Logo
Kenna
Kenna

Kenna

By Kenna Security


  •  888 Interested

Highlights : About Kenna

feat-icon
Metasploit and other Threat Feeds

feat-icon
Nexpose Rapid7 Connectivity

feat-icon
Active Internet Breach Data

About Kenna

Kenna (formerly Risk I/O) empowers customers such as DirectTV, Toyota, Spotify, and University of Chicago to remediate vulnerabilities and prevent breaches at a faster rate. Kenna provides: 24/7 Threat Processing: The Kenna threat processing engine continuously aggregates attack data, threat data, and exploit data feeds covering attacks in-the-wild, zero-day vulnerabilities, and active Internet breaches. A single day of Kenna threat processing is the equivalent of 475,000 security analysts matching known breaches and attacks against your vulnerabilities. Attack Correlation: Kenna correlates the attack, threat and exploit data aggregated by our threat processing engine against your vulnerabilities twenty-four hours a day, seven days a week. Simply connect your vulnerability scanner to Kenna and we’ll identify where, when and how your organization is most likely to be attacked. Risk Meters: A risk meter is a real-time measure of the risk a group of assets pose to your organization, and can be created for those critical systems in your environment you’d like to monitor. The Risk Meter dashboard gives your team and management a quick, at-a-glance view of your vulnerability and exploit risk across your business, categorized by what’s meaningful to you. Remediation Management: Remediation Lists calculate the impact against your security risk for each remediation, and prioritize the vulnerabilities that pose the biggest threat to their network. Kenna connects to external ticketing systems to close the loop when tickets have been remediated with verification scans to confirm proper remediation steps have been taken. Kenna integrates with over 20 different connectors, including leading vulnerability scanners such as Qualys, Nessus, and rapid7. It uses 8 external threat feeds including Metasploit. We're able to stop breaches before they occur by syncing your vulnerability scan data against active Internet data from our threat feed integrations. You're also able to quickly and clearly communicate your company's security posture to the entire organization.

Specifications

  24/7 Support
Yes
  Business Size
Mid-Market
  Deployments
Cloud
  Language Support
English
  Platforms

Product Details

Features

24/7 Threat Processing

Executive Dashboards

Attack Correlation

Measuring/monitoring risk of asset groups

Remediation Management

Active Internet Breach Data

Qualys Connectivity

Nessus Connectivity

Nexpose Rapid7 Connectivity

Vulnerability Prioritization

Jira Integration

Metasploit and other Threat Feeds

Vulnerability Scanner Analytics

Benefits

Time Savings

Days saved by no more analyzing, deduping, and prioritizing scan data, while still keeping up with new data

No blind spots with respect to any group of assets

Each group is completely understood in terms of vulnerabilities and remediations, as well as "what to fix first"

Real-world threat intelligence seamlessly integrated with internal scan data

Enabling users to know their specific vulnerabilities, unique to their environment

Recommended Product

x
This site uses cookies for analytics, personalized content and ads. By continuing to browse this site, you agree to this use. More info That's Fine

Get the top stories

newsletter every morning

I'd like to also receive information about WareBuy programs and events.