Release notes

2024-09-16: New Device Agent capabilities & proxy support Scanner Appliance

Expanded visibility of vulnerabilities for devices  

We are excited to announce expanded vulnerability capabilities using our lightweight endpoint agent, Device Agent. With this update, you'll have additional visibility into all vulnerabilities found on your systems, including vulnerabilities impacting different versions of the same application. This enhancement ensures you can detect and address a broader range of vulnerabilities, giving you deeper insights and improved security for your Microsoft Windows-based environments.  

This is being rolled out to customers over the following weeks. 

In a future release, we will add additional support for vulnerabilities related to Microsoft patch levels.  

Want to get started with our Device Agent for computers and servers? 
Email sales@holmsecurity.com if you're interested in getting started with our agent.  

Manage your Device Agents with the API 

You can now manage your Device Agents directly through the API, enabling you to list devices and efficiently manage the assignment of static tags on them.  

This feature empowers your team with greater automation and flexibility in organizing and handling device-related information, further streamlining your asset management processes.

Tags are now available in unified assets & vulnerabilities  

Tags are now fully integrated into the filtering options within the unified assets and unified vulnerabilities views. This update allows you to easily filter and manage your data based on tags, giving you additional ability to drill down on your assets and vulnerabilities using tags.  

You can now also view the tags associated with the assets directly from these pages, making it more straightforward to identify and categorize assets at a glance. 

We recommend using unified assets and vulnerabilities as your primary location to identify risks and threats. 

Scanner Appliance receives proxy support. 

We're excited to announce the upcoming rollout of the next version of our Scanner Appliance, which now includes powerful proxy support. This new functionality enables you to direct communication from the Scanner Appliance to Holm Security through an HTTP(s) proxy.  

With this enhancement, you can better control and secure the data flow between your local environment and our security platform, ensuring seamless and secure scanning capabilities within your network. 

The rollout will happen gradually over the next few weeks.  

For configuration advice, follow the instructions in the dedicated article:
https://support.holmsecurity.com/knowledge/how-do-i-use-the-scanner-appliance-proxy

Additional updates to teams and permissions  

This release further extends the teams' support within the ports and applications sections of the asset manager, giving you more granular control over which teams can access and manage specific parts of your assets and applications.  

We have also introduced cloning of teams, making it easier to create new variations of teams with different properties, such as permissions and members.

How do I clone a team?

New report template for Polish Financial Supervision Authority (KNF) 

A new report template specifically designed to meet the requirements of the Polish Financial Supervision Authority (Komisja Nadzoru Finansowego) has been made available. This new template enables organizations in Poland to streamline their reporting processes, allowing them to regularly submit their cyber security efforts in compliance with local regulations. Polish organizations can easily ensure that their security posture aligns with KNF standards, helping them stay compliant and protected. 

How do I create a KNF report?

Limitations
Please notice that the KNF report is available using cloud deployment. It will be available using on-premise deployment before the end of 2024.

Deprecation of devices view in vulnerability manager 

As a part of our continuous work to improve the platform and features, we have added the feature set to analyze assets and vulnerabilities in the unified assets and unified vulnerabilities views. We are also adding additional visibility and coverage for the Device Agent, which are better aligned with the unified views.  

As a result of these updates, we will deprecate the devices view in the vulnerability manager and enable all the use cases for this view on the unified views.  

If you need help to get started with unified views, please contact support or your customer success representative. 

Upcoming product name changes  

Scanning technology is just one of many ways that we collect vulnerability data today, alongside agents and APIs, and our platform includes Attack Surface Management (ASM) functionalities.   

We're changing our product names as a result, replacing the word "Scanning" with "Security," more accurately reflecting what our products do. 

Our new product names are: 

  • System & Network Security  
  • Web Application Security 
  • Cloud Security 
  • API Security 

We are also changing the name for Phishing & Awareness Training to: 

  • Phishing Simulation & Awareness Training.

Enhancements  

  • The Public API has received several performance optimizations when listing a large scale of assets.  
  • A new network vulnerability category has been established for Red Hat for vulnerabilities that are acknowledged but will not be patched.