Kenna Security is now part of Cisco

|Learn more
Contact Us
Talk to an Expert
Request a demo

Vulnerability Management in the Age of Zero Trust – Join us for a Live Discussion

Mar 24, 2020
Jonathan Cran

Share with Your Network

In my conversations with our customers here at Kenna, I’ve noticed a shift over the last two years. It can come up in a variety of ways, perhaps they’re using a public cloud to deploy VM agents to their application infrastructure, sometimes they’re implementing containers, and evaluating container security solutions, and increasingly, they have an endpoint protection solution that provides a vulnerability assessment capability and they’re interested in how it compares to their existing solution. 

In each case, they’re interested in how it integrates with Kenna, and how they can get the data in. Even if they have coverage from a “traditional” vulnerability assessment or management solution, there’s often a desire to have overlapping (but de-duplicated) visibility – and it’s increasingly common that their architecture doesn’t make scanning from the outside easy, and they’re looking for options. 

After thinking on this, I realized it’s not just the shift to cloud that’s driving this transition – or the success of the endpoint market, it’s more fundamental. While cloud (and really, the software defined perimeter) is accelerating the transition, it’s part of a larger shift. If you step back and look, each customer is in the process of a  transition to a least-privilege-focused, application-oriented, zero trust network architecture. 

Most organizations don’t have the development resources of an Akamai, and aren’t well suited to host their own worldwide authentication service. Not every enterprise can afford to run multiple networks in parallel as Google did, gradually moving employees to the new zero-trust network. No, few organizations have the resources and time of these Internet titans, but we can still glean helpful lessons from their experience, and use those to our advantage when moving to this model. 

This Thursday – at 11 a.m. PT/2 p.m. ET – join me as we look at how successful organizations have made, or are in the middle of making this transition, and what we – as vulnerability management and proactive security professionals – can do to get ahead. We’ll discuss how you can use the zero trust initiative and increased emphasis on work from home to increase your vulnerability management capabilities, and dive into key technologies you’ll need to be familiar with as part of the transition. 

Click here to register. 

Read the Latest Content

Research Reports

Prioritization to Prediction Volume 5: In Search of Assets at Risk

The fifth volume of the P2P series explores the vulnerability risk landscape by looking at how enterprises often view vulnerabilities.
DOWNLOAD NOW
eBooks

5 Things Every CIO Should Know About Vulnerability Management

If you view vulnerability management (VM) as just a small part of your operation, it might be time to take another look.  Managing vulnerabilities is...
DOWNLOAD NOW

Videos

Videos

Get Started Using the Exploit Prediction Scoring System (EPSS).

Cyentia Institute’s Chief Data Scientist and Founder Jay Jacobs gives tips on how to get started using the Exploit Prediction Scoring System (EPSS). You...
READ MORE
Sign up to get the latest updates
FacebookLinkedInTwitterYouTube

© 2021 Kenna Security. All Rights Reserved. Privacy Policy.