Alok Sahay Country Manager India Saarc

Alok Sahay
Sales Director India & SAARC
alok.sahay@holmsecurity.com
+91 8800-67 77 99

Welcome to India!

Hi! My name is Alok and I'm your local representative in India. Looking for a cyber security solution and vulnerability management? Let's talk! 

Contact us

Faurani Ahmad Sales director Southeast Asia

Ahmad Faurani
Sales Director Southeast Asia
ahmad.faurani@holmsecurity.com
+60 19 434 2727

Welcome to Malaysia!

Hi! My name is Ahmad Faurani and I'm your local representative in Malaysia. Looking for a cyber security solution and vulnerability management? Let's talk! 

Contact us

cristian-miranda-holm-security

Cristian Miranda
Key Account Manager, Finland
cristian.miranda@holmsecurity.com
+46 8-550 05 582

Tervetuloa!

Hei! Nimeni on Cristian ja olen paikallinen edustajasi Suomessa. Etsitkö tietoturvaratkaisua ja haavoittuvuuksien hallintaa? 

Ota yhteyttä

victor-bunge-meyer-holm-security

Victor Bunge Meyer
Key Account Manager, Sverige
victor.bunge-meyer@holmsecurity.com
+46 08-550 05 582

Holm Security i Sverige

Välkommen till Holm Security i Sverige! Jag heter Victor och är din lokala kontakt. Kontakta mig om du vill veta mera om vår platform för sårbarhetsanalyser. 

Kontakta oss

 

 

Beth Murrell holm security

Beth Murrell
Account Manager, Benelux
elizabeth.murrell@holmsecurity.com
+31-20-238 63 94

Welkom in de Benelux!

Mijn naam is Beth Murrell en ik ben uw lokale vertegenwoordiger in Nederland, België en Luxemburg. Op zoek naar een cyberveiligheidsoplossing en kwetsbaarheidsbeheer? Laten we praten!

Neem contact op

jens dahlkvist holm security

Jens Dahlkvist
Key Account Manager, Norge
jens.dahlkvist@holmsecurity.com
+46 8-550 05 582

Holm Security i Norge

Velkommen til Holm Security i Norge! Jeg heter Jens og er din lokale kontaktperson.Kontakt meg hvis du vil vite mer om vår plattform for sårbarhetsanalyser.

Kontakt oss

Ronnie Jensen

Ronnie Jensen
Country Manager Denmark
ronnie.jensen@holmsecurity.com
+45 31 12 10 05

Holm Security i Danmark

Velkommen til Holm Security i Danmark! Mit navn er Ronnie og jeg er din lokale kontaktperson. Kontakt mig, hvis du vil vide mere om vores sårbarhedsanalyseplatform.

Kontakt os

COMPLIANCE

GDPR

To ensure the safety of personal data, structured security work is needed to ensure the resilience of the systems that continuously handle personal data. Since most IT environments are networks of computers, servers, etc. that are interconnected in various ways, this means that security must be guaranteed throughout the IT environment. Personal data leakage not only damages the brand, reputation, and revenue of the business but can also lead to extensive fines. 

Challenges

Our solution

Holm Security VMP includes several functions for compliance with the data protection regulation. They help you ensure a high level of security and facilitate the flow of information in your organization, not least for the person who is responsible for personal data.

Phishing simulation

Our service Phishing & Awareness Training is used to measure and increase resilience to attempts to get your users to leak personal information.

Vulnerability management

Our service System & Network Scanning and Web Application Scanning detects vulnerabilities in networks, systems, and web applications that hold or are related to personal data. 

Exposed personal data

Our platform detects exposed personal information in web applications, networks, and systems that hold or are related to personal data.

Remediate vulnerabilities

With Vulnerability Manager Information and work tools to remediate vulnerabilities in systems related to personal data.

Reports

Automatic reports that give a clear picture of how secure your networks and systems are related to personal data.

Asset management

Point out and manage your systems that keep personal data with our Asset Management function.

Details

Specific features & functions

Our product System & Network Scanning supports a wide range of powerful features and functions for you to become successful. 

  • Discovery scanning and asset management. 
  • Unauthenticated and authenticated scanning. 
  • Supports scanning of AWS and Azure cloud infrastructure. 
  • Policy scanning based on CIS Benchmarks. 
  • Device Agent - light-weight endpoint agent (coming 2021). 
  • Passive scanning (coming 2021).