Introducing G2.ai, the future of software buying.Try now
Chariot
Sponsored
Chariot
Visit Website
Product Avatar Image
Holm Security VMP

By Holm Security

2.5 out of 5 stars
5 star
0%
4 star
0%
2 star
0%
1 star
0%

How would you rate your experience with Holm Security VMP?

Chariot
Sponsored
Chariot
Visit Website
It's been two months since this profile received a new review
Leave a Review

Holm Security VMP Reviews & Product Details

Profile Status

This profile is currently managed by Holm Security VMP but has limited features.

Are you part of the Holm Security VMP team? Upgrade your plan to enhance your branding and engage with visitors to your profile!

Holm Security VMP Media

Holm Security VMP Demo - Security Center dashboard
Security Center is an easy-to-use web-based control panel that gives comprehensive insights and helps you manage your identified vulnerabilities. Get a visual, holistic overview of your current vulnerability data and how it has developed over time through flexible and customizable dashboards and ...
Holm Security VMP Demo - Asset manager
Manage all your assets in one place.
Holm Security VMP Demo - Vulnerability manager
Manager your vulnerabilities in one unified view.
Product Avatar Image

Have you used Holm Security VMP before?

Answer a few questions to help the Holm Security VMP community

Holm Security VMP Reviews (2)

Reviews

Holm Security VMP Reviews (2)

2.5
2 reviews

Pros & Cons

Generated from real user reviews
View All Pros and Cons
Search reviews
Filter Reviews
Clear Results
G2 reviews are authentic and verified.
MG
SOC and data security admin
Mid-Market (51-1000 emp.)
"Holm VMP"
What do you like best about Holm Security VMP?

Holm VMP is good for auth scanning and Phishing simulation and awareness exercise with multiple templates Review collected by and hosted on G2.com.

What do you dislike about Holm Security VMP?

In Holm VMP tool lot of false positive VA. They need to work false positive VA and scan engine.

Scanning failed multiple times Review collected by and hosted on G2.com.

Verified User in Information Technology and Services
CI
Small-Business (50 or fewer emp.)
"Tool for Vulnerability management"
What do you like best about Holm Security VMP?

The platform provides a broad set of functionalities, this not only includes vulnerability scanning but also user awareness (phishing) and policy scanning (hardening). Review collected by and hosted on G2.com.

What do you dislike about Holm Security VMP?

Sometimes the availability of the scanner appliances that are used (hosted on-premises) can be in question leading to scans taking longer as expected. This is however being investigated with the support of Holm Security and does not impact the outcome of the scans. Review collected by and hosted on G2.com.

There are not enough reviews of Holm Security VMP for G2 to provide buying insight. Below are some alternatives with more reviews:

1
Infosec IQ Logo
Infosec IQ
4.5
(654)
Infosec IQ awareness and training empowers your employees with the knowledge and skills to stay cybersecure at work and at home. Teach your employees to outsmart cyberthreats with over 2,000+ awareness resources and phishing simulations.
2
Hoxhunt Logo
Hoxhunt
4.8
(3,492)
Hoxhunt is a human risk management platform that combines AI and behavioral science to create and assign individualized learning paths that drive true behavior change and (measurably) lower human risk.
3
KnowBe4 Security Awareness Training Logo
KnowBe4 Security Awareness Training
4.7
(2,235)
KnowBe4 Security Awareness Training for new-school security awareness training and simulated phishing. KnowBe4 was created to help organizations manage the ongoing problem of social engineering through a comprehensive new-school awareness training approach. Organizations leverage KnowBe4 to enable their employees to make smarter security decisions and create a human firewall as an effective last line of defense.
4
Scrut Automation Logo
Scrut Automation
4.9
(1,292)
Automatically test your cloud configurations against 150+ CIS benchmarks across multiple cloud accounts on AWS, Azure, GCP and more, to maintain a strong infosec posture.
5
MetaCompliance Security Awareness Training Logo
MetaCompliance Security Awareness Training
4.6
(1,124)
MetaCompliance is a security awareness training and compliance specialist dedicated to helping businesses keep their staff safe online, secure their digital assets, and protect their corporate reputation. The cloud-based solution offers a fully integrated suite of security awareness and compliance capabilities, including policy management, privacy, eLearning, simulated phishing, and risk management.
6
SoSafe Logo
SoSafe
4.6
(801)
SoSafe’s awareness platform uses simulated phishing attacks and interactive e-learnings to sensitize, train and test employees with regards to IT security topics.
7
Hacker Rangers Security Awareness Logo
Hacker Rangers Security Awareness
4.9
(791)
Hacker Rangers is the world's first completely gamified platform for security awareness training. Gamification transforms your employees' learning process into an enjoyable experience. Leaderboards, badges, and ranks are just some of the features that Hacker Rangers offers your organization to turn the process of adopting safe habits into a real-life game. All of Hacker Rangers' educational content is created based on the nanolearning methodology: short, focused, and bite-sized lessons for your employees to easily understand how to recognize phishing messages, social engineering tricks, and other cyber threats. Animated and subtitled videos, handouts, quizzes, and much more are available! As soon as you join our Rangers team, our entire Cybersecurity Awareness Specialists team will be ready to guide the security awareness officer of your organization through the entire journey and offer insights regarding all aspects of your training program. Unleash the boundless potential of gamification to empower your employees and fortify your organization's security!
8
Wiz Logo
Wiz
4.7
(751)
Wiz is a CNAPP that consolidates CSPM, KSPM, CWPP, vulnerability management, IaC scanning, CIEM, DSPM, and container and Kubernetes security into a single platform.
9
CloudBees Logo
CloudBees
4.4
(627)
Enabling the world’s biggest and brightest companies to transition from incoherent, disconnected DevOps to self-service, fast, secure workflows connecting software delivery to business outcomes.
10
Palo Alto Cortex XSIAM Logo
Palo Alto Cortex XSIAM
4.3
(473)
Product Description: Palo Alto Networks' Cortex XSIAM is an AI-driven security operations platform designed to transform traditional Security Operations Centers by integrating and automating key functions such as data centralization, threat detection, and incident response. By leveraging machine learning and automation, it enables organizations to detect and respond to threats more efficiently, reducing manual workloads and improving overall security posture. Key Features and Functionality: - Data Centralization: Aggregates data from various sources into a unified platform, providing comprehensive visibility across the enterprise. - AI-Powered Threat Detection: Utilizes machine learning algorithms to identify anomalies and potential threats in real-time. - Automated Incident Response: Streamlines response processes through automation, enabling rapid mitigation of security incidents. - Integrated SOC Capabilities: Combines functions such as Extended Detection and Response , Security Orchestration, Automation, and Response , Attack Surface Management , and Security Information and Event Management into a cohesive platform, eliminating the need for multiple disparate tools. - Scalability: Designed to handle large volumes of data and adapt to the evolving needs of modern enterprises. Primary Value and Problem Solved: Cortex XSIAM addresses the challenges of disjointed data, weak threat defense, and heavy reliance on manual work in traditional SOCs. By centralizing data and automating security operations, it simplifies processes, enhances threat detection accuracy, and accelerates incident response times. This transformation enables organizations to proactively outpace threats, reduce operational costs, and achieve a more robust security posture.
Show More
Pricing

Pricing details for this product isn’t currently available. Visit the vendor’s website to learn more.

Product Avatar Image
Holm Security VMP
View Alternatives