Holm Security Vulnerability Management Platform
Protects your organisation by detecting vulnerabilities before any malicious person or organisation does. The platform includes vulnerability assessment for networks and websites, risk analyses for social engineering and a variety of tools that facilitate continuous safety work.
The platform helps you and your management to see how secure your IT environment and your users are against external threats such as hackers – whether you manage your own IT environment or outsource. You can manage the service easily and efficiently with our web-based Security Centre control panel. The platform is delivered from ultramodern and secure data centres
The most efficient way to understand your security
Take control of the security of your networks and systems with our network scanning. The service scans for more than 58,000 vulnerabilities. Irrespective of whether you manage all of your IT yourself or outsource, our network scanning is the most effective way to understand how secure you are against external threats, to rectify vulnerabilities and increase your cyber security requiring only a small investment in time. The service offers a range of GDPR and NIS compliance support functions.
Automated and continuous scanning of network and systems
Our network scanning automatically and continuously scans your networks and systems for an ever-increasing number of vulnerabilities. Network scanning detects vulnerabilities related to old software, exposed services and functions, misconfigured systems, weak passwords etc. In addition, the service automatically maps your network to give you a clear overview of all your systems – regardless of geographical location and whether you manage all your IT yourself or outsource all or part of your IT environment.
Using comprehensive information, smart and effective tools as well as our support and specialist help, you or your IT partner can effectively prioritise and rectify detected vulnerabilities before they are exploited by a malicious person.
In parallel with a scheduled scanning of your networks and systems, you can scan on demand at any time, for example in connection with changes and commissioning.
Covering the entire IT environment
Our cloud scanners scan your public networks and systems, accessible via the Internet. By installing one or more Scanner Appliances in your local environments, behind your firewalls, we can scan all your networks – even if your IT environment is present in several physical locations. All scanned data collected by our Scanner Appliances is presented in our cloud-based control panel Security Center.
Vulnerability manager is a powerful tool for you to work effectively with vulnerabilities, regardless of whether you have a small number or thousands. You sort, group, ignore and prioritise the vulnerabilities in just the way that works best for you in the tool. The tool provides a range of functions for collaboration within your organisation and with external partners, such as your IT partner.
In Continuous Monitoring, you can quickly and easily set up monitoring of changes that generates notifications and alarms. This tool removes the need to work in Security Center. Instead, you will be notified when new vulnerabilities are detected, when any changes are made and when vulnerabilities have been rectified. You can easily pinpoint, for example, systems handling personal data for GDPR compliance or a specific network to obtain information about ports that are opened or closed.
The service includes a complete tool for remediation. The flow is largely automated. You set up rules for when to create cases and how to assign them. The tool supports integration with external remediation systems.
A number of ready-made templates are available in the service, and you can create your own reports – adapted for both technicians and specialists, as well as management, CEO and the board. The reports are distributed in encrypted form to, for example, your IT partner or system vendor. In parallel to creating reports automatically according to your desired schedule, you can create reports on demand at any time.
Functions for GDPR and NIS compliance
The service offers a range of GDPR and NIS compliance support functions. You can, among other things, pinpoint your personal data systems to monitor these, and automatically generate continuous reports to the data controller.