Kenna & VMware Carbon Black Collaborate  
Learn More >
Contact Us
Talk to an Expert
Request a demo

2 New Awards Recognize Kenna Security as the Pioneer in Risk-Based Vulnerability Management

Feb 25, 2020
Dan Mellinger

Share with Your Network

When you pioneer a completely new approach to vulnerability management, one that goes against the grain of established industry practices and traditional solutions, it’s not unreasonable to wonder how it’ll be received. 

In our case, the reception for our risk-based vulnerability management (RBVM) approach has been nothing short of ecstatic. We’re honored to add two new awards to our trophy case that underscore both the uniqueness and the effectiveness of our platform.

For the second year in a row, Kenna Security has been awarded a Cybersecurity Excellence Award in the Vulnerability Management category.

Our innovative approach to vulnerability management, leveraging data science, has allowed us to accelerate the transformation of enterprises’ security programs. The customer response has been overwhelming. We’ve seen firsthand the impact this modern vulnerability management approach is having in driving efficiency and collaboration between security and information technology teams. This award recognizes our continued success in helping organizations to reduce their security risk.

It’s especially gratifying that this recognition comes from our peers. The Cybersecurity Excellence awards are produced by Cybersecurity Insiders and the Information Security Community on LinkedIn. The awards leverage the expertise of the community’s 400,000 experts to recognize and honor organizations, products, and individuals demonstrating cybersecurity excellence.

We also earned the Cyber Defense Magazine InfoSec Award for Most Innovative in Vulnerability Management

This award recognizes Kenna’s platform as one of the most respected and innovative InfoSec products available. Unlike its competitors, Kenna leverages both external and internal data from enterprise assets and “in the wild” threat intelligence to identify which of the multitude of vulnerabilities are most likely to pose a threat. Armed with that context, customers can intelligently predict, prepare and pre-empt likely attacks on their organization before they happen.

Kenna’s RBVM approach evolves an outdated model and has quickly become an essential solution in more than 350+ IT departments. It’s one of the reasons a massive enterprise like HSBC not only uses Kenna across its global IT division, but has invested in our company.

It’s always encouraging to have our approach recognized and lauded by peers and industry taste-makers, and we hope to share more news of awards in the months to come! In the meantime, to learn more about Kenna Security book a demo today

Share with Your Network

Read the Latest Content

Research Reports

Prioritization to Prediction Volume 5: In Search of Assets at Risk

The fifth volume of the Prioritization to Prediction series produced in conjunction with the Cyentia Institute explores the vulnerability risk landscape by looking at how enterprises often view vulnerabilities: through the lens of common asset platforms. Download the research report to learn more about the key findings: Common asset platforms and their typical risk profiles…

DOWNLOAD NOW
eBooks

5 Things Every CIO Should Know About Vulnerability Management

If you view vulnerability management (VM) as just a small part of your operation, it might be time to take another look.  Managing vulnerabilities is just as critical to IT as it is to Security and DevOps.  And it’s worth getting right: Vulnerabilities can leave your most strategic assets—and your business itself—exposed to cyber threats…

DOWNLOAD NOW

Videos

Videos

Get Started Using the Exploit Prediction Scoring System (EPSS).

Cyentia Institute’s Chief Data Scientist and Founder Jay Jacobs gives tips on how to get started using the Exploit Prediction Scoring System (EPSS). You can learn more about the Exploit Prediction Scoring System and use the interactive calculator here: https://www.kennaresearch.com/tools/e…

READ MORE
FacebookLinkedInTwitterYouTube

© 2020 Kenna Security. All Rights Reserved. Privacy Policy.