Kenna Security is now part of Cisco

|Learn more

Introducing Real-Time Attack Data to Risk I/O

Jun 19, 2013
Jeff Heuer
Chief of Design, Co-founder

Share with Your Network

Today we are announcing the addition of real-time attack data to our Risk I/O vulnerability intelligence platform. With this addition, our vulnerability intelligence platform now offers smarter priority sorting based on real world data, giving insight into where attacks are most likely to occur.

Using a processing engine, Risk I/O correlates live attack data from multiple sources, and prioritizes vulnerabilities based on velocity, exploitation and impact. The result is suggested vulnerabilities to remediate. We think this new feature will save your organization countless hours searching through millions of vulnerabilities to try to understand what to fix first.

To start using this feature, navigate to the Vulnerabilities page in your instance of Risk I/O and simply slide Risk Relevance to “On.” Right away, you’ll notice that the vulnerability table and heads-up display content will update to the highest priority vulnerabilities.

Turning the Risk Relevance slider to “On” will generate the highest priority vulnerabilities.

Once your list is generated, you can use the sliders below to filter your list based on score, severity, threat and priority. The Trending and Top Exploits filters give you additional information on the vulnerabilities that are the most important to address first.

Filter your vulnerability results by a number of factors, including “Trending” and “Top Exploits.”

Think you’ll need to access your search results at another time? Search filters can also be saved for use later.

Risk relevance search filters can be saved for use later.

Give this new feature a spin in your instance of Risk I/O today to better understand your data’s risk relevance. We think you’ll appreciate the time it saves to quickly reduce your risk exposure.  If you don’t already have a Risk I/O account, you can create one for free.

Read the Latest Content

Research Reports

Prioritization to Prediction Volume 5: In Search of Assets at Risk

The fifth volume of the P2P series explores the vulnerability risk landscape by looking at how enterprises often view vulnerabilities.
DOWNLOAD NOW
eBooks

5 Things Every CIO Should Know About Vulnerability Management

If you view vulnerability management (VM) as just a small part of your operation, it might be time to take another look.  Managing vulnerabilities is...
DOWNLOAD NOW

Videos

Videos

Get Started Using the Exploit Prediction Scoring System (EPSS).

Cyentia Institute’s Chief Data Scientist and Founder Jay Jacobs gives tips on how to get started using the Exploit Prediction Scoring System (EPSS). You...
READ MORE
FacebookLinkedInTwitterYouTube

© 2022 Kenna Security. All Rights Reserved. Privacy Policy.