TechValidate Research on Cisco Vulnerability Management

These pages present data that TechValidate has sourced via direct research with verified customers and users of Cisco Vulnerability Management. TechValidate stands behind the authenticity of all published data. Learn more »



370 Customers Surveyed

2,872 Data Points Collected

190 Published TechFacts

10 Published Charts

98 Published Case Studies



Selected Research Highlights


Kenna.VM Case Study

Global 500 Insurance Company

Introduction

This case study of a Global 500 insurance company is based on a September 2020 survey of Kenna.VM customers by TechValidate, a 3rd-party research service. The profiled company asked to have their name blinded to protect their confidentiality.

“The required scans provide valuable information regarding security risks to our organization.”

Challenges

The business challenges that led the profiled company to evaluate and ultimately select Kenna.VM:

  • The vulnerability management challenges they were experiencing that led them to implement the Kenna.VM:
    • IT risk and security required scan

Use Case

The key features and functionalities of Kenna.VM that the surveyed company uses:

  • The approach they used to prioritize vulnerabilities prior to Kenna:
    • none
  • They best describe their current engagement model between the Security and IT team as IT investigates, prioritizes and remediates; Security handles reporting.
  • The criteria they use to evaluate the success of your Kenna.VM implementation:
    • Kenna risk score reduction

Results

The surveyed company achieved the following results with Kenna.VM:

  • Before Kenna vs. After Kenna: Have you seen a reduction in time spent on the following activities? (Security and IT team time combined)
    • Time spent on Vulnerability Investigation: 10 – 25%
    • Time spent on remediation: 10 – 25%
    • Time spent on reporting: 25 – 50%
  • Kenna’s primary advantage(s) over other vulnerability management platforms:
    • Kenna is updated continuously with real-time information
  • Rates the following for Kenna.VM compared to other vulnerability management solutions:
    • Remediation Intelligence (guidance on “what to fix first”): superior
    • Integrated real-time global exploit intelligence: superior
    • Data science-based risk scoring methodology: superior
    • “Off the shelf” integrations with a wide range of security data sources: superior
    • Predictive vulnerability modeling: superior

Kenna Security Customer Research

What do you view as Kenna’s primary advantage(s) over other vulnerability management platforms?

Kenna goes beyond basic risk scoring and tells me what I need to fix first
67%
Kenna provides meaningful and actionable data for remediation (remediation intelligence)
56%
Kenna provides awareness of how much risk is in our environment
52%
Kenna is updated continuously with real-time information
38%
Kenna aggregates data and reporting from multiple tools (vuln scanners, CMDB, discovery)
32%
Kenna includes multiple threat intel feeds (eliminating the need for subscription)
32%
Kenna's cloud platform scales elastically to virtually any organization size
14%

Kenna Security Customer Satisfaction Rating

An Information Security Assurance Analyst at a medium enterprise insurance company would be likely to recommend Kenna Security for this reason:

Ease of use, and great display of information.

Kenna Security Customer Fact

The Economist reduced their risk posture score by 50% since implementing the Kenna Security Platform.

Kenna Security Case Study

Global 500 Insurance Company

Introduction

This case study of a Global 500 insurance company is based on an October 2019 survey of Kenna Security customers by TechValidate, a 3rd-party research service. The profiled company asked to have their name blinded to protect their confidentiality.

“Kenna has helped us to enrich our vulnerability data, allowing us to make more impactful decisions when prioritizing.”

Challenges

The business challenges that led the profiled company to evaluate and ultimately select Kenna Security:

  • Vulnerability management challenges they experienced that led them to implement the Kenna Security Platform:
    • Too many vulnerabilities with no way to effectively prioritize
    • High volume of security data lacking context for decision making
    • Inefficiencies in vulnerability remediation

Use Case

The key features and functionalities of Kenna Security that the surveyed company uses:

  • Approach used to prioritize vulnerabilities prior to Kenna:
    • Use rating system from a scanner
  • How they evaluate the success of their Kenna Security platform implementation:
    • Kenna risk score reduction
  • Kenna’s primary advantage(s) over other vulnerability management platforms:
    • Kenna goes beyond basic risk scoring and tells them what they need to fix first
    • Kenna provides meaningful and actionable data for remediation (remediation intelligence)
    • Kenna is updated continuously with real-time information
    • Kenna includes multiple threat intel feeds (eliminating the need for subscription)

Results

The surveyed company achieved the following results with Kenna Security:

  • Reduction of time spent on the following activities, since using Kenna:
    • Time spent on Vulnerability Investigation: over 10%
    • Time spent on remediation: over 10%
    • Time spent on reporting: over 25%

Kenna.VM Customer Research

What vulnerability management challenges were you experiencing that led you to implement the Kenna.VM (formerly Security Platform)?

Too many vulnerabilities with no way to effectively prioritize
71%
High volume of security data lacking context for decision making
43%
No way to quantify or measure risk from vulnerabilities
57%
Inefficiencies in vulnerability remediation
39%
Other
7%


More to Explore



About Cisco Vulnerability Management

Cisco Vulnerability Management (formerly Kenna.VM) offers an effective, efficient way to reduce your risk profile using risk-based prioritization powered by data science. Rely on it to ID the vulnerabilities that put you at the greatest risk, create a self-service environment for remediation teams, set intelligent SLAs based on your risk tolerance, compare your risk posture against industry peers, deliver clear reports with intuitive metrics, and more.

Cisco Vulnerability Management Website   Cisco Vulnerability Management Website