- Knowledge base
- Product news
-
Security updates
-
Product news
-
Next-Gen Vulnerability Management
-
Getting started
-
General
-
Operating status
-
Network & System Security
-
Web Application Security
-
Cloud Security
-
API Security
-
Phishing Simulation & Awareness Training
-
Attack Surface Management
-
Scanner Appliance
-
Device Agent
-
On-premise platform deployment
-
Asset management
-
Vulnerability manager
-
Reports
-
Digest reports
-
Organizer
-
Continuous monitoring
-
Integrations
-
Platform API
-
Remediation
-
Users
-
PCI DSS
-
Terms & conditions
-
Dashboard
2025-03-25: New version available for on-premise Holm Security VMP
We’re releasing a much-improved version of our on-premise Next-Gen Vulnerability Management Platform. Existing on-premise installations will receive a software update closely after the release of the new virtual server image, early in Q2.
New installations & reinstall
This new on-premise version is available from the officially released new image (OVA). You can use this to install the new version at any time.
HTTPS proxy support for outbound connections
Outbound connections are now fully compatible with HTTPS proxy configurations, enabling seamless connectivity through a proxy to reach their target destinations.
This update supports environments where a proxy is required for internet access, ensuring greater flexibility and compliance with secure network setups.
Static route configuration for on-prem appliance
The on-prem appliance now supports static route configuration within its network settings. This enhancement allows deployment in environments with specific routing requirements, offering greater flexibility and adaptability to unique network setups. Read more here.
Ensure a proper configuration with endpoint validation connectivity tests
External endpoints can now be validated for connectivity to ensure seamless communication with the on-premise appliance. This feature helps confirm that the connection is operational, making it easier to troubleshoot and ensure proper setup.
Please note that this test only validates connectivity and does not verify additional information such as credentials.
We didn’t stop there. Other enhancements include:
A more granular RBAC
Granular Role-Based Access Control (RBAC) on the asset level with Teams and Tags. Read more here.
An improved dashboard
A new dashboard with updated widgets and customizable views. Read more here.
New integration possibilities
New integrations with products like BeyondTrust. Read more here.
Optimized scan profiles for faster scans
Updated and optimized scan profiles. Read more here.
As well as...
- Updated remote support to improve session reliability.
- The import process of new feeds can now handle situations when the appliance does not have a valid internet connection.
- Improved verbosity feedback messages when a self-signed certificate is used together with a Fully Qualified Domain Name (FQDN).
- We addressed an issue that occurred when adding and removing Scanner Appliances in the Security Center.
Important about vulnerability test updates
Vulnerability tests are updated and imported in relation to the first boot, which can take up to 40 minutes to complete. Customers can validate the vulnerability tests’ view to make sure tests have recent timestamps before running the first scan.
Limitations
Please note that the following functions are only available using cloud deployment:
- Domain asset discovery
- Device Agent
- Phishing Simulation & Awareness Training (product)
- Cloud Security (product)
- Industry benchmark widget