Vulnerability management integrations

We have integrations with various security and IT operations technology partners to help you gain context, take decisive action, and reduce cyber risks.

Security Information & Event Management

We offer data-rich resources that can amplify SIEM solutions. Here you find some of the SIEM systems that we integrate with.
IBM QRadar Logo

IBM QRadar

Our integration with QRadar and QRadar Vulnerability Manager (QVM) combines cyber exposure insights from our platform with QRadar’s log and flow consolidation capabilities. Enabling users to better correlate events, take action on vulnerabilities, and meet compliance standards.

Read more
Logpoint

Logpoint

The LogPoint integration collects vulnerability data from our platform and combines the results with observations from other systems to provide actionable insight into your infrastructure’s security risks. The vulnerability reports allow you to quickly and accurately identify, investigate and prioritize vulnerabilities and misconfigurations in your IT environment.

Read more
Splunk logo

Splunk

Our app for Splunk combines our platform's cyber exposure insights with Splunk's log and flow consolidation capabilities, enabling users to better correlate events, take action on vulnerabilities, and meet compliance standards. The Holm Security app is a Common Information Model (CIM) and is compatible for easy use with other Splunk apps.

Read more
Microsoft Sentinel Logo

Microsoft Sentinel

The Microsoft Sentinel integration fetches vulnerability data from our platform and combines the results with observations from other systems to provide actionable insight into your infrastructure’s security risks. The vulnerability reports allow you to quickly and accurately find, investigate, and prioritize vulnerabilities and misconfigurations in your IT environment.

Read more

CMDB, ticketing & communication

Automate processes within Configuration Management Database (CMDB), ticketing, and communication to make your vulnerability management program more efficient.

Slack Logo

Slack

Get important notifications straight into your Slack workspace, including instant updates, scan status notifications, and vulnerability findings.

Read more
microsoft teams logo

Microsoft Teams

Get important notifications straight into your Microsoft Teams workspace, including updates on scan status and vulnerability findings.

Read more
ServiceNow Logo

ServiceNow

We make it possible to connect remediation with ServiceNow for ticket and incident management.

Read more
atlassian jira logo

Atlassian Jira

Our platform integrates with Atlassian's Jira On Prem, Jira Cloud, Jira Core, Jira Software, and Jira Service Desk. Automatically create tickets for discovered vulnerabilities and close them once they are resolved for a cohesive, trackable remediation process.

Read more
TopDesk Logo

TopDesk

Our integration with TopDesk automatically opens tickets for identified vulnerabilities and closes them once they are resolved, providing a cohesive, trackable remediation process.

Read more

Single Sign-on (SSO)

Holm Security supports several technologies for Single Sign-on (SSO) to make login more efficient and safer.

Okta_logo_(2023).svg

Okta

Holm Security integrates with Okta's secure cloud SSO solution for safe and efficient access to Security Center.

Read more
Onelogin Logo

OneLogin

Holm Security integrates with OneLogin’s cloud-based Unified Access Management for safe and efficient access to Security Center.

Read more
Azure AD Logo

Azure AD

Holm Security integrates with Microsoft Azure Single Sign-on for safe and efficient access to Security Center.

Read more
microsot active directory logo

Microsoft’s AD FS

Holm Security integrates with Microsoft’s Active Directory Federation Services (AD FS) to provide secure, efficient access to Security Center.

Read more

Other integrations

We provide a wide range of other integrations. Here are some of them. If you have a specific request for an integration, please contact us.

Azure AD Logo

Azure Active Directory (AD)

Automatically synchronize users and email addresses directly from Active Directory to simplify and fully automate user management for Phishing Simulation & Awareness Training. This seamless integration ensures your training campaigns always target the right employees, reduces manual administration, and keeps your security awareness program accurate, scalable, and up to date.

Read more
Webhooks Logo

Webhooks

Automate remediation events such as ticket creation and resolution, receive notifications when scans start or finish, and configure triggers by scan type to simplify integrations, support custom workflows, and provide real-time visibility into scan and remediation activities.

Read more
BeyondTrust_logo.svg

BeyondTrust

Holm Security integrates with BeyondTrust’s Privileged Access Management (PAM) solution to improve credential security during vulnerability scanning. Credentials are securely stored in BeyondTrust and automatically retrieved before scans, removing the need to store them in Security Center.

Read more