NEW Research: The Attacker-Defender Divide  
Download now >
Contact Us
Talk to an Expert
Request a demo

Kenna.VI: Handling Red Alerts at Warp Speed

Nov 5, 2020
John Alexander

Share with Your Network

If you’ve worked in operational security handling vulnerability management, I’m sure you’ve found yourself in this situation. You’ve also seen it played out time and time again if you’ve worked for a company that sells a VM scanner.

You’re sitting in the Captain’s chair and the red lights start flashing. The next big “named” vulnerability is announced, the Admiral is on the line, your First Officer is working on answers for you, and your Comms officer is feverishly working on buying you some more time…

Sound familiar?

I can feel a collective nod as all of you who’ve worked on an operational security team have surely experienced this. It’s actually a very common occurrence. In fact, this happened to a customer of ours recently. They found themselves in a similar “all hands on deck” experience but what they didn’t realize is that we already had an answer to this problem. Once our sales team connected the dots and reached out with support, this customer fired up the Kenna solution the very next day. It’s called Kenna.VI, and it’s helping companies like yours handle red alerts (high profile vulnerabilities) at warp speed. 

The common pain point here is caused by the fact that VM scanners need vulnerability signatures to be able to detect vulnerabilities. At best, this can take hours, but more typically it takes a day or more to accomplish. For those super unlucky souls, it can take close to a week. there is usually that brief blind spot, where you may not be sure that you even have the vuln present in your environment, but all you have to go on is the open source data you can find on the Internet.

Or another typical scenario: Your VM assessment provider did an incredible job working overnight and only took 30 hours to create and test the virus signatures needed to scan for this vuln. You then confirm you have the signatures needed to initiate a scan, and two hours later, you have good data to work with. 

This is where Kenna.VI comes in. It has many uses, but where it really thrives in getting you valuable vulnerability data early. Sometimes, you won’t need this enhanced insight, but there are those times when it’s painful to wait for vuln information from your scanner. Kenna.VI proactively scores every CVE in the NIST National Vulnerability Database (NVD) even if NIST hasn’t assigned a CVSS score for it yet. Even better, Kenna’s risk scores are predictive with a recorded 94% accuracy. And Kenna.VI is transparent meaning you can see the threat context data attached to the vulnerability.  

Finding yourself under attack is never fun, but that’s where Kenna.VI really shines. It’s an extra lifeline that can often mean the difference between victory or defeat. Kenna.VI gives you the critical, rich vulnerability information you need even before it hits your VM scanner. 

Add it to your arsenal.

Request a demo to see Kenna.VI in action. 

Share with Your Network

Read the Latest Content

Risk-Based Vulnerability Management

5 Stars is Cool. Best Buy is Even Better. Here’s Why.

When Jeff Heuer and I decided risk-based vulnerability management (RBVM) needed to be a thing a decade ago, we knew we were ushering in a more effective and efficient way for organizations to reduce risk. At the time, our primary aspiration was to create a solution that Security and IT executives could rely on to…

READ MORE
Threat Intelligence

15+ Threat Intel Feeds Power Modern Vulnerability Management

One question we often get from customers or prospective clients is why we use 15+ threat and exploit intelligence feeds? Seems excessive, right? Why not just 4 or 5 feeds? Or 10? Why do we use more than 15 threat and exploit intelligence feeds to power the Kenna.VM modern vulnerability management platform?  The answer is…

READ MORE
Risk-Based Vulnerability Management

Kenna Security and VMware Carbon Black Collaborate to Provide Risk Prioritization to Cloud Workloads

The challenge of cloud-based applications is that workloads may move through several different environments that can be owned and operated by vendors with different technology. With the cloud there are no well-defined boundaries. VMware Carbon Black Cloud Workload is a product that has been designed from the ground up to protect cloud workloads that operate…

READ MORE
FacebookLinkedInTwitterYouTube

© 2020 Kenna Security. All Rights Reserved. Privacy Policy.