Kenna Security is now part of Cisco

|Learn more

Development en Fuego!

Sep 6, 2011
Ed Bellis
Chief Technology Officer, Co-founder

Share with Your Network

From time to time we like to post updates on some of the more significant features and integrations we have built in to Risk I/O. In the past these posts would be sprinkled in with other content but we have been so busy lately it’s beginning to feel like we are on fire.

Hot on the heels of launching our integration with Rapid7 NeXpose, we are introducing our newest connector – nCircle ip360. Now with this simple out-of-the-box connector, our customers can pull in all their latest vulnerability scan data directly from ip360 and aggregate, correlate and rank them across their entire set of security vulnerabilities. Layer on top of that our new faceted search, asset tagging, scoring, and metrics and you suddenly have an extremely customized view into your entire set of vulnerabilities.

Want to add in data from other sources? Check out our API. We’ve worked hard to make vulnerability management simple and keep reporting flexible. We also realize this data is YOUR data and you should be able to do with it what you want. Our API allows you not only to import and integrate with all types of different systems, it also makes your data portable to take it where you need it to go.

Whoops, looks like I’ve rambled on a bit…

Want to try it out? Sign up for a free 30 day trial.

Care to tell us what vulnerability assessment tools are important to you? Fill out our survey.

Technology partner with a great idea for an integration with Risk I/O? Tell us about it.

Read the Latest Content

Research Reports

Prioritization to Prediction Volume 5: In Search of Assets at Risk

The fifth volume of the P2P series explores the vulnerability risk landscape by looking at how enterprises often view vulnerabilities.
DOWNLOAD NOW
eBooks

5 Things Every CIO Should Know About Vulnerability Management

If you view vulnerability management (VM) as just a small part of your operation, it might be time to take another look.  Managing vulnerabilities is...
DOWNLOAD NOW

Videos

Videos

Get Started Using the Exploit Prediction Scoring System (EPSS).

Cyentia Institute’s Chief Data Scientist and Founder Jay Jacobs gives tips on how to get started using the Exploit Prediction Scoring System (EPSS). You...
READ MORE
FacebookLinkedInTwitterYouTube

© 2022 Kenna Security. All Rights Reserved. Privacy Policy.