# Holm Security VMP Software Pricing, Alternatives & More 2026 | Capterra

> With the help of Capterra, learn about Holm Security VMP Software - reviews, pricing plans, popular comparisons to other Vulnerability Management products and more.

Source: https://www.capterra.com/p/209427/Holm-Security-VMP/alternatives

---

# 

 Holm Security VMP Software Review 2026: Features, Reviews, Integrations, Pros & Cons

Last updated on March 13, 2026

Provider data verified by our Software Research team, and reviews moderated by our Reviews Verification team.

[Description](#description)[Use cases](#use-cases)[Alternatives](#alternatives)[Features](#features)[Pricing](#pricing)[Support](#support)[Reviews](#reviews)

Holm Security VMP

## What is Holm Security VMP?

Holm Security's Next-Gen Vulnerability Management Platform helps our customers to identify and remediate vulnerabilities in their IT environment. The platform provides complete coverage, and comprehensive insight in order to automatically detect vulnerabilities, assess risk and prioritize remediation for every asset in your organization, including humans. Secure your cyber security posture through complete asset coverage and unified vulnerability management, all in one platform.

## What is Holm Security VMP used for?

[Vulnerability Scanner](https://www.capterra.com/vulnerability-scanner-software/)[Vulnerability Management](https://www.capterra.com/vulnerability-management-software/)[Cybersecurity](https://www.capterra.com/cybersecurity-software/)

Top alternative

Featured

Overall rating

Based on 5 user reviews

Reviews sentiment

Positive

\-

Neutral

\-

Negative

\-

Starting price

€1000

Per Feature, Per Year

Free trial  
available

Capterra Shortlist charts the highest-rated and most popular products...

Our "Best of" badge program showcases products with the highest ratings...

Our "Best of" badge program showcases products with the highest ratings...

Do you work for Holm Security VMP?[Manage this product listing](https://digitalmarkets.gartner.com/get-listed/claim-bx?url=http://holmsecurity.com&name=Holm Security VMP)

## Compare with a popular alternative

Capterra selects software alternatives based on relevant features, verified user reviews and user interactions. Placement may be influenced by client status.

### Holm Security VMP

4.4 (5)

VS.

[4.7 (26)](https://www.capterra.com/p/171539/Netsparker-Web-Application-Security-Scanner/reviews/)

Starting Price

€1000

Per Feature, Per Year

Starting Price

Contact vendor

Free Trial

Free Version

Pricing Options

Free Trial

Free Version

Ease Of Use

4.2 (5)

Ease Of Use

4.5 (60)

Value For Money

4.8 (4)

Value For Money

4.2 (53)

Customer Service

4.3 (4)

Customer Service

4.5 (57)

## Holm Security VMP alternatives

[4.7 (6)](https://www.capterra.com/p/10015770/Aikido/#reviews)

Starting price

Contact vendor for pricing

[Orca Security](https://www.capterra.com/p/188445/Orca-Security/)

[4.8 (60)](https://www.capterra.com/p/188445/Orca-Security/reviews/)

Starting price

Contact vendor for pricing

[Learn More](https://www.capterra.com/p/188445/Orca-Security/)

Highest Rated

[Enginsight](https://www.capterra.com/p/183883/Enginsight/)

[5.0 (6)](https://www.capterra.com/p/183883/Enginsight/#reviews)

Starting price

$8.91

Per User, Per Month

[Learn More](https://www.capterra.com/p/183883/Enginsight/)

[Versio.io](https://www.capterra.com/p/198825/Versio-io-CMDB/)

[4.5 (2)](https://www.capterra.com/p/198825/Versio-io-CMDB/#reviews)

Starting price

$1.00

Per User, Per Month

[Learn More](https://www.capterra.com/p/198825/Versio-io-CMDB/)

## Features

Features with the highest number of reviews are displayed first. Those that have no reviews appear next, sorted alphabetically.

Vulnerability Assessment

4.2 (5)

80.00% of 5 reviewers that rated this feature as important or highly important

The process of identifying, quantifying, and prioritizing the vulnerabilities in a system.

Vulnerability Scanning

4.2 (5)

60.00% of 5 reviewers that rated this feature as important or highly important

Discover patch statuses and vulnerabilities

Alerts/Notifications

5.0 (3)

100.00% of 3 reviewers that rated this feature as important or highly important

Alerts or notifications of various types such as pop-up messages, sounds, banners, or badges

Network Scanning

4.7 (3)

66.67% of 3 reviewers that rated this feature as important or highly important

Scanning networks to identify security threats

Reporting/Analytics

4.3 (3)

66.67% of 3 reviewers that rated this feature as important or highly important

View and track pertinent metrics to find patterns and gain insights from data

Risk Assessment

4.3 (3)

66.67% of 3 reviewers that rated this feature as important or highly important

Initiate collection and analysis of known risks

Holm Security VMP 41 features

Dashboard to view the status of ongoing processes, identify current incidents and track past activities

Track and document all activities across devices, networks, and other systems

Alerts or notifications of various types such as pop-up messages, sounds, banners, or badges

Application programming interface that allows for integration with other systems/databases

Creation, administration, and evaluation of assessments or tests

Identifies out-of-policy certificates and shows you how many were found in the environment and how many certificates each one issued.

