Demo Free trial Request quote Contact me

IoT (Internet of Things)

IoT (Internet of Things) devices and platforms are a growing security risk with the escalating number of deployments and development of devices and software solutions related to the delivery of IoT. The risk of IoT being exposed is both related to the scale of the deployments, from hundreds to millions of devices globally, to the platforms and the devices themselves. Some of the challenges with IoTs concerns outdated hardware and software, as many devices are not updated enough and are vulnerable to data leaks.

IoT platforms and the software related to IoT deployments tend to be built up by components that are already in use in other non-IoT related cases. Holm Security has worked, from the early days, to provide a solution in Security Center that covers the need that IoT requires from a vulnerability management solution.

Powerful features

Security Center provides an easy to use asset management that offers a flexible structure through dynamic and static tags, that lets you keep a track of all your IoT assets with powerful search filtering and risk overview. Vulnerabilities are identified through signatures that are updated daily to cover the most recent vulnerabilities that a system can be exposed to.

MQTT is a very popular and lightweight protocol to build IoT implementations for mobile devices and embedded systems. AMQP is a heavier variant offering more advanced features compared to MQTT. These are two examples of common protocols. Others are Websockets, RTC, and HTTP(s) using RESTful APIs. Security Center covers many layers of software implementations that are common within IoT platforms and their deployments.


Here are a few examples of software that are very common within IoT that Security Center covers:

Application Servers
  • Nginx
  • Apache HTTP Server
  • RabbitMQ
  • Apache ActiveMQ
  • IBM Websphere MQ
Database Software
  • MySQL
  • MariaDB
  • PostgreSQL
Programming Languages
  • PHP
  • NodeJS
  • Python
Operating Systems
  • Linux (Debian, Redhat, Fedora)
  • Windows
  • Docker
  • Kubernetes

Our solution

This is how we help your organization meet the challenges that IoT entails.

Remediate vulnerabilities in IoT devices
Vulnerability Manager
Information and tools for solving vulnerabilities in networks and systems, as well as web applications.
Systematic assessment of IoTs devices
Security Center
Security Center can cover several layers of software implementation, common within IoTs platforms and deployments.
Keep track of all IoT assets
Asset Management
Create a flexible structure with dynamic and static tags.