Product
System & Network Scanning
Find vulnerabilities in your entire infrastructure.
Web Application Scanning
Find vulnerabilities in your web apps and APIs.
Phishing & Awareness Training
Increase resilience against social engineering.
Business needs
Industries
Information
Partner solutions
Europe
Asia
CLOSE
Alok Sahay,
Sales Director, India
alok.sahay@holmsecurity.com
+91 8800-67 77 99
Hi! My name is Alok and I'm your local representative in India. Looking for a cyber security solution and vulnerability management? Let's talk!
CLOSE
Ahmad Faurani
Sales Director, Southeast Asia
ahmad.faurani@holmsecurity.com
+60 19 434 2727
Hi! My name is Ahmad Faurani and I'm your local representative in Malaysia. Looking for a cyber security solution and vulnerability management? Let's talk!
CLOSE
Cristian Miranda
Key Account Manager, Finland
cristian.miranda@holmsecurity.com
+46 8-550 05 582
Hei! Nimeni on Cristian Miranda ja olen paikallinen edustajasi Suomessa. Etsitkö tietoturvaratkaisua ja haavoittuvuuksien hallintaa? Puhutaan!
CLOSE
Victor Bunge Meyer
Key Account Manager, Sverige
victor.bunge-meyer@holmsecurity.com
+46 08-550 05 582
Välkommen till Holm Security i Sverige! Jag heter Victor och är din lokala kontakt. Kontakta mig om du vill veta mera om vårt system eller sårbarhetsanalyser.
CLOSE
Beth Murrell
Sales Development Representative, Benelux
elizabeth.murrell@holmsecurity.com
+31-20-238 63 94
Mijn naam is Beth Murrell en ik ben uw lokale vertegenwoordiger in Nederland, België en Luxemburg. Op zoek naar een cyberveiligheidsoplossing en kwetsbaarheidsbeheer? Laten we praten!
CLOSE
Jens Dahlkvist
Key Account Manager, Norge
jens.dahlkvist@holmsecurity.com
+46 8-550 05 582
Velkommen til Holm Security i Sverige! Jeg heter Victor og er din lokale kontaktperson. Kontakt meg hvis du vil vite mer om systemet vårt eller sårbarhetsanalyser.
Compliance
The Health Insurance Portability and Accountability Act (HIPAA) protects the privacy and security of personal health information (PHI). Any healthcare organization, like hospitals, that stores, processes, or sends PHI must meet HIPAA compliance requirements. This also applies to related businesses that perform functions or provide services on their behalf.
The HIPAA Compliance Security Rule lists a set of security standards with implementation requirements designed to safeguard PHI, in an electronic form called ePHI. These standards are grouped into the following five categories:
Test resilience to leak personal health information and other personal data. Measure and increase resilience against phishing attempts.
Gain visibility into your systems, networks, and web applications and find weak points.