software installers—has made the leap by introducing its Cloud License Server (CLS), enabling users to move their build infrastructure to the cloud.

Read More
Image
View large More details
Notifications, TSFactory Blog

Remote Working & GDPR | TSFactory

Businesses must maintain higher standards of secure access and prioritize data protection practices as employees work remotely for the foreseeable future.Below are 4 tips to help your organization adhere to the GDPR while employees are working from home. Originally published by TSFactory.

Read More
Image
View large More details
Notifications, RealVNC Blog

Great Ways RealVNC can help IT professionals in education

Educational institutions are adopting a hybrid learning model that enables teachers and students to work from anywhere, addresses the different needs and encourages creative ways to learn. Furthermore, IT professionals and support staff within this industry can use VNC Connect software to make that possible.

Read More
Image
View large More details
LeadTools Blog, Notifications

LEAD Technologies Celebrates the Release of LEADTOOLS Version 22

LEAD Technologies is very pleased to introduce LEADTOOLS Version 22. LEADTOOLS has continued to raise the standard of innovative technologies for 31+ years and there is no end in sight. This release is highlighted by new libraries and features that are found within LEAD.

Read More
Image
View large More details
ImmuniWeb Blog, Notifications

ImmuniWeb Named to 2021 AIFinTech100 List

Exciting News! ImmuniWeb is selected among 100 of the world’s most innovative AI solution providers for financial services industry that demonstrated outstanding innovation and growth.

Read More
Image
View large More details
Notifications, Silobreaker Blog

Silobreaker presented with Frost & Sullivan’s 2021 Best Practices Enabling Technology Leadership Award in the global threat intelligence market

Silobreaker, a pioneer of building technology that makes sense of web data, has been awarded the Frost & Sullivan 2021 Enabling Technology Leadership Award for its visionary approach to the global threat intelligence market.

Read More
Image
View large More details
Acunetix Blog, Notifications

What is HTTP header injection? | Acunetix

HTTP header injection is a technique that can be used to facilitate malicious attacks such as cross-site scripting, web cache poisoning, and more. These, in turn, may lead to information disclosure, use of your application in phishing attacks, and other severe consequences.

Read More
Image
View large More details
ImmuniWeb Blog, Notifications

New Updates on ImmuniWeb Discovery 2021

ImmuniWeb announces their new updates on ImmuniWeb Discovery. The improvements boost detection of cloud-native services in AWS, Azure, GCP and 30+ other public cloud service providers and expand Dark Web monitoring capacities.

Read More
Image
View large More details
InstallShield Blog, Notifications, Revenera Blog

InstallShield 2021 Now Released

Revenera announced the availability of InstallShield 2021. The leading solution for Microsoft Windows installations fully supports installations for Windows 11, which will launch later this year.

Read More
← Older Posts
Contact Us Today

FOLLOW US ON

  • LinkedIn
  • Facebook
  • Instagram
  • Twitter
  • YouTube
Read Next:
Image
Arsen Security BlogWebinar
Arsen Webinar | Next‑Generation AI‑Driven Attacks Impacting Asia | South Asia
Image
Arsen Security BlogWebinar
Arsen Webinar | Next‑Generation AI‑Driven Attacks Impacting Asia | East Asia
Image
Application Security BlogBlogMend.io Blog
Mend.io is Recognized in the 2025 Gartner®Magic Quadrant™ for Application Security Testing

Privacy Policy Company Overview

COMPANY

Our Location Career with LOGON Our Partners

SERVICES

Training Services Implementation Services Pre-Sales and Post-Sales Services Best Practices Consulting

GET IN TOUCH

Phone:
Hong Kong: +852 2512 8491
India: +91 70220 22744 / +91 63668 26133
Email: [email protected] ©2025 LOGON International Ltd. All rights reserved
logon logo WHITE Image Image Image

Search engine

Use this form to find things you need on this site

More results...

Fill in the form below
  • This field is for validation purposes and should be left unchanged.
  • This field is hidden when viewing the form
  • This field is hidden when viewing the form

Watch On-demand Webinar

  • This field is for validation purposes and should be left unchanged.

Get Your Free UserLock Trial

  • This field is for validation purposes and should be left unchanged.

Download Your Free Trial 10-Day Trial Today

  • Downloading and evaluating Smart Package Studio is quick and easy
  • Includes a short introductory guide that suggests smart features to try
  • Access the full functionality of Smart Package Studio during the trial
  • This field is for validation purposes and should be left unchanged.

Request for Priority Support with our support team

  • This field is for validation purposes and should be left unchanged.
  • Drop files here or
    Max. file size: 30 MB.

    Get Free Assessment of your Web Asset

    Request a free non-intrusive security assessment of your website. Get a report with an overview of client-side security risks.

    • This field is for validation purposes and should be left unchanged.
    • This field is hidden when viewing the form

    Recommend a Topic

    • This field is for validation purposes and should be left unchanged.

    Partner with Us on the next episode

    • This field is for validation purposes and should be left unchanged.

    Watch On-demand Webinar

    • This field is for validation purposes and should be left unchanged.
    Start PreCrime Network for Free

    Oops! We could not locate your form.

    Advertisement

    Book a Free Demo Today

    Get Your Free Trial

    Oops! We could not locate your form.

    Advertisement
    Get Your Free Trial
    • This field is for validation purposes and should be left unchanged.
    • This field is hidden when viewing the form
    • This field is hidden when viewing the form
    Request for Training Quote

    Oops! We could not locate your form.

    Advertisement
    Request for Training Quote

    Oops! We could not locate your form.

    Advertisement
    Request for Training Quote

    Oops! We could not locate your form.

    Advertisement
    Request for Training Quote
    • This field is for validation purposes and should be left unchanged.
    • Please enter a number from 1 to 20.
    • This field is hidden when viewing the form
    Request for Training Quote
    • This field is for validation purposes and should be left unchanged.
    • Please enter a number from 1 to 20.
    • This field is hidden when viewing the form
    Request for Training Quote
    • Please enter a number from 1 to 20.
    • DD slash MM slash YYYY
    • Image
    Request for Training Quote
    • This field is for validation purposes and should be left unchanged.
    • Please enter a number from 1 to 20.
    • DD slash MM slash YYYY
    Request for Training Quote
    • This field is for validation purposes and should be left unchanged.
    • Please enter a number from 1 to 20.
    • DD slash MM slash YYYY
    Request for Training Quote
    • This field is for validation purposes and should be left unchanged.
    • Please enter a number from 1 to 20.
    • This field is hidden when viewing the form
    Advertisement