Kenna Security is now part of Cisco

|Learn more

Our Latest Integration

Mar 26, 2012
Ed Bellis
Chief Technology Officer, Co-founder

Share with Your Network

Hot on the heels of launching role-based access control which allows you to control who has access to what in Risk I/O (all the way down to the vulnerability level), we have added integration with a new vulnerability assessment tool. (Drum roll please…) We are happy to announce that integration with the Burp Scanner is now available in Risk I/O! For those not familiar with Burp, it was recently voted #1 in the web scanner category on SecTools.

PortSwigger Web Security’s Burp web scanner has become the latest vulnerability assessment integration available in Risk I/O.

With this integration, you can pull in all your latest web application vulnerability scan data directly from Burp and aggregate, correlate and rank them across your security vulnerabilities and defects. Combine this with our bug tracking and trouble ticketing tool integration, asset tagging, custom fields, scoring, data mining and metrics such as benchmarks, and Risk I/O is now the only vulnerability management needed to identify, prioritize and remediate your security vulnerabilities.

If you currently use Burp to test your web applications, then head to your Connectors tab to integrate your Burp Scanner with your Risk I/O account. Not a Risk I/O user yet? You can sign up for a free, complete version on our website.

We’ll be adding additional integrations to our list in the near future, and we welcome your feedback on this and other functionality you’d like to see added to Risk I/O.

Read the Latest Content

Research Reports

Prioritization to Prediction Volume 5: In Search of Assets at Risk

The fifth volume of the P2P series explores the vulnerability risk landscape by looking at how enterprises often view vulnerabilities.
DOWNLOAD NOW
eBooks

5 Things Every CIO Should Know About Vulnerability Management

If you view vulnerability management (VM) as just a small part of your operation, it might be time to take another look.  Managing vulnerabilities is...
DOWNLOAD NOW

Videos

Videos

Get Started Using the Exploit Prediction Scoring System (EPSS).

Cyentia Institute’s Chief Data Scientist and Founder Jay Jacobs gives tips on how to get started using the Exploit Prediction Scoring System (EPSS). You...
READ MORE
FacebookLinkedInTwitterYouTube

© 2022 Kenna Security. All Rights Reserved. Privacy Policy.