Vulnerability Management

  • Go Beyond Application Vulnerability Correlation White Paper

    Go Beyond Application Vulnerability Correlation White Paper

    Read More
  • Using Coverage and Efficiency to Determine Remediation Strategy Effectiveness

    Using Coverage and Efficiency to Determine Remediation Strategy Effectiveness

    See what we found in studying the effectiveness of different remediation strategies.

    Read More
  • Give us 5 minutes and 1,000 assets – we'll give you a full picture of your risk

    Start Free Trial
  • 451 Research: Kenna Keeps Vulnerability Management Priorities in Check

    451 Research: Kenna Keeps Vulnerability Management Priorities in Check

    Read this independent analysis of Kenna Security’s risk-based vulnerability management.

    Read More
  • Kenna Predictive Modeling Technology Enhanced with Proofpoint ET Intelligence Feeds

    Kenna Predictive Modeling Technology Enhanced with Proofpoint ET Intelligence Feeds

    Find out how Proofpoint ET Intelligence Feeds enhance Kenna’s predictive modeling technology.

    Read More
  • Kenna Risk-Based Vulnerability Management Enriched with Exodus Zero-Day Intelligence

    Kenna Risk-Based Vulnerability Management Enriched with Exodus Zero-Day Intelligence

    Find out how Exodus’ zero-day intelligence enhances Kenna’s already rich set of risk-based vulnerability information.

    Read More
  • [WEBINAR] Welcome to Next-Gen Vulnerability Management

    Watch Webinar
  • The Benefits of Going With a Market Leader Data Sheet

    The Benefits of Going With a Market Leader Data Sheet

    See the timeline of Kenna Security’s innovative technologies.

    Read More
  • Using Models to Predict and Prioritize Risk

    Using Models to Predict and Prioritize Risk

    Find out what to look for in a risk model and how the Kenna Security Risk Model can prioritize and predict risk.

    Read More
  • Cyber Risk Context Technology™ Solution Brief

    Cyber Risk Context Technology™ Solution Brief

    Find out more about the technology at the heart of the Kenna Security Platform.

    Read More
  • Prioritization to Prediction, Volume 3 - Winning the Remediation Race

    Prioritization to Prediction, Volume 3 - Winning the Remediation Race

    Produced in conjunction with the Cyentia Institute, this third volume of our Prioritization to Prediction series explores and analyzes the vulnerability management landscape.

    Read More
  • Prioritization to Prediction, Volume 2 - Getting Real About Remediation

    Prioritization to Prediction, Volume 2 - Getting Real About Remediation

    Our latest research, in collaboration with the Cyentia Institute, takes a rare look at the vulnerability management strategies of leading enterprises.

    Read More
  • When Vulnerability Management Stops Being Polite & Starts Getting Real

    When Vulnerability Management Stops Being Polite & Starts Getting Real

    In my post in December, “Vulns Will Survive,” I shared some interesting data about the survivability rate of vulnerabilities in the enterprise. At the very end of the post, I promised to share...

    Read Article
  • How to Measure, Report On, and Actually Reduce Vulnerability Risk

    How to Measure, Report On, and Actually Reduce Vulnerability Risk

    Read More
  • Ovum On the Radar: Kenna Security Protects Enterprises

    Ovum On the Radar: Kenna Security Protects Enterprises

    Read More
  • Kenna Platform Demo: A Better Way To Manage Risk 123:21

    Kenna Platform Demo: A Better Way To Manage Risk 1

    Kenna is a software-as-a-service Vulnerability and Risk Intelligence platform that accurately measures risk and prioritizes remediation efforts before an attacker can exploit an organization’s weaknes

    Watch Video
  • Prioritization to Prediction Report, Volume 1

    Prioritization to Prediction Report, Volume 1

    Analyzing Vulnerability Remediation Strategies

    Read More
  • Living with a Target on Your Back: How Financial Institutions Can Effectively Manage Cyber Risk

    Living with a Target on Your Back: How Financial Institutions Can Effectively Manage Cyber Risk

    This white paper explains how financial institutions can gain the upper hand against cyber criminals by taking a risk-based approach to vulnerabilities.

    Read More
  • Webinar: Reporting on Risk to the Board47:01

    Webinar: Reporting on Risk to the Board

    Kenna is a software-as-a-service Vulnerability and Risk Intelligence platform that accurately measures risk and prioritizes remediation efforts before an attacker can exploit an organization’s weaknes

    Watch Video
  • Five Requirements for Effective Cyber Risk Management

    Five Requirements for Effective Cyber Risk Management

    When it comes to vulnerability management, it’s all about quality not quantity. It doesn’t matter how many vulnerabilities you closed last month if you left open the one high risk (high quality,...

    Read Article
  • The Concept of Measuring Recall in Cybersecurity

    The Concept of Measuring Recall in Cybersecurity

    In a recent article for the USENIX magazine, In-Q-Tel CISO Dan Geer and Kenna Chief Data Scientist Michael Roytman discuss the importance of measuring the concept of recall in cybersecurity. If...

    Read Article
  • How to Harness Supervised Machine Learning to Predict Exploitability

    How to Harness Supervised Machine Learning to Predict Exploitability

    Artificial intelligence and machine learning are dominating topics in the tech world. Every day our news feeds are flooded with promises of revolutionary applications of these systems, from smart...

    Read Article
  • loading
    Loading More...