TechValidate Research on Kenna.VM

These pages present data that TechValidate has sourced via direct research with verified customers and users of Kenna.VM. TechValidate stands behind the authenticity of all published data. Learn more »



320 Customers Surveyed

2,521 Data Points Collected

167 Published TechFacts

9 Published Charts

62 Published Case Studies



Selected Research Highlights


Kenna Security Customer Research

Please select the answer below that best describes your current engagement model between the Security and IT team:

Security investigates and prioritizes vulnerabilities; IT remediates
40%
Security investigates; Security and IT work together to prioritize; IT remediates
20%
Security and IT work together to investigate and prioritize
18%
Security investigates; IT prioritizes and remediates
10%
IT investigates, prioritizes and remediates; Security handles reporting
9%

Kenna Security Customer Satisfaction Rating

An IT Security Engineer at a large enterprise financial services company would be very likely to recommend Kenna Security for this reason:

In the current threat landscape, you can’t fix all vulnerabilities but only those that pose a severe threat to your environment. Kenna makes it possible to prioritize vulnerabilities through adding threat intelligence to the vulnerability itself.

Kenna Security Customer Testimonial

Kenna has provided us with a simplified strategy to remediate security issues. The prioritization of vulnerabilities has helped us spend our time effectively.

IT Manager, Medium Enterprise Automotive & Transport Company

Kenna Security Customer Research

What criteria do you use to evaluate the success of your Kenna Security platform implementation?

Kenna risk score reduction
76%
Reduction in Mean Time To Remediate (MTTR)
41%
Reduction in IT remediation time
31%
Reduction in vulnerability investigation time
30%
SLA Adherence
25%
Reduction in reporting time
23%

Kenna Security Case Study

Large Enterprise Financial Services Company

Introduction

This case study of a large enterprise financial services company is based on an October 2018 survey of Kenna Security customers by TechValidate, a 3rd-party research service. The profiled company asked to have their name blinded to protect their confidentiality.

“In the current threat landscape, you can’t fix all vulnerabilities but only those that pose a severe threat to your environment. Kenna makes it possible to prioritize vulnerabilities through adding threat intelligence to the vulnerability itself.”

Challenges

The business challenges that led the profiled company to evaluate and ultimately select Kenna Security:

  • Security challenges experienced that led to implementing the Kenna Security Platform:
    • Too many vulnerabilities with no way to effectively prioritize
    • High volume of security data lacking context for decision making
    • No way to quantify or measure risk from vulnerabilities
  • Previously used the following to prioritize vulnerability scan data:
    • Spreadsheets
    • Other vulnerability management tool(s)

Use Case

The key features and functionalities of Kenna Security that the surveyed company uses:

  • Has been actively using the Kenna Security Platform for 6-9 months.
  • Kenna Security Platform features most important to them when evaluating competitive or alternative solutions:
    • Integrated real-time global exploit intelligence
    • Data science-based risk scoring methodology
    • Predictive vulnerability modeling

Results

The surveyed company achieved the following results with Kenna Security:

  • Most important security challenges the Kenna Security Platform has helped solve:
    • Addressing vulnerabilities that pose the greatest risk to their environment
    • Transforming security data into actionable intelligence
    • Finding a quantifiable way to measure, reduce and report on risk

Kenna Security Case Study

Peapod, Llc

Introduction

This case study of Peapod, LLC is based on an October 2019 survey of Kenna Security customers by TechValidate, a 3rd-party research service.

“Leaders have a way to see our posture in one view. If they require more details they can drill down into each Risk Meter for the desired info.”

Challenges

The business challenges that led the profiled company to evaluate and ultimately select Kenna Security:

  • Vulnerability management challenges they experienced that led them to implement the Kenna Security Platform:
    • Too many vulnerabilities with no way to effectively prioritize
    • High volume of security data lacking context for decision making
    • No way to quantify or measure risk from vulnerabilities
    • Inefficiencies in vulnerability remediation

Use Case

The key features and functionalities of Kenna Security that the surveyed company uses:

  • Approaches used to prioritize vulnerabilities prior to Kenna:
    • Use rating system from scanner
  • How they evaluate the success of their Kenna Security platform implementation:
    • Reduction in Mean Time To Remediate (MTTR)
    • Kenna risk score reduction
    • Reduction in vulnerability investigation time
    • Reduction in IT remediation time
    • SLA Adherence
    • Reduction in reporting time
  • Kenna’s primary advantage(s) over other vulnerability management platforms:
    • Kenna goes beyond basic risk scoring and tells them what they need to fix first
    • Kenna provides meaningful and actionable data for remediation (remediation intelligence)
    • Kenna provides awareness of how much risk is in their environment
    • Kenna is updated continuously with real-time information

Results

The surveyed company achieved the following results with Kenna Security:

  • Reduction of time spent on the following activities, since using Kenna:
    • time spent on Vulnerability Investigation: over 75%
    • time spent on remediation: over 75%
    • time spent on reporting: over 25%


More to Explore



About Kenna.VM

Kenna is a software-as-a-service Risk and Vulnerability Intelligence platform that accurately measures risk and prioritizes remediation efforts before an attacker can exploit an organization’s weaknesses. Kenna automates the correlation of vulnerability data, threat data, and 0-day data, analyzing security vulnerabilities against active Internet breaches so that InfoSec teams can prioritize remediations and report on their overall risk posture.

  Kenna Security Website