CLOSE

Stefan-Thelberg

Stefan Thelberg,
CEO, Sweden
stefan.thelberg@holmsecurity.com
+46 (0)739-99 33 12

Welcome to Sweden!

Vi guidar dig gneom nästa generations sårbarhetsanalyser Sveriges största plattform för automatiserade & kontinuerliga sårbarhetsanalyser. Som bara blir bättre.

Read more

Get started

CLOSE

Stefan-Thelberg

Stefan Thelberg,
CEO, Sweden
stefan.thelberg@holmsecurity.com
+46 (0)739-99 33 12

Welcome to UK!

Vi guidar dig gneom nästa generations sårbarhetsanalyser Sveriges största plattform för automatiserade & kontinuerliga sårbarhetsanalyser. Som bara blir bättre.

Read more

Get started

CLOSE

Stefan-Thelberg

Alok Sahay,
Sales Director, India
alok.sahay@holmsecurity.com
+91 8800-67 77 99

Welcome to India!

Hi! My name is Alok and I'm your local representative in India.

Looking for a cyber security solution and vulnerability management? Let's talk! 

View products

Book demo

CLOSE

Stefan-Thelberg

Stefan Thelberg,
CEO, Sweden
stefan.thelberg@holmsecurity.com
+46 (0)739-99 33 12

Welcome to Norge!

Vi guidar dig gneom nästa generations sårbarhetsanalyser Sveriges största plattform för automatiserade & kontinuerliga sårbarhetsanalyser. Som bara blir bättre.

Read more

Get started

CLOSE

Stefan-Thelberg

Stefan Thelberg,
CEO, Sweden
stefan.thelberg@holmsecurity.com
+46 (0)739-99 33 12

Welcome to Malaysia

Vi guidar dig gneom nästa generations sårbarhetsanalyser Sveriges största plattform för automatiserade & kontinuerliga sårbarhetsanalyser. Som bara blir bättre.

Read more

Get started


Company news

Axel Kling - new board member at Holm Security

Holm Security is currently operating in seven markets in Europe and Asia, and is continuing its...

Feb 18, 2021

Checklist

Checklist: 5 Steps to Successful Vulnerability Management

Vulnerability Management is a cornerstone in a modern cyber security defense. But getting...

Feb 5, 2021

Vulnerability Management

Security assessments - how does it work?

Security assessments are carried out by individuals who are unclear as to the quality of the...

Feb 1, 2021

Vulnerability Assessment

What is vulnerability assessment?

Vulnerability Assessment can be described as looking for unlocked doors, bad code, open ports,...

Jan 31, 2021

Vulnerability Management

What is "Web Application Security"?

Website security is an important part of doing business online. Your business can involve money...

Jan 30, 2021

Testimonial

Cyber security challenges in the medical field

ZNA is one of the largest hospital networks in Belgium with healthcare institutions at 14...

Jan 29, 2021

Vulnerability Management

Nmap - what is it? And how does it work?

Nmap can be a solution to the problem of identifying activity on a network as it scans the...

Jan 29, 2021

Pen. Testing

How to combine vulnerability assessment & penetration testing

What is what and how are these two methods used together? Holm Security explains the methods....

Jan 27, 2021

Vulnerability Management

IT security in the cloud - how does it work?

IT cloud security is a term that describes a service that is being offered by companies more and...

Jan 24, 2021

Vulnerability Management

Why intrusion testing?

It may seem a bit strange at first to consider hiring someone to hack into your system, but it...

Jan 22, 2021

Vulnerability Management

Why security monitoring?

Security monitoring is beginning to change in the field of Information Technology. Companies can...

Jan 20, 2021

Vulnerability Management

What is security scanning?

Security scanning can mean many different things, but it can be simply described as scanning the...

Jan 12, 2021
Show more ❯