Identify and respond to security threats to cloud applications

A set of guidelines regarding cloud security management

Track and manage adherence to policies for any service, product, process, or supplier

Alter the layout and content of reports

Graphical representation of data

Receive and/or send email notifications for urgent updates, requests, or other information

A chronological record of actions or occurrences within a network, software, or process

Monitor and control network/web traffic based on predetermined rules, protecting against unauthorized access and threats

Compliant with HIPAA, which sets standards for sensitive patient data protection

Observe and track the demand, usage, progress or quality of a system, product, or user

Scanning networks to identify security threats

Prevent and monitor unauthorized access, misuse, modification, or denial of a computer network and network-accessible resources

Store, process, and transmit cardholder data in compliance with the Payment Card Industry Data Security Standard (PCI DSS)

A simulated attack attempting to gain access to resources that they should not have access/permissions to perform operations.

Arrange tasks based on the level of priority or urgency

Notifications that are delivered to users as soon as an event occurs

Collection, analysis, and representation of numerical data and generation of reports to understand various patterns

View and track pertinent metrics to find patterns and gain insights from data

Notifying as a warning or reminder of a potential or imminent hazard

Analyze potential risks across the organization

Initiate collection and analysis of known risks

Process of identifying, evaluating, mitigating, addressing and reporting on potential risks or uncertainties

Search and filter data across systems to locate required information by entering keywords or certain criteria

Systematic evaluation of the security of a company's overall security system and situation

Track the status over time for a request, process, asset, or transaction

Set up connections to third-party platforms to improve business processes

Information to prevent, understand and identify cyber threats

Protect incoming and outgoing communications against malware, spam, display spoofing, and other threats

Manage user accounts, profiles, roles, permissions, and other details across applications, devices or networks

The process of identifying, quantifying, and prioritizing the vulnerabilities in a system.

Detect (and block) vulnerabilities and threats in your applications based on vulnerability information

Safeguards to protect network vulnerabilities

Discover patch statuses and vulnerabilities

Classify levels of threat and organize actions based on priorities

Identify and respond to security threats to web applications

Features

3.8 (5)

3.8

Based on 5 reviews

## Pricing

Value for money

4.8 (4)

Free Trial

Basic

€1,000

Per Feature,Per Year

Value for money

4.8 (4)

4.8

Based on 4 reviews

## Support, customer service and training options

Customer Service

4.3 (4)

Support

-   Email/Help Desk
-   FAQs/Forum
-   Knowledge Base
-   Phone Support
-   24/7 (Live rep)
-   Chat

Training

-   In Person
-   Live Online
-   Webinars
-   Documentation
-   Videos

Deployment

-   Web
-   Android
-   iPhone/iPad

Typical users

-   Freelancers
-   Small businesses
-   Mid size businesses
-   Enterprises

Customer Service

4.3 (4)

4.3

Based on 4 reviews

## User reviews

Overall rating

4.4

Based on 5 reviews

Filter by rating

5(3)

4(1)

3(1)

2(0)

1(0)

Mentioned topic

Sorted by most recent

AD

Ayan D.

Security Operations Manager

Hospital & Health Care

### "Great product with ease of use "

5.0

Overall Rating

5.0

5.0

Ease of Use

5.0

5.0

Features

4.0

4.0

Customer Service

4.0

4.0

Likelihood to Recommend

9/10

July 25, 2023

Very helpful for external scaning of our internet facing nodes

Pros

Excellant user interface and easy to use. Can be deployed quikly in the environment.

Cons

Risk rating of vulnerabilities could have been a bit more specific and easy to understand

Alternatives considered

[Qualys Cloud Platform](https://www.capterra.com/p/82971/QualysGuard-Enterprise/)

Reasons for choosing Holm Security VMP

Cost advantage

Review source

Incentivized review: software users are invited to submit an honest review and offered a nominal incentive for their time and effort. All incentivized reviews are subject to our verification process prior to publication.

SS

Soeren S.

