Security Announcement Critical Vulnerabilities Discovered in ConnectWise ScreenConnect
System & Network Scanning

Manage Complex
Vulnerabilities
with
Clarity & Ease

Find vulnerabilities across all your technical assets.

OVERVIEW

Secure Your Defenses Across Technical Assets

Take control of the security of your systems and networks. We cover all parts of your infrastructure, including public and local systems, local and remote computers, network devices, cloud infrastructure, IoT, Operational Technology (OT), and SCADA. 

Complete Tool Set

Providing all the features you need to discover, assess, prioritize and remediate vulnerabilities. Simple and efficient.

Automatic & Continuous

Just in a month, there are thousands of new known vulnerabilities. Scheduled and continuous scans find new vulnerabilities fast.

Systematic & Proactive

Our platform provides a great foundation for systematic and risk-based work with your cyber security defense.

Risk-Based

Don’t get lost in all the data. Our platform helps you understand what vulnerabilities to remediate first through ransomware and exploits threat intelligence.

Automated Asset Discovery

We cover every asset in every environment and automatically discover new assets that are connected to our network. 

VULNERABILITIES

Identifying over 100,000 Vulnerabilities

It has never been easier to put a new system into production; consequently, IT environments are growing fast and in complexity every day. So how do you keep track of all your assets and their vulnerabilities? Don’t worry, we have you covered.

green icon computer classic light

Outdated Systems

Identify vulnerabilities in outdated operating systems, services, and software.

green icon triangle exclamation light

Misconfigurations

Finds all types of misconfigurations, like insufficient permissions and exposed data.

green icon square questionmark light

Blank Spots

Continuous and automated asset discovery helps you find blank spots.

green icon key skeleton light

Weak Passwords

Find default and weak passwords in systems, software, and applications.

FEATURED HIGHLIGHTS

A Market Leading Technology

Our product System & Network Scanning provides market-leading technology for automatic and continuous scans for an ever-increasing number of vulnerabilities. With threat intelligence, we help you prioritize to understand where to focus your efforts.

Accelerate Your Response with Faster Detection

Manage all vulnerabilities with the market's most flexible and powerful vulnerability management workflows. Sort, group,  and prioritize vulnerabilities.

Optimize the Remediation Process

A complete workflow for remediation, supporting integrations with external systems such as Jira and Top Desk.

Respond Quickly & Eliminate Delays

Get instant notifications by email, SMS, Slack, or Teams, when new vulnerabilities are found or when there are changes in your network with rule-based monitoring. 

Amplify Your Security Efforts with Integrations

Make vulnerability management a part of your work process and routine. We provide out-of-the-box integrations with a wide range of systems like SIEM, CMDB, patch management, ticketing systems, and CI/CD. Read more about integrations here.

Meet Today's & Future Compliance

Along with the growing threat picture, there are new legal requirements, directives, standards, recommendations, and certifications that are continuously introduced. We help you meet existing and future requirements such as NIS, NIS 2, GDPR, ISO27001, and PCI DSS.

DEPLOYMENT OPTIONS

Cloud-based vs. On-Prem

CLOUD

Get Started In Hours - Fast & Powerful

Our Cloud-based deployment option is a comprehensive solution for automated and continuous vulnerability management with zero system requirements. It supports all sizes of organizations, all environments, and regardless of previous experience within Vulnerability Management. It only takes a few hours to get started with our powerful and easy-to-manage platform.

green icon shield check light

Best Choice for Data Privacy

Local data storage in your region and neutral company control. We provide the best choice for data privacy and data protection in the industry.

Green icon radar

Public & Local Scanning

Our Cloud-based platform enables you to scan public systems as well as local infrastructure. Simple and powerful, giving comprehensive asset coverage.

ON-PREM

For High-Security Demanding Organizations

Our On-prem deployment option is a comprehensive solution for automated and continuous vulnerability management that meets the demands of organizations that require high-security products, such as government organizations, the military, police, and secret service organizations.

green icon server

Local Deployment - Local Storage

The platform is installed in your virtual environment supporting all common virtualization platforms. No data is communicated over the internet, meaning no data leaves your organization.

green icon shield check light

For High-Security Organizations

Our on-premise platform meets the demands of organizations that require high-security products, such as government organizations, the military, police, and secret service organizations.

frequent questions

FAQ

Here we answer the most frequent questions about our System & Network Scanning feature.

What Type of Vulnerabilities Do You Find?

We find a wide range of vulnerabilities, like outdated systems and software, misconfigurations, weak passwords, exposed personal data, weak encryption, and malware.

What Type of Infrastructure Do You Scan?

We support scanning of all parts of your infrastructure, including local systems, local and remote computers, network devices, cloud infrastructure, IoT, Operational Technology (OT), and SCADA. 

Do You Support Authenticated Scanning?

Yes, we support both authenticated and unauthenticated scanning. With authenticated scanning, you can go even deeper to find more vulnerabilities.

Do You Support Policy Scanning

Yes, we support policy scanning based on CIS Benchmarks. Holm Security is a CIS (Center of Internet Security) certified scanning vendor.

How Long Does it Take to Get Started?

It only takes a few hours to get started with our powerful and easy-to-manage platform. Contact us and we will help you get started today.

Is There Any Software or Hardware Required?

If you choose Holm Security VMP | Cloud no 3rd party software or hardware is required. But for local scanning, you need to install one or multiple Scanner Appliances, which is a virtual appliance. If you choose to deploy Holm Security VMP | OnPrem you will need to install a minimum of two virtual instances. One core appliance and one Scanner Appliance. 

What Is a System and Network Scanner?

A system and network scanner is a tool that allows you to assess the security of your systems and networks. It can be used to test for vulnerabilities, determine if any patches are available, and even provide recommendations on how to fix any problems.

What is Vulnerability Scanning?

Vulnerability scanning is the automated process of discovering security flaws or weaknesses in your systems, network devices, and software applications. Scanning is carried out through a set of network communication towards your systems.

How Do You Perform a Network Vulnerability Assessment?

A network vulnerability assessment involves running automated scanning against your systems using a vulnerability scanner. The vulnerability scanner can be installed locally in your network and/or a cloud-based scanner can be used. 

How Do You Find Network Vulnerabilities?

Network vulnerabilities can be found in various ways, but one of the most common ways to find software vulnerabilities is to identify the software version and compare it to a database of known vulnerabilities (CVEs).

What Is a Network Vulnerability?

A network vulnerability is a flaw or weakness in a software program or operating system that could allow unauthorized users to take control of the system, access data without authorization, and/or sabotage a system to make it malfunction.

What Is a Network Vulnerability Scanner?

Network vulnerability scanners are used to find vulnerabilities in systems. They do this by communicating with the systems over the network (TCP or UDP). When a vulnerability is found, the organization is notified and provided with detailed remediation guidelines.

Do you Support CIS Benchmarks?

Yes, we support CIS Benchmarks's best practices and guidelines for securely configuring various technology systems and applications.