CLOSE

Stefan-Thelberg

Stefan Thelberg,
CEO, Sweden
stefan.thelberg@holmsecurity.com
+46 (0)739-99 33 12

Välkommen till Holm Security!

Vi guidar dig genom nästa generations sårbarhetsanalyser Sveriges största plattform för automatiserade & kontinuerliga sårbarhetsanalyser. Som bara blir bättre.

Läs mer här

Boka demo

CLOSE

Stefan-Thelberg

Stefan Thelberg,
CEO, Sweden
stefan.thelberg@holmsecurity.com
+46 (0)739-99 33 12

Welcome to UK!

Vi guidar dig gneom nästa generations sårbarhetsanalyser Sveriges största plattform för automatiserade & kontinuerliga sårbarhetsanalyser. Som bara blir bättre.

Read more

Get started

CLOSE

Alok Sahay Country Manager India Saarc

Alok Sahay,
Sales Director, India
alok.sahay@holmsecurity.com
+91 8800-67 77 99

Welcome to India!

Hi! My name is Alok and I'm your local representative in India.

Looking for a cyber security solution and vulnerability management? Let's talk! 

View products

Book demo

CLOSE

Stefan-Thelberg

Stefan Thelberg,
CEO, Sweden
stefan.thelberg@holmsecurity.com
+46 (0)739-99 33 12

Welcome to Norge!

Vi guidar dig gneom nästa generations sårbarhetsanalyser Sveriges största plattform för automatiserade & kontinuerliga sårbarhetsanalyser. Som bara blir bättre.

Read more

Get started

CLOSE

Stefan-Thelberg

Stefan Thelberg,
CEO, Sweden
stefan.thelberg@holmsecurity.com
+46 (0)739-99 33 12

Welcome to Malaysia

Vi guidar dig gneom nästa generations sårbarhetsanalyser Sveriges största plattform för automatiserade & kontinuerliga sårbarhetsanalyser. Som bara blir bättre.

Read more

Get started

System & Network Scanning

Our automated and continuous system and network scanner provides unparalleled coverage and comprehensive insight to enable you to detect vulnerabilities, assess risk, find blank spots and prioritize remediation for every asset, in every environment - public, local, cloud, IoT, container as well as OT and SCADA.

KEY FEATURES

All-in-one platform

We provide all the features and functions you need to discover, assess, prioritize and remediate vulnerabilities. Simple and efficient.

repeat-duotone-darkblue
Automatic & continuous

Just in a month there are thousands of new known vulnerabilities. Scheduled and continuous scans find new vulnerabilities fast.

shield-check-duotone
Systematic & proactive

Our platform provides a great foundation for systematic and risk-based work with your cyber security defense.

cyber security risk-based
Risk-based

Don’t get lost by all the data. Our platform helps you understand what vulnerabilities to remediate first through a number of automated and simple tools.

cyber security complete coverage
Complete coverage

We cover every asset in every environment - public, local, cloud, IoT, containers as well as OT and SCADA.

VULNERABILITIES

Finding over 80 000 vulnerabilities

It has never been easier to put a new system out in production, and IT environments are growing fast. How do you keep track of all your assets and their vulnerabilities? Don’t worry, let us help you.

computer-classic-duotone
Outdated systems

Finds vulnerabilities in outdated operating systems, services, and software.

cyber security misconfiguration
Misconfigurations

Finds all types of misconfigurations, like insufficient permissions and exposed data.

question-circle-duotone
Blank spots

Continuous and automated asset discovery helps you find blank spots.

cyber security weak passwords
Weak passwords

Find default and weak passwords in systems, software, and applications. 

shield-check-duotone-pink

Planning your cyber defense?

Book a demo of our Vulnerability Management platform.

FEATURE HIGHLIGHTS

Risk-based Vulnerability Management

Our product System & Network Scanning automatically and continuously scans for an ever-increasing number of vulnerabilities. With smart functions and thereat intelligence, we help you prioritize risk to understand where to put in your efforts. 

server-duotone
Asset management 

Gain visibility into all your assets in every corner of your IT environment. 

cyber security schedule scans
Schedule scans 

Schedule scans that are running automatically in the background. 

cyber security vulnerability management
Vulnerability management 

Manage all vulnerabilities with the markets most flexible and powerful tool. Sort, prioritize and communicate within your team. 

cyber security No maintenance
Remediation  

A complete workflow for remediation, supporting integrations with external systems like Jira and TopDesk. 

cyber security monitoring
Continous Monitoring 

Rule based monitoring to get instant notifications when new vulnerabilities are found and when there are changes in the network.  

cyber security integrations
Integrations

Make Vulnerability Management a part of your work process and routine. We provide integrations with a wide range of systems like SIEM, CMDB, ticketing systems and CI/CD.  

industry-duotone
IoT, containers & OT/SCADA 

We cover every asset in every environment - public, local, cloud, IoT, containers as well as OT and SCADA.

