CLOSE

Stefan-Thelberg

Stefan Thelberg,
CEO, Sweden
stefan.thelberg@holmsecurity.com
+46 (0)739-99 33 12

Välkommen till Holm Security!

Vi guidar dig genom nästa generations sårbarhetsanalyser Sveriges största plattform för automatiserade & kontinuerliga sårbarhetsanalyser. Som bara blir bättre.

Läs mer

Boka demo

CLOSE

Stefan-Thelberg

Stefan Thelberg,
CEO, Sweden
stefan.thelberg@holmsecurity.com
+46 (0)739-99 33 12

Welcome to UK!

Vi guidar dig gneom nästa generations sårbarhetsanalyser Sveriges största plattform för automatiserade & kontinuerliga sårbarhetsanalyser. Som bara blir bättre.

Read more

Get started

CLOSE

Alok Sahay Country Manager India Saarc

Alok Sahay,
Sales Director, India
alok.sahay@holmsecurity.com
+91 8800-67 77 99

Welcome to India!

Hi! My name is Alok and I'm your local representative in India.

Looking for a cyber security solution and vulnerability management? Let's talk! 

View products

Book demo

CLOSE

Stefan-Thelberg

Stefan Thelberg,
CEO, Sweden
stefan.thelberg@holmsecurity.com
+46 (0)739-99 33 12

Welcome to Norge!

Vi guidar dig gneom nästa generations sårbarhetsanalyser Sveriges största plattform för automatiserade & kontinuerliga sårbarhetsanalyser. Som bara blir bättre.

Read more

Get started

CLOSE

Stefan-Thelberg

Stefan Thelberg,
CEO, Sweden
stefan.thelberg@holmsecurity.com
+46 (0)739-99 33 12

Welcome to Malaysia

Vi guidar dig gneom nästa generations sårbarhetsanalyser Sveriges största plattform för automatiserade & kontinuerliga sårbarhetsanalyser. Som bara blir bättre.

Read more

Get started


Vulnerability Management

Security assessments - how does it work?

Security assessments are carried out by individuals who are unclear as to the quality of the...

Feb 1, 2021

Vulnerability Assessment

What is vulnerability assessment?

Vulnerability assessment or vulnerability management can be described as looking for unlocked...

Jan 31, 2021

Pen. Testing

How to combine vulnerability management & penetration testing

What is what and how are these two methods used together? Holm Security explains the methods....

Jan 27, 2021

Vulnerability Management

The impact of Schrems II - is data transfer still safe?

The Schrems II ruling disqualifies the transfer and processing of personal data from EU...

Nov 4, 2020

Security Tips & Tricks

Outsourcing & vulnerability assessment – a perfect combo

More than 70% of all organizations outsource their IT to a greater or lesser extent and it’s...

Nov 26, 2018

Vulnerability Management

Vulnerability in Episerver detected by Holm Security

Holm Security’s security team is working hard to detect new vulnerabilities in widely used CMS...

Mar 23, 2018