Exploit Prediction

  • Using Coverage and Efficiency to Determine Remediation Strategy Effectiveness

    Using Coverage and Efficiency to Determine Remediation Strategy Effectiveness

    See what we found in studying the effectiveness of different remediation strategies.

    Read Flipbook
  • 451 Research: Kenna Keeps Vulnerability Management Priorities in Check

    451 Research: Kenna Keeps Vulnerability Management Priorities in Check

    Read this independent analysis of Kenna Security’s risk-based vulnerability management.

    Read Flipbook
  • Align Around Risk

    Request a Demo
  • The Benefits of Going With a Market Leader Data Sheet

    The Benefits of Going With a Market Leader Data Sheet

    See the timeline of Kenna Security’s innovative technologies.

    Read Flipbook
  • Using Models to Predict and Prioritize Risk

    Using Models to Predict and Prioritize Risk

    Find out what to look for in a risk model and how the Kenna Security Risk Model can prioritize and predict risk.

    Read Flipbook
  • Cyber Risk Context Technology™ Solution Brief

    Cyber Risk Context Technology™ Solution Brief

    Find out more about the technology at the heart of the Kenna Security Platform.

    Read Flipbook
  • Prioritization to Prediction, Volume 3 - Winning the Remediation Race

    Prioritization to Prediction, Volume 3 - Winning the Remediation Race

    Produced in conjunction with the Cyentia Institute, this third volume of our Prioritization to Prediction series explores and analyzes the vulnerability management landscape.

    Read Flipbook
  • Prioritization to Prediction, Volume 2 - Getting Real About Remediation

    Prioritization to Prediction, Volume 2 - Getting Real About Remediation

    Our latest research, in collaboration with the Cyentia Institute, takes a rare look at the vulnerability management strategies of leading enterprises.

    Read Flipbook
  • Prioritization to Prediction Report, Volume 1

    Prioritization to Prediction Report, Volume 1

    Analyzing Vulnerability Remediation Strategies

    Read Flipbook
  • Full-Stack Risk-Based Vulnerability Management

    Full-Stack Risk-Based Vulnerability Management

    Kenna enables informed risk-based remediation across your entire organization—full-stack. View our infographic for a quick, visual peek into the magic of Kenna.

    Read Article
  • Kenna Exploit Prediction Solution Brief

    Kenna Exploit Prediction Solution Brief

    Exploit Prediction harnesses machine learning, predictive modeling, and data science techniques to enable security and IT teams to evolve to a predictive approach.

    Read Flipbook
  • Predicting the Risk of Vulnerability Exploits: The Missing Piece of the Cyber Risk Management Puzzle

    Predicting the Risk of Vulnerability Exploits: The Missing Piece of the Cyber Risk Management Puzzle

    Security professionals know that they can’t close every vulnerability and prevent every threat. Despite advances in tools, tactics, and efficiency I constantly hear from security pros that they...

    Read Article
  • How to Harness Supervised Machine Learning to Predict Exploitability

    How to Harness Supervised Machine Learning to Predict Exploitability

    Artificial intelligence and machine learning are dominating topics in the tech world. Every day our news feeds are flooded with promises of revolutionary applications of these systems, from smart...

    Read Article
  • The Spectre & Meltdown Vulnerabilities: A Risk Based Approach To Remediation

    There’s been a lot information and chatter about 3 new vulnerabilities identified by researchers with some working exploits by Google’s Project Zero demonstrating a new class of timing attacks...

    Read Article
  • Malware Exploitable Demo1:46

    Malware Exploitable Demo

    Kenna is a software-as-a-service Vulnerability and Risk Intelligence platform that accurately measures risk and prioritizes remediation efforts before an attacker can exploit an organization’s weaknes

    Watch Video
  • Exploit Prediction: The Future of Vulnerability Management

    Exploit Prediction: The Future of Vulnerability Management

    This white paper introduces exploit prediction and explains the role it plays in a modern vulnerability management program.

    Read Flipbook
  • loading
    Loading More...