Kenna Security is now part of Cisco

|Learn more
Contact Us
Talk to an Expert
Request a demo

Kenna Named Information Security Vendor of the Year at OnCon 2021

Jul 13, 2021
Dan Mellinger
Senior Director of Corporate Communications

Share with Your Network

June was a big month for Kenna Security, and it was capped off Tuesday night when we were announced as the inaugural Information Security Vendor of the Year winner at the virtual OnCon Icon Awards ceremony. This isn’t just limited to the U.S., but a worldwide honor and the first time they’ve added the information security category.

News of the win came the same day that our acquisition by Cisco was completed, putting an exclamation mark on the end of the month.

Who voted us in

We emerged from a class of 50 finalists to win the award, which was determined by the votes of the public and our peers in the security field. Our win means even more knowing we secured the votes of customers, partners, and others following our work. The OnConferences team determined finalists based on applications and nominations, and voters were asked to choose a winner based on an organization’s exceptional products or services, strong contributions to the community through thought leadership, and innovation in the field. 

What comes next

As an industry leader, we’re always thinking about what’s next in the field of vulnerability management because our customers depend on us. We’ve spent time researching the most impactful trends and how companies can keep up with — even get ahead of — vulnerability remediation. 

In our latest report in conjunction with the Cyentia Institute, Prioritization to Prediction: Volume 7, we establish the defender advantage with a data-driven overview of some of the industry’s top concerns. The data comes from analyzing 6 billion vulnerabilities affecting more than 13,000 assets at more than 500 organizations.

Our research shows, for example, that releasing exploits before a patch can be administered is a harmful practice and the damage is quantifiable. We’ve found that the timeline of exploitation shifts an average of 98 days earlier when exploit code emerges before patches are released. 

This award and the acquisition are just the most recent signs that we’re changing the way companies think about vulnerability management, making life easier for security and IT, and reducing risk across businesses. And we’re just getting started.

Share with Your Network

Read the Latest Content

Threat Intelligence

18+ Threat Intel Feeds Power Modern Vulnerability Management

One question we often get from customers or prospective clients is why we use 18+ threat feeds and exploit intelligence feeds? Seems excessive, right? Why not just 4 or 5 feeds? Or 10? Why do we use more than 18 threat feeds and exploit intelligence feeds to power the Kenna.VM modern vulnerability management platform?  The…

READ MORE
Data Science

Ask Us About Our Data Science

What’s in a buzzword, like data science? A lot of resentment, for sure, but also a chance to explain.  A buzzword is a word or phrase, new or already existing, that becomes very popular for a period of time. Buzzwords often derive from technical terms. Yet through fashionable use, the original technical meaning disappears, and…

READ MORE
Risk-Based Vulnerability Management

What is Modern Vulnerability Management?

Modern vulnerability management is an orderly, systematic, and data-driven approach to enterprise vulnerability management. It leverages full visibility into a technology stack to target the riskiest vulnerabilities, enabling companies to adhere to designated SLA’s, respond to threats rapidly, and have meaningful discussions about organizational risk tolerance. Got that? Let’s unpack it.  To understand what modern…

READ MORE
Sign up to get the latest updates
FacebookLinkedInTwitterYouTube

© 2021 Kenna Security. All Rights Reserved. Privacy Policy.