Product
System & Network Scanning
Find vulnerabilities in your entire infrastructure.
Web Application Scanning
Find vulnerabilities in your web apps and APIs.
Phishing & Awareness Training
Increase resilience against social engineering.
Business needs
Industries
Information
Partner solutions
Europe
Asia
CLOSE
Alok Sahay,
Sales Director, India
alok.sahay@holmsecurity.com
+91 8800-67 77 99
Hi! My name is Alok and I'm your local representative in India. Looking for a cyber security solution and vulnerability management? Let's talk!
CLOSE
Ahmad Faurani
Sales Director, Southeast Asia
ahmad.faurani@holmsecurity.com
+60 19 434 2727
Hi! My name is Ahmad Faurani and I'm your local representative in Malaysia. Looking for a cyber security solution and vulnerability management? Let's talk!
CLOSE
Cristian Miranda
Key Account Manager, Finland
cristian.miranda@holmsecurity.com
+46 8-550 05 582
Hei! Nimeni on Cristian Miranda ja olen paikallinen edustajasi Suomessa. Etsitkö tietoturvaratkaisua ja haavoittuvuuksien hallintaa? Puhutaan!
CLOSE
Victor Bunge Meyer
Key Account Manager, Sverige
victor.bunge-meyer@holmsecurity.com
+46 08-550 05 582
Välkommen till Holm Security i Sverige! Jag heter Victor och är din lokala kontakt. Kontakta mig om du vill veta mera om vårt system eller sårbarhetsanalyser.
CLOSE
Beth Murrell
Sales Development Representative, Benelux
elizabeth.murrell@holmsecurity.com
+31-20-238 63 94
Mijn naam is Beth Murrell en ik ben uw lokale vertegenwoordiger in Nederland, België en Luxemburg. Op zoek naar een cyberveiligheidsoplossing en kwetsbaarheidsbeheer? Laten we praten!
CLOSE
Jens Dahlkvist
Key Account Manager, Norge
jens.dahlkvist@holmsecurity.com
+46 8-550 05 582
Velkommen til Holm Security i Sverige! Jeg heter Victor og er din lokale kontaktperson. Kontakt meg hvis du vil vite mer om systemet vårt eller sårbarhetsanalyser.
Compliance
To comply with ISO/IEC 27001, the IT environment must be assessed on an ongoing basis to detect risks. Our platform, Holm Security VMP, helps you to comply with ISO/IEC 27001 with continuous and automated vulnerability assessment of networks and web applications.
Only authorized persons can change the information.
Only authorized people have the right to access information.
The information must be accessible to authorized people whenever it is needed.
Compliance
The focus of ISO 27001 is to protect the confidentiality, integrity, and availability of the information in your company. It’s therefore important to understand potentials problems related to information loss and create sufficient risk mitigation and treatment to prevent this. ISO 27001 is about managing risk, knowing where the risks are, how to defend against them, and the implementation of safeguards.
Systematic assessment of the IT environment to detect vulnerabilities.
Automatically generated reports for management, the board, and auditors.
Information and tools for remediating vulnerabilities in networks, systems and web applications.