Kenna & VMware Carbon Black Collaborate  
Learn More >
Contact Us
Talk to an Expert
Request a demo

Resources

Where Security and IT come together to learn.

Using Coverage and Efficiency to Determine Remediation Strategy

Deciding which vulnerabilities to remediate is a daunting task. In a perfect world, all vulnerabilities would be remediated as discovered.
Download
Get the latest updates
Resource
Tools

Risk Efficiency Calculator for Vulnerability Management

You may think you need to remediate thousands of vulns.The truth may surprise you. Answer two quick questions about your current remediation program, and we’ll show you how many vulnerabilities actually pose a significant risk to your IT environment (compared to your existing CVSS-based strategy). Save time, money and resources – and unlock more efficiency.

READ MORE
Podcast

Measuring What Matters with Cyentia Institute

We discuss the fourth report in our multi-part dive into the Prioritization to Prediction research series by Kenna Security and The Cyentia Institute. Prioritization to Prediction volume 4: Measuring What Matters In Remediation.

READ MORE
Vulnerability Remediation

What is Vulnerability Remediation? Here’s a Primer

Vulnerability remediation is the patching or fixing of cybersecurity weaknesses that are detected in enterprise assets, networks and applications. Formerly a manual process, vulnerability remediation today is more automated, with advanced data science, threat intelligence, and predictive algorithms helping to determine which vulnerabilities should be remediated first.  Taking a risk-based approach helps IT and DevOps…

READ MORE
Webinars

Boost Web Vulnerability Management with Prioritization and Visibility

Maximize Your Web Security Manual processes and standalone tools are no longer enough to build and maintain a consistent security program. When you add the growing cybersecurity skills gap into the picture, it is clear that security partnerships are now vitally important. In this webinar, you will learn how to optimize web vulnerability management with…

REGISTER NOW
Vulnerability Management

11 Tips for Choosing a Vulnerability Management Solution

“These tips go to 11.” – Nigel Tufnel It can be daunting to choose between vulnerability management (VM) solutions when all vendors describe their offerings in very similar ways. So making the best choice for you means identifying what your organization needs, and ensuring the solutions you’re evaluating meet those needs. It’s safe to say…

READ MORE
Tools

How Does Your Vulnerability Management Compare to Other Companies?

Find out in 4 minutes. Take this brief survey to discover how your remediationpractices stack up against your peers. 5 things you’ll gain immediately after hitting SUBMIT: A custom report highlighting the current state of your VM efforts focusing on: maturity, structure, process, and budget A data-backed understanding of how your cyber risk health ranks…

READ MORE

Using Models to Predict and Prioritize Risk

For effective vulnerability management you need the ability to quickly rate and prioritize vulnerabilities based on risk.

Download Now
Data Sheets

Kenna.VI Data Sheet

KENNA.VI (Vulnerability Intel) is a comprehensive research tool that allows enterprises to search Kenna Security’s vast exploit and vulnerability intelligence databases. Rely on Kenna.VI to research and understand vulnerabilities in your environment and in the wild, while keeping track of major trends.

READ MORE
Data Sheets

Kenna.AppSec Data Sheet

 If your organization is like many others, your application security program is still fairly immature. At the same time, business applications are only gaining in number and importance, and cyberthreats continue to grow more advanced. It’s time to arm your application security teams with a solution that lets them get ahead of cyber risk. 

READ MORE
Employee Spotlight

Employee Spotlight – Moscow Mule with Mylo Reyes

When opportunity knocks, Mylo Reyes answers the door. Mylo, a talented UX Designer, is an active participant in many aspects of life here at Kenna Security. You’ll find his good humor and thoughtful insight pop up in many places, including the company’s BIPOC Diversity and Inclusion group. Mylo seems to be equal parts intelligent, passionate,…

READ MORE
Podcast

Reporting Risk To The Board

We discuss the evolution of cybersecurity metrics and reporting to Boards of Directors.

READ MORE
Threat Intelligence

15+ Threat Intel Feeds Power Modern Vulnerability Management

One question we often get from customers or prospective clients is why we use 15+ threat and exploit intelligence feeds? Seems excessive, right? Why not just 4 or 5 feeds? Or 10? Why do we use more than 15 threat and exploit intelligence feeds to power the Kenna.VM modern vulnerability management platform?  The answer is…

READ MORE
Data Sheets

Kenna.VI+ Data Sheet

KENNA.VI+ provides a comprehensive research tool and API that allows enterprises to search Kenna Security’s vast exploit and vulnerability intelligence database. Included with Kenna.VI+ is both an easy to use interface and a flexible RESTful API. Rely on Kenna.VI+ to research and understand vulnerabilities in your environment and in the wild, while keeping track of…

READ MORE
FacebookLinkedInTwitterYouTube

© 2020 Kenna Security. All Rights Reserved. Privacy Policy.