Kenna Security is now part of Cisco

|Learn more

Plowing Through Vulns At 100 MPH

May 7, 2012
Ed Bellis
Chief Technology Officer, Co-founder

Share with Your Network

We’ve been hard at work making sure Risk I/O is a flexible and fast platform for managing vulnerabilities and defects for our customers. One of the most used features has always been bulk editing of assets. By prioritizing and tagging assets in large quantities, our customers are able to quickly create meta data describing their environment. This results in very customized prioritization, views and reporting of their vulnerabilities.

With our latest production build, our customers can now apply this mass amount of meta data to their vulnerabilities as well. With a quick search and select, you’re able to edit hundreds of vulnerabilities in a matter of seconds. There are more use cases for this than we could pretend to imagine. Rather than try to spell them all out here, we decided to post a short video of one example below. Take a look and then login and try it for yourself.

Of course if you don’t have an account, you can always sign up for free. We’d love to hear how you are using custom fields and meta data to manage your vulnerabilities. Leave us a comment or send us an email at hello@risk.io to fill us in.

Read the Latest Content

Research Reports

Prioritization to Prediction Volume 5: In Search of Assets at Risk

The fifth volume of the P2P series explores the vulnerability risk landscape by looking at how enterprises often view vulnerabilities.
DOWNLOAD NOW
eBooks

5 Things Every CIO Should Know About Vulnerability Management

If you view vulnerability management (VM) as just a small part of your operation, it might be time to take another look.  Managing vulnerabilities is...
DOWNLOAD NOW

Videos

Videos

Get Started Using the Exploit Prediction Scoring System (EPSS).

Cyentia Institute’s Chief Data Scientist and Founder Jay Jacobs gives tips on how to get started using the Exploit Prediction Scoring System (EPSS). You...
READ MORE
FacebookLinkedInTwitterYouTube

© 2022 Kenna Security. All Rights Reserved. Privacy Policy.