Alok Sahay Country Manager India Saarc

Alok Sahay
Sales Director India & SAARC
+91 8800-67 77 99

Welcome to India!

Hi! My name is Alok and I'm your local representative in India. Looking for a cyber security solution and vulnerability management? Let's talk! 

Contact us

Faurani Ahmad Sales director Southeast Asia

Ahmad Faurani
Sales Director Southeast Asia
+60 19 434 2727

Welcome to Malaysia!

Hi! My name is Ahmad Faurani and I'm your local representative in Malaysia. Looking for a cyber security solution and vulnerability management? Let's talk! 

Contact us


Cristian Miranda
Key Account Manager, Finland
+46 8-550 05 582


Hei! Nimeni on Cristian ja olen paikallinen edustajasi Suomessa. Etsitkö tietoturvaratkaisua ja haavoittuvuuksien hallintaa? 

Ota yhteyttä


Victor Bunge Meyer
Key Account Manager, Sverige
+46 08-550 05 582

Holm Security i Sverige

Välkommen till Holm Security i Sverige! Jag heter Victor och är din lokala kontakt. Kontakta mig om du vill veta mera om vår platform för sårbarhetsanalyser. 

Kontakta oss



Beth Murrell holm security

Beth Murrell
Account Manager, Benelux
+31-20-238 63 94

Welkom in de Benelux!

Mijn naam is Beth Murrell en ik ben uw lokale vertegenwoordiger in Nederland, België en Luxemburg. Op zoek naar een cyberveiligheidsoplossing en kwetsbaarheidsbeheer? Laten we praten!

Neem contact op

jens dahlkvist holm security

Jens Dahlkvist
Key Account Manager, Norge
+46 8-550 05 582

Holm Security i Norge

Velkommen til Holm Security i Norge! Jeg heter Jens og er din lokale kontaktperson.Kontakt meg hvis du vil vite mer om vår plattform for sårbarhetsanalyser.

Kontakt oss

Ronnie Jensen

Ronnie Jensen
Country Manager Denmark
+45 31 12 10 05

Holm Security i Danmark

Velkommen til Holm Security i Danmark! Mit navn er Ronnie og jeg er din lokale kontaktperson. Kontakt mig, hvis du vil vide mere om vores sårbarhedsanalyseplatform.

Kontakt os


Risk Management in Technology RMiT

Bank Negara Malaysia issued the Risk Management in Technology policy document (RMiT) on July 18, 2019, which sets out Bank Negara’s requirements regarding financial institutions’ management of technology risk. The policy came into effect on January 1, 2020, and covers the implementation of a comprehensive technology risk management framework. The policy applies regardless of the financial institution operates the data center themselves or if they are working with an outsourcing partner.


To begin working towards compliance, it’s important to first figure out what regulations or laws you need to comply with.


Start by determining what your organization’s most critical security flaws are. 


Having policies and procedures in place to mitigate risk is crucial for both compliance and safety. Conduct automated and continuous tests to make sure you stay compliant.

The security challenges of RMiT

Holm Security VMP (Vulnerability Management Platform) protects your organization by detecting vulnerabilities before any malicious individual or organization does. The platform includes vulnerability management for networks and websites, risk analyses for social engineering, and a variety of tools that facilitate continuous safety work.


Cyber security operations

Our platform scans the following aspects of the cyber-attack life cycle:

  • Reconnaissance
  • Weaponization
  • Delivery
  • Exploitation
  • Installation
  • Command and control
Cyber response and recovery

Holm Security VMP allows for automated procedures following the requirements in order to ease the process of governance of critical infrastructure, clear reporting of known threats as well as fixed cyber security risks. Escalation procedures can be automated and integrated.

Patch and end-of-life system management

Holm Security VMP can provide crucial information regarding patch information, EOL, and security vulnerabilities in network systems and web applications.

Control measures on cyber security

Holm Security VMP allows for automated security testing to be conducted scheduled and on-demand. Automated monitoring tools allow for the identification of configuration and rule changes.

Security Operations Center

Holm Security VMP is a vulnerability management tool that can be integrated with SOC’s as well as other protection systems.

Internal awareness and training

Holm Security VMP gives organizations the ability to continuously train and educate staff on proactive cyber security measures as well as providing awareness tools based on user behavior