What methods can be used for scanning cloud and cloud security?

Holm Security provides many ways to find vulnerabilities in cloud resources, services, and infrastructure:

  1. Scan cloud infrastructure and services using our scanner in the product System & Network Scanning.
  2. Scan inside of cloud infrastructure by using our product System & Network Scanning with one or more Scanner Appliances (local scan probes) in your Microsoft Azure or AWS (Amazon Web Services) environment.
  3. Scan your cloud resources in Microsoft Azure, AWS, and using CSPM (Cloud Security Posture Management) using your cloud platforms API. We call this product Cloud Scanning.


Have more questions? Submit a request


Please sign in to leave a comment.