Sales Director, India
+91 8800-67 77 99
Hi! My name is Alok and I'm your local representative in India. Looking for a cyber security solution and vulnerability management? Let's talk!
+46 (0)739-99 33 12
Vi tilbyr den mest effektive metoden for å se og forstå hvor trygt hele IT-miljøet ditt er mot eksterne trusler.
Sales Director, Southeast Asia
+60 19 434 2727
Hi! My name is Ahmad Faurani and I'm your local representative in Malaysia. Looking for a cyber security solution and vulnerability management? Let's talk!
Key Account Manager, Finland
+46 8-550 05 582
Hei! Nimeni on Cristian Miranda ja olen paikallinen edustajasi Suomessa. Etsitkö tietoturvaratkaisua ja haavoittuvuuksien hallintaa? Puhutaan!
Victor Bunge Meyer
Key Account Manager, Sverige
+46 08-550 05 582
Välkommen till Holm Security i Sverige! Jag heter Victor och är din lokala kontakt. Kontakta mig om du vill veta mera om vårt system eller sårbarhetsanalyser.
Sales Development Representative, Benelux
+31-20-238 63 94
Mijn naam is Beth Murrell en ik ben uw lokale vertegenwoordiger in Nederland, België en Luxemburg. Op zoek naar een cyberveiligheidsoplossing en kwetsbaarheidsbeheer? Laten we praten!
Holm Security, currently operating in seven markets in Europe and Asia, is continuing its expansion in 2021, strengthening the organization with another 25 or employees within development and sales. The board has been further strengthened through Axel Kling - founder and former CEO of the success SaaS company Snow Software.
Holm Security, currently operating in seven markets in Europe and Asia, is continuing its...
Vulnerability Management is a cornerstone in a modern cyber security defense. But getting...
Security assessments are carried out by individuals who are unclear as to the quality of the...
Vulnerability assessment or vulnerability management can be described as looking for unlocked...
Website security is an important part of doing business online. Your business can involve money...
ZNA is one of the largest hospital networks in Belgium with healthcare institutions at 14...
Nmap can be a solution to the problem of identifying activity on a network as it scans the...
What is what and how are these two methods used together? Holm Security explains the methods....
Cyber security in the cloud is a term that describes a service that is being offered by...
It may seem a bit strange at first to consider hiring someone to hack into your system, but it...
Security monitoring is beginning to change in the field of Information Technology. Companies can...
Security scanning, or vulnerability scanning, can mean many different things, but it can be...