Kenna’s Threat Intelligence
Kenna brings external threat intelligence and 0-Day data into your vulnerability data. For the first time, you know what’s happening in real time that may pose a threat to your specific environment.
How We Do It
Kenna uses multiple threat feeds, the internal assets of its customers, and a proprietary algorithm to process over 100 million exploits against our customers’ vulnerability counts. We evaluate which of those vulnerabilities are being subject to Active Internet Breaches—which ones are popular targets—which ones are easily exploited—and which ones are subject to 0-day threats. All of this displays in an easy to use, actionable dashboard. The entire process only takes minutes.
24/7 Threat Processing
The Kenna platform updates constantly. All hours of the day, seven days a week, we're evaluating your internal assets against external threat data—and adjusting your risk score accordingly.
It's All about the Algorithm
Big data is useless without the framework to use it. Kenna's team of data scientists has perfected the ability to extract useful, actionable information from the billions of vulnerabilities and exploits we see every day. But don't take our word for it. Take a free trial and upload a few thousand of your own assets. You'll see what we mean.