CLOSE

Stefan-Thelberg

Stefan Thelberg,
CEO, Sweden
stefan.thelberg@holmsecurity.com
+46 (0)739-99 33 12

Välkommen till Holm Security!

Vi guidar dig genom nästa generations sårbarhetsanalyser Sveriges största plattform för automatiserade & kontinuerliga sårbarhetsanalyser. Som bara blir bättre.

Läs mer här

Boka demo

CLOSE

Stefan-Thelberg

Stefan Thelberg,
CEO, Sweden
stefan.thelberg@holmsecurity.com
+46 (0)739-99 33 12

Welcome to UK!

Vi guidar dig gneom nästa generations sårbarhetsanalyser Sveriges största plattform för automatiserade & kontinuerliga sårbarhetsanalyser. Som bara blir bättre.

Read more

Get started

CLOSE

Alok Sahay Country Manager India Saarc

Alok Sahay,
Sales Director, India
alok.sahay@holmsecurity.com
+91 8800-67 77 99

Welcome to India!

Hi! My name is Alok and I'm your local representative in India.

Looking for a cyber security solution and vulnerability management? Let's talk! 

View products

Book demo

CLOSE

Stefan-Thelberg

Stefan Thelberg,
CEO, Sweden
stefan.thelberg@holmsecurity.com
+46 (0)739-99 33 12

Welcome to Norge!

Vi guidar dig gneom nästa generations sårbarhetsanalyser Sveriges största plattform för automatiserade & kontinuerliga sårbarhetsanalyser. Som bara blir bättre.

Read more

Get started

CLOSE

Stefan-Thelberg

Stefan Thelberg,
CEO, Sweden
stefan.thelberg@holmsecurity.com
+46 (0)739-99 33 12

Welcome to Malaysia

Vi guidar dig gneom nästa generations sårbarhetsanalyser Sveriges största plattform för automatiserade & kontinuerliga sårbarhetsanalyser. Som bara blir bättre.

Read more

Get started

Vulnerability Management

Security assessments - how does it work?

Security assessments are carried out by individuals who are unclear as to the quality of the...

Feb 1, 2021

Vulnerability Management

What is Web Application Security?

Website security is an important part of doing business online. Your business can involve money...

Jan 30, 2021

Vulnerability Management

Nmap - what is it and how does it work?

Nmap can be a solution to the problem of identifying activity on a network as it scans the...

Jan 29, 2021

Vulnerability Management

Cyber security in the cloud - how does it work?

Cyber security in the cloud is a term that describes a service that is being offered by...

Jan 24, 2021

Vulnerability Management

Why intrusion testing?

It may seem a bit strange at first to consider hiring someone to hack into your system, but it...

Jan 22, 2021

Vulnerability Management

Why security monitoring?

Security monitoring is beginning to change in the field of Information Technology. Companies can...

Jan 20, 2021

Vulnerability Management

What is security scanning?

Security scanning, or vulnerability scanning, can mean many different things, but it can be...

Jan 12, 2021

Vulnerability Management

The impact of Schrems II - is data transfer still safe?

The Schrems II ruling disqualifies the transfer and processing of personal data from EU...

Nov 4, 2020

Vulnerability Management

Vulnerability in Episerver detected by Holm Security

Holm Security’s security team is working hard to detect new vulnerabilities in widely used CMS...

Mar 23, 2018