Chief Information Security Officer

Consumer Services

### "Holm Security ist eine ausgezeichnete Wahl für einen Schwachstellenscanner"

5.0

Overall Rating

5.0

5.0

Ease of Use

4.0

4.0

Features

4.0

4.0

Customer Service

5.0

5.0

Likelihood to Recommend

8/10

July 18, 2023

Für den Versand und Erhalt von Testemails mit Testcontent muss mehr sehr umfangreiche Firewall Regeln und Ausnahmen einstellen

Pros

Es ließ sich einfach installieren und lieferte in aktzeptabler Zeit ausreichende Ergebnisse.

Cons

Es gibt eine höhere Aktzeptanz, wenn man die Sprache ändern könnte und es auf "deutsch" einstellen kann

Reasons for choosing Holm Security VMP

Der Vertriebsmitarbeiter hat mich nach Schilderung verstanden

Review source

Incentivized review: software users are invited to submit an honest review and offered a nominal incentive for their time and effort. All incentivized reviews are subject to our verification process prior to publication.

AT

Anton T.

Information Security Assurance Manager

Hospital & Health Care

### "Affordable security"

3.0

Overall Rating

3.0

3.0

Ease of Use

3.0

3.0

Features

2.0

2.0

Customer Service

0.0

0.0

Likelihood to Recommend

5/10

July 18, 2023

Lacks some features, such as super users and system owner roles and to be able to assign tasks.

Pros

From my understanding its fairly cheap, many security tools are very expensive.

Cons

I really dislike the brute force attacks on systems during business hours, might be a setting, but it's annoying.

Review source

Incentivized review: software users are invited to submit an honest review and offered a nominal incentive for their time and effort. All incentivized reviews are subject to our verification process prior to publication.

MG

Maneesh G.

Principal Engineer

Information Technology and Services

### "Holm VA scanner and management and security awareness"

4.0

Overall Rating

4.0

4.0

Ease of Use

5.0

5.0

Features

5.0

5.0

Customer Service

4.0

4.0

Likelihood to Recommend

8/10

July 7, 2023

Great experience with Holm

Pros

VA scanning alerting and reporting and security awareness phishing mailer to all users,

Cons

False positive VA in unauthenticated scans and mitigated VA count

Review source

Incentivized review: software users are invited to submit an honest review and offered a nominal incentive for their time and effort. All incentivized reviews are subject to our verification process prior to publication.

WP

Willem P.

Senior IT Advisor

Hospital & Health Care

### "Used Holm Security VMP for a whole year now. These are the most important pros and cons."

5.0

Overall Rating

5.0

5.0

Ease of Use

4.0

4.0

Features

4.0

4.0

Customer Service

4.0

4.0

Likelihood to Recommend

10/10

July 6, 2023

In the past 12 months we have experienced Holm Security as a solid en knowledgeable security partner. The proactive monitoring and administration of our fully managed VMP could however benefit from a quality increase.

Pros

It was very easy to setup not taking a lot of time. After the initial setup, that we spend enough time on (around 1.5-2 months) to make informed choices and enable going live as soon as possible, we were up and running within one week after the initial setup. The help en support we got from Holm Security in the initial setup and going live time frame is much appreciated an dmade a quick implemantation possible. The whole project was completed within the set time frame and costs.

Cons

Around 6-8 months after going live we experienced an outage on our scanner appliances. Allthough we have a fully managed contract with Holm Security action to mitigate this outage was only started after we pointed it out to Holm Security. That is not what we would expected and was the trigger for some consulting sessions. The next day the problem was eliminated and all scanner appliances were up and running again.

Reasons for choosing Holm Security VMP

With Hols Security we were able to get in contact with locat and native speakers in our country: The Netherlands. We value and appreciate that fact very much.

Review source

Incentivized review: software users are invited to submit an honest review and offered a nominal incentive for their time and effort. All incentivized reviews are subject to our verification process prior to publication.

Independent research methodology

Capterra's researchers use a mix of verified reviews, independent research and objective methodologies to bring you selection and ranking information you can trust. While we may earn a referral fee when you visit a provider through our links or speak to an advisor, this has no influence on our research or methodology.

[Learn more](https://www.capterra.com/resources/proprietary-data-research/)

How Capterra verifies reviews

Capterra carefully verified over 2.5 million+ reviews to bring you authentic software experiences from real users. Our human moderators verify that reviewers are real people and that reviews are authentic. They use leading tech to analyze text quality and to detect plagiarism and generative AI.

[Learn more](https://www.capterra.com/resources/how-we-verify-reviews/)

How Capterra ensures transparency

Capterra lists all providers across its website—not just those that pay us—so that users can make informed purchase decisions. Capterra is free for users. Software providers pay us for sponsored profiles to receive web traffic and sales opportunities. Sponsored profiles include a link-out icon that takes users to the provider's website.

[Learn more](https://www.capterra.com/resources/how-we-ensure-transparency/)