Alok Sahay Country Manager India Saarc

Alok Sahay
Sales Director India & SAARC
+91 8800-67 77 99

Welcome to India!

Hi! My name is Alok and I'm your local representative in India. Looking for a cyber security solution and vulnerability management? Let's talk! 

View products

Book demo

Faurani Ahmad Sales director Southeast Asia

Ahmad Faurani
Sales Director Southeast Asia
+60 19 434 2727

Welcome to Malaysia!

Hi! My name is Ahmad Faurani and I'm your local representative in Malaysia. Looking for a cyber security solution and vulnerability management? Let's talk! 

View products

Book demo


Cristian Miranda
Key Account Manager, Finland
+46 8-550 05 582

Tervetuloa Suomeen!

Hei! Nimeni on Cristian ja olen paikallinen edustajasi Suomessa. Etsitkö tietoturvaratkaisua ja haavoittuvuuksien hallintaa? Puhutaan!

Lue lisää



Victor Bunge Meyer
Key Account Manager, Sverige
+46 08-550 05 582

Holm Security i Sverige

Välkommen till Holm Security i Sverige! Jag heter Victor och är din lokala kontakt. Kontakta mig om du vill veta mera om vår platform för sårbarhetsanalyser. 

Läs mer här

Boka demo


Beth Murrell holm security

Beth Murrell
Account Manager, Benelux
+31-20-238 63 94

Welkom in de Benelux!

Mijn naam is Beth Murrell en ik ben uw lokale vertegenwoordiger in Nederland, België en Luxemburg. Op zoek naar een cyberveiligheidsoplossing en kwetsbaarheidsbeheer? Laten we praten!

Lees verder

Boek een demo

jens dahlkvist holm security

Jens Dahlkvist
Key Account Manager, Norge
+46 8-550 05 582

Holm Security i Norge

Velkommen til Holm Security i Norge! Jeg heter Jens og er din lokale kontaktperson.Kontakt meg hvis du vil vite mer om vår plattform for sårbarhetsanalyser.

Les mer

Personlig demo

Ronnie Jensen

Ronnie Jensen
Country Manager Denmark
+45 31 12 10 05

Holm Security i Danmark

Velkommen til Holm Security i Danmark! Mit navn er Ronnie og jeg er din lokale kontaktperson. Kontakt mig, hvis du vil vide mere om vores sårbarhedsanalyseplatform.

Læs mere

Personlig demo

Outsourcing & vulnerability assessment – a perfect combo

Image of Stefan Thelberg
Stefan Thelberg

November 26, 2018

More than 70% of all organizations outsource their IT to a greater or lesser extent and it’s continuously increasing. Outsourcing gives many advantages, but also new challenges for the IT organization. One challenge is the security assurance in the delivered service. Many times, the function is in focus, and the requirement regarding security is secondary. However, this trend is changing, and there are many effective tools to take control of your security, even if you just order IT from an organization.


You’re still responsible when outsourcing

A common misconception is that outsourcing means that the liability for, as an example, personal data in relation to GDPR is wholly or partly in the outsourcing partner's responsibility. But the legal responsibility is still yours, in being the owner of the data. Whether you outsource or not, you have the same responsibility towards authorities, laws, and recommendations. If you would leak personal data as a result of neglected security, it is your organization, not your partner, who will be held responsible.


The SLA is not a guarantee

Today a part of the outsourcing partner's offer is an SLA that describes the level of service and security to be delivered. But how do you ensure that the SLA is adhered to by your partner, as the SLA does not imply any warranty? An SLA should be considered as a guideline for how your partner should work – and not a guarantee.


Don’t evaluate your own security

A rule of thumb in IT security is not to evaluate your own security. This should be wholly or partly made by an independent party or product, or a combination of the two. Research indicates that those who evaluate their own IT security, without the help of independent parties or tools, do not get the complete comprehensive analysis and they miss out on important details. One common example is that systems that you think are safe, or systems that will be retired, are skipped. These systems might just be the ones with critical vulnerabilities today or in a near future.


Vulnerability assessment - an objective way of analyzing security

Automatic and continuous vulnerability assessment ensures good basic security in your outsourced IT environment. The vulnerability assessment provides you with an objective overview, and also provides effective methods for communicating information about vulnerabilities, both current and over time. The reports are adapted for both non-technical and technical savvy. For example, the person who is responsible for the personal data, the Data Protection Officer (DPO), can get a tailored report automatically once a month, that clearly states how vulnerable the system holding personal data is.


Collaborate – don’t monitor

In Holm Security's platform, you can work together with your outsourcing partner. You can both access the Security Center (our control panel) and be able to prioritize and discuss vulnerabilities. The platform then becomes a tool that promotes cooperation with your outsourcing partner and enables you to work more efficiently with your IT security.


5 tips when outsourcing your IT:

  • Ensure that your partner maintains a high level of security in their delivery.
  • Remember that SLAs and other agreements do not guarantee that your outsourced IT environment is secured.
  • Outsourcing does not reduce your responsibility, e.g. personal data from a legal perspective.
  • Require SLAs to be followed with continuous and automated vulnerability assessments.
  • Require that you as a customer automatically get weekly or monthly reports with a clear overview of the vulnerability status in your IT environment.