Features

Our approach to threat and vulnerability management integrates the results of vulnerability scan data—Qualys, Nessus, Rapid 7, and dozens more—with the results from 8 different threat feeds. The result? You know what vulnerabilities need to be prioritized in order to improve your company’s security posture. Then you can report on your team’s activity, showing the impact of your remediations. No one will doubt your work—or effectiveness.

A Clear Insight into Risk – Kenna Reports

Forget about making custom reports for your peers and executives. Let Kenna do the work for you. See your trending risk over a period of time, and always have the answer to the question “How has our exposure to risk been over a period of time?” Find out more about Kenna Reports.

An Easy Way to Keep Score – The Risk Meter

The Kenna Risk Meter is how it all comes together. Containing the results of both your vulnerability scan data as well as external threat intelligence, the Risk Meter lets you know exactly what risk you incur across all your groups of assets. Clearly see which assets are subject to active Internet breaches, exploits and zero-day threats.

Know What to Fix – The Kenna Dashboard

Here’s where you shave hours off your remediation time because we’ve already prioritized the most important remediations based on real-world threat intelligence. Kenna correlates attack, threat and exploit data aggregated by our threat processing engine against your vulnerabilities twenty-four hours a day, seven days a week.

Furthermore, if you want to achieve a certain risk score, Kenna will present exactly the vulnerabilities you need to remediate in order to get to your desired level.

Arrange Your World – Asset Grouping & Tagging

Our asset tags and groups help make your data more relevant by allowing you to customize reporting, access, remediation and dashboards. Our unique tagging system offers greater flexibility by allowing you to organize your assets right within your Kenna instance, enabling you to easliy see the vulnerabilites for any part of your environment.

Fast Time to Value

It doesn’t take long to be up and running with Kenna. In fact, it only takes minutes. You connect your vulnerability scanner, set up a Risk Meter, and upload assets from your scanner—and Kenna does the rest. Generally speaking, within 1 hour our customers see amazing value in terms of their security posture.

Give us 5 minutes & 1,000 assets
We’ll Give You a Full Picture of Your Risk