Kenna Security is now part of Cisco

|Learn more

Cover Your Assets

Apr 26, 2011
Ed Bellis
Chief Technology Officer, Co-founder

Share with Your Network

Here at HoneyApps, we are big proponents of leveraging data to help make decisions. We subscribe to the New School of Security and use both quantitative and qualitative information to aid in decision support. This also influences our product roadmap and feature set. This is why we’re happy to share with you our newest connector.

As part of building out our VMaaS, we find a LOT of information about an organization’s assets from their vulnerability assessment applications, static analysis tools, and configuration scanners. Our customers use this data in many ways including grouping vulnerabilities, tying assets together into systems, ranking and prioritizing remediation, measuring assessment and scanner coverage, and verifying CMDBs. So we thought, why not supplement this data with even more information about the assets on the network?

With this in mind, we built out the Nmap connector. With our newest connector, our customers can now import all of their data from their Nmap scans into our VMaaS. This data can both supplement existing assets within our service as well as create new assets. This data will assist our customers with the tasks listed above, as well as give them the ability to understand how vulnerabilities on related assets and networks can create greater risks through blended threats. While we can imagine a number of different ways this new data will help our customers in securing their assets, we are always surprised by the new and creative ways our service is used with unexpected benefits.

We’d love to see how you could make use of this data when combined with all the vulnerability and configuration information aggregated and correlated by our service. If you’d like to try it out free for 30 days, take a minute to sign up.

Read the Latest Content

Research Reports

Prioritization to Prediction Volume 5: In Search of Assets at Risk

The fifth volume of the P2P series explores the vulnerability risk landscape by looking at how enterprises often view vulnerabilities.
DOWNLOAD NOW
eBooks

5 Things Every CIO Should Know About Vulnerability Management

If you view vulnerability management (VM) as just a small part of your operation, it might be time to take another look.  Managing vulnerabilities is...
DOWNLOAD NOW

Videos

Videos

Get Started Using the Exploit Prediction Scoring System (EPSS).

Cyentia Institute’s Chief Data Scientist and Founder Jay Jacobs gives tips on how to get started using the Exploit Prediction Scoring System (EPSS). You...
READ MORE
FacebookLinkedInTwitterYouTube

© 2022 Kenna Security. All Rights Reserved. Privacy Policy.