Automated Vulnerability Management Response with Kenna and Demisto

March 25, 2020

While automated playbooks can ease analyst load, an attack investigation usually requires additional tasks such as pivoting from one suspicious indicator to another to gather critical evidence, draw relations between incidents, and finalize resolution.

This can be done by automating the ingestion of Kenna Security vulnerability information and alerts within Demisto for playbook-driven enrichment and response. This rich set of threat and vulnerability data can dramatically shorten the investigation and decision-making cycles, leading to optimized response times.

Previous
Kenna Expanse Joint Solution Brief
Kenna Expanse Joint Solution Brief

Next Flipbook
Risk-Based Application Vulnerability Prioritization with Checkmarx and Kenna
Risk-Based Application Vulnerability Prioritization with Checkmarx and Kenna