Kenna Security is now part of Cisco

|Learn more

Kenna Earns Major Recognition for Our Risk-Based Approach

Sep 27, 2018
Karim Toubba
Chief Executive Officer

Share with Your Network

From the beginning, Kenna Security has focused on giving organizations a new way to approach cybersecurity by focusing on reducing risk by predicting, preventing, and pre-empting attacks—before they happen. We are pioneers in this risk-based approach, and I am so proud of our team for continuing to push the boundaries of what is possible to help our customers secure their organizations.

That is why it’s so rewarding, and I am so pleased to tell you, that we have received two recent awards highlighting the innovation we’re bringing to the marketplace by using data science to help our customers manage risk within their enterprise.

For the Software-as-a-Service Awards, we took “Best Security Innovation in a SaaS Product,” beating out a very impressive shortlist. It’s a tough competition that accepts entries from across the globe, from startups to established enterprises.

We’ve also been named the winner of the “Enterprise Risk Management (ERM) Software of the Year” award from CyberSecurity Breakthrough. Again, Kenna was able to shine against a backdrop of very diverse companies.

These awards are a validation of the idea that underpins our platform—that a proactive, risk-based approach is a better way for organizations to protect themselves from cyberthreats.

If you are a CISO or a CIO looking to reduce cyber risk, the truth is that you’re looking at a crowded marketplace. It’s hard to know where to start when evaluating security vendors.

It’s encouraging that the market is increasingly recognizing the value of what we’ve been working on for over seven years. A fundamental shift in risk management can have a dramatic impact on the efficacy of security teams and an organization as a whole. We look forward to sharing more on Kenna Security and how we’re helping organizations protect themselves.

I hope you’ll stay tuned for more good news to come. In the meantime, I invite you to learn more about how our technology works.

Read the Latest Content

Research Reports

Prioritization to Prediction Volume 5: In Search of Assets at Risk

The fifth volume of the P2P series explores the vulnerability risk landscape by looking at how enterprises often view vulnerabilities.
DOWNLOAD NOW
eBooks

5 Things Every CIO Should Know About Vulnerability Management

If you view vulnerability management (VM) as just a small part of your operation, it might be time to take another look.  Managing vulnerabilities is...
DOWNLOAD NOW

Videos

Videos

Get Started Using the Exploit Prediction Scoring System (EPSS).

Cyentia Institute’s Chief Data Scientist and Founder Jay Jacobs gives tips on how to get started using the Exploit Prediction Scoring System (EPSS). You...
READ MORE
FacebookLinkedInTwitterYouTube

© 2022 Kenna Security. All Rights Reserved. Privacy Policy.