Automated and continuous scanning of web applications detects vulnerabilities related to bad code, misconfigured systems, weak passwords, and exposed system information and personal data.
Just in a month, there are thousands of new known vulnerabilities. Scheduled and continuous scans find new vulnerabilities fast.
Our platform provides a great foundation for systematic and risk-based work with your cyber security defense.
Don’t get lost by all the data. Our platform helps you understand what vulnerabilities to remediate first through a number of automated and simple tools.
We cover every type of web application, public as well as local. Intranets, commercial websites, portals, and more.
Our web application scanner finds a wide range of vulnerabilities in your web applications.
Along with the growing threat picture, there are new legal requirements, standards, and certifications. We help you meet existing and future requirements.
In many cases coming up with solutions that have resulted in improvements and new functions to the product. Holm Security has listened when I have had opinions about the platform.
ARNE GÖRANSON, IT SECURITY MANAGER
It is impossible for us to always be up-to-date and have the expertise to recognize and solve all vulnerabilities. Holm Security supports us in being carefree.
MARTIJN VAN HOORN, IT MANAGER
We now know what is running within our terminals and their security status, providing a starting point for optimizing our IT even further. It strikes me positively how human-centric Holm Security is. I’m not just waived off with an email or ticket.
PATRICK MAST, IT DIRECTOR
Our platform can be distributed in two ways. Safe and secure from several global datacenters as a cloud service, or installed within your own infrastructure as on-premise with local storage. You simply choose what distribution option that suits your organization best.
Security Center is our easy-to-use web-based control panel that gives comprehensive insights and helps you manage vulnerabilities. Through flexible dashboards and reports, you get a visual overview of current data, development over time, and more. Security Center supports Role-Based Access Control (RBAC).
Organizer enables different people, groups of users, departments, or countries to be given isolated access to relevant vulnerability data while maintaining a centralized administration. Get the best of two worlds – decentralized management to engage your teams, while still having support for centralized management.
To provide the best possible experience, we charge for more extensive trials and PoCs (Proof of Concepts).
There are no modules or options - everything is included. The actual cost depends on the scope of the agreement and contract length.
Here we answer the most frequent questions about Web Application Scanning.
Yes, we scan all type of web applications, such as commercial websites, intranets, portals, admin interfaces and more.
Yes, we scan for OWASP top 10 vulnerabilities according to the latest version, 2017.
Yes, we support both authenticated and unauthenticated scanning. With authenticated scanning we scan the “inside” of your applications.
It only takes a few hours to get started with our powerful and easy-to-manage platform. Contact us and we will help you get started today.
No, using Holm Security VMP | Cloud doesn’t require any software or hardware. But for local scanning, you need to install one or multiple Scanner Appliances, which is a virtual appliance. When using Holm Security VMP | OnPrem you will need to install minimum of two virtual instances. One Core Appliance and one Scanner Appliance.