COMPLIANCE

Meet future compliance

Along with the growing threat picture, there are new legal requirements, standards and certifications. We help you meet existing and future requirements.

  • GDPR
  • PDPA
  • NIS
  • SOX
  • HIPAA
  • ISO27001
  • PCI DSS 

TECH DETAILS

Features & functions

Our product System & Network Scanning supports a wide range of powerful features and functions for you to become successful. 

  • Discovery scanning and asset management. 
  • Unauthenticated and authenticated scanning. 
  • Supports scanning of AWS and Azure cloud infrastructure. 
  • Policy scanning based on CIS Benchmarks. 
  • Device Agent - light-weight endpoint agent (coming 2021). 
  • Passive scanning (coming 2021).
  • Compliance scans and report like OWASP, GDPR, NIS, ISO27001, PCI DSS, HIPAA, SOX etc.
  • Continuous Monitoring.
  • SAML 2.0 Single Sign-On.
  •  Role-Based Access Control (RBAC).
  • Orchestration of multiple Security Centers for large organizations.
  • Full IPv6 support.

DISTRIBUTION OPTIONS

Cloud & on-premise – one technology

Our platform can be distributed in two ways. Safe and secure from several global datacenters as a cloud service, or installed within your own infrastructure as on-premise with local storage. You simply choose what distribution option that suits your organization best. 

distribution cloud holm security
Cloud

Safe and secure management and storage in the cloud. Select what physical datacenter that suits you. Get started in just minutes.

Go with cloud

distribution on-premise holm security
On-premise

Installed and operating within your own infrastructure, with local data storage. Automatic software and vulnerability test updates.

Go with on-premise

PROFESSIONAL SERVICES

Maximum effect - maximum ROI

Product support

Continuous support from our Vulnerability Management Experts. 

Workflows & routines

We help you set up workflows and routines for success within Vulnerability Management. 

Follow-up meetings

Continuous follow-up meetings together with our Vulnerability Management experts to support the assessment and prioritization. 

Maximum advantage

Together we make sure that you’re taking advantage of all powerful features in our platform – existing as well as new ones. 

Trusted by

stadium customer holm security vikingline customer holm security kraftringen customer holm security it sam customer holm security region halland customer holm security huddinge kommun customer holm security bodens-energi-customer-holm-security citaverde-college-customer-holm-security

Words from our customers

quote

The platform is very extensive and clear

This was a new experience for us, which required extra help. The people at Holm Security are skilled and above all fun people. The entire process has been a great experience.

REMCO HAMMINK, IT MANAGER

Promessa

quote

A yearly pentest is not enough anymore nowadays

The IT-department of Risse Groep manages a big amount of personal information of their employees. We need a continuous service that adds to our traditional security systems.

Frank van den Broek, IT-Manager

Risse Groep

quote

I think that many could greatly expand their IT security with this great & affordable product

When other municipalities have been curious, I have invited them over and shown the possibilities of Holm Security VMP.

ARNE GÖRANSON, IT SECURITY MANAGER

Huddinge kommun

FAQ

Here we answer to the most frequent questions. We love to answer to questions you have about vulnerability management in general or our platform. Contant us!

What type of vulnerabilities do you find? 

We find wide range of vulnerabilitieslike outdated systems and software, misconfigurations, weak passwords, exposed data like personal data, weak encryption and male ware. 

What type infrastructure do you scan? 

We support scanning of all parts of your infrastructure; public, local, cloud, IoT, containers as well as OT and SCADA.  

Do you support authenticated scanning? 

Yes, we support both authenticated and unauthenticated scanning. With authenticated scanning you can go even deeper to find more vulnerabilities.  

Is your platform cloud of on-premise? 

Both, our platform, Holm Security VMP (Vulnerability Management Platform) can implemented as cloud service (SaaS) and on-premiseRegardless, it’s exactly the same platform - just two distribution options. 

How long does it take to get started? 

It just takes hours to get started with our powerful and easy to manage platform. Contact us and we will help you getting started today. 

Do you support Risk-Based Vulnerability Management? 

Yes, we provide a number of powerful features to support a modern Risk-Based Vulnerability Management (RBVM) approach. We also provide Professional Services to make sure you get maximum security out of your investment in our platform. 

Is there any software of hardware required?  

No, using Holm Security VMP | Cloud doesn’t require any software or hardware. But for local scanning you need to install one or multiple Scanner Appliances, which is a virtual appliance. When using Holm Security VMP | OnPrem you will need to install minimum two virtual instances. One Core Appliance and one Scanner Appliance. 

Do you support CIS benchmarks? 

Yes, we support compliance scans according to CIS benchmarks for a number of systems. Contact us and we will tell you more. 

HOLM SECURITY

Cyber Security Starts Here

The fastest and most efficient way to automated and continuous Vulnerability Management for your entire infrastructure – systems, web applications and users. All in one platform.

System & Network Scanning

Starting at

EUR

2,04

EUR

/ IP address

Monthly price based on 500 active IPs.

  • All features & functions included
  • Scan as much as you can
  • Qualified local support