Our network scanning automatically and continuously scans your systems for over 53,000 different vulnerabilities, and every year approximately 6,000 new vulnerabilities are added to our database. The scan detects vulnerabilities that are related to old software, exposed services and features, malformed systems, weak passwords, and more. Our service also automatically maps caches and ports so you can get a complete overview of your systems. In addition to the automated scanning, you can also manually scan on demand (allowing you to, for example, run a full scan before launching a new system).
Our network scanner seamlessly scans your public systems from the cloud. By installing a virtual appliance behind your firewall, you can also easily scan your local systems. All data from local scans is then securely transferred to the Security Center after completion for processing and presentation.
Detecting vulnerabilities is only one piece of the puzzle, but managing the collected data in a contrastive, understandable way is another. Holm Security VMP helps to facilitate the management and interpretation of vulnerabilities through a number of powerful tools, views, and support functions.
The Vulnerability Manager is a powerful tool that’s central to Holm Security’s offering. The Vulnerability Manager will provide you with a quick and easy way to work with vulnerabilities whether there are thousands of fixes to be made, or just a few. You can sort, group, and structure vulnerability listings in the ways that make the most sense to you, and then easily perform desired options – like ignoring or addressing a vulnerability – directly within the tool. Within the Vulnerability Manager, you can also converse directly with Holm Security’s specialists regarding specific vulnerability questions. Furthermore, the Vulnerability Manager will help you create a ‘baseline’ or framework for future security data and reports.
The Case Management tool is largely automated to help make things as efficient as possible for you. When a certain type of vulnerability is detected, you can choose to address the issues automatically as they occur. Once a vulnerability is resolved, the system will automatically verify that the issue has been fixed. Cases can also be created directly from the Vulnerability Manager and accompanying reports.
A key feature of Holm Security VMP is the reports feature. Reports give you detailed information about vulnerabilities, including input on how a particular vulnerability should be remedied. There are a variety of ready-made support templates built in, but you can also easily create your own custom reports. Among the included templates are reports specifically aimed at IT staff, management, CEO/board members, and more. These reports are scheduled and sent out automatically according to set properties, or can be generated manually on demand.