TechValidate Research on Cisco Vulnerability Management

These pages present data that TechValidate has sourced via direct research with verified customers and users of Cisco Vulnerability Management. TechValidate stands behind the authenticity of all published data. Learn more »



370 Customers Surveyed

2,872 Data Points Collected

190 Published TechFacts

10 Published Charts

98 Published Case Studies



Selected Research Highlights


Kenna Security Customer Statistic

94% of customers agreed with the following statement:

“The Kenna Security Platform gives us the ability to maximize the security team’s impact on the organization’s risk posture.”

Kenna Security Customer Research

What do you view as Kenna’s primary advantage(s) over other vulnerability management platforms?

Kenna goes beyond basic risk scoring and tells me what I need to fix first
67%
Kenna provides meaningful and actionable data for remediation (remediation intelligence)
56%
Kenna provides awareness of how much risk is in our environment
52%
Kenna is updated continuously with real-time information
38%
Kenna aggregates data and reporting from multiple tools (vuln scanners, CMDB, discovery)
32%
Kenna includes multiple threat intel feeds (eliminating the need for subscription)
32%
Kenna's cloud platform scales elastically to virtually any organization size
14%

Kenna Security Case Study

Global 500 Financial Services Company

Introduction

This case study of a Global 500 financial services company is based on an October 2018 survey of Kenna Security customers by TechValidate, a 3rd-party research service. The profiled company asked to have their name blinded to protect their confidentiality.

“Kenna allowed us to get away from spreadsheets and empower LOB and application team to drive remediation. It a well built easy to use tool that provides value.”

Challenges

The business challenges that led the profiled company to evaluate and ultimately select Kenna Security:

  • Security challenges experienced that led to implementing the Kenna Security Platform:
    • Too many vulnerabilities with no way to effectively prioritize
    • High volume of security data lacking context for decision making
    • No way to quantify or measure risk from vulnerabilities
    • Inefficiencies in vulnerability remediation
  • Previously used the following to prioritize vulnerability scan data:
    • Spreadsheets
    • Other vulnerability management tool(s)

Use Case

The key features and functionalities of Kenna Security that the surveyed company uses:

  • Has been actively using the Kenna Security Platform for 1-2 years.
  • Kenna Security Platform features most important to them when evaluating competitive or alternative solutions:
    • Integrated real-time global exploit intelligence
    • Data science-based risk scoring methodology
    • “Off the shelf” integrations with a wide range of security data sources

Results

The surveyed company achieved the following results with Kenna Security:

  • Most important security challenges the Kenna Security Platform has helped solve:
    • Addressing vulnerabilities that pose the greatest risk to their environment
    • Increased efficiency of vulnerability remediation
    • Transforming security data into actionable intelligence
    • Finding a quantifiable way to measure, reduce and report on risk
  • Since implementing the Kenna Security Platform, they have been able to reduce their risk posture score by 50%.

Kenna Security Case Study

Medium Enterprise Computer Hardware Company

Introduction

This case study of a medium enterprise computer hardware company is based on an October 2019 survey of Kenna Security customers by TechValidate, a 3rd-party research service. The profiled company asked to have their name blinded to protect their confidentiality.

“Kenna’s dashboards provide daily snapshots for Executives and IT Operations to gauge how vulnerabilities directly relate to actual risks.”

Challenges

The business challenges that led the profiled company to evaluate and ultimately select Kenna Security:

  • Vulnerability management challenges they experienced that led them to implement the Kenna Security Platform:
    • Too many vulnerabilities with no way to effectively prioritize
    • High volume of security data lacking context for decision making
    • No way to quantify or measure risk from vulnerabilities
    • Inefficiencies in vulnerability remediation

Use Case

The key features and functionalities of Kenna Security that the surveyed company uses:

  • Approaches used to prioritize vulnerabilities prior to Kenna:
    • CVSS 8+
    • CVSS 9+
    • CVSS 10
    • Use rating system from scanner
  • How they evaluate the success of their Kenna Security platform implementation:
    • Kenna risk score reduction
    • Reduction in IT remediation time
  • Kenna’s primary advantage(s) over other vulnerability management platforms:
    • Kenna goes beyond basic risk scoring and tells them what they need to fix first
    • Kenna aggregates data and reporting from multiple tools (vuln scanners, CMDB, discovery)
    • Kenna includes multiple threat intel feeds (eliminating the need for subscription)

Results

The surveyed company achieved the following results with Kenna Security:

  • Reduction of time spent on the following activities, since using Kenna:
    • Time spent on Vulnerability Investigation: over 50%
    • Time spent on remediation: over 25%
    • Time spent on reporting: over 75%

Kenna.VM Customer Testimonial

Awesome, CX team has been great!

IT Systems Analyst, Medium Enterprise Insurance Company

Kenna Security Customer Research

Top Security Challenges Solved

What are the most important security challenges the Kenna Security Platform has helped you solve?

Addressing vulnerabilities that pose the greatest risk to our environment
86%
Quantifiable way to measure, reduce and report on risk
71%
Increased efficiency of vulnerability remediation
51%
Transforming security data into actionable intelligence
49%


More to Explore



About Cisco Vulnerability Management

Cisco Vulnerability Management (formerly Kenna.VM) offers an effective, efficient way to reduce your risk profile using risk-based prioritization powered by data science. Rely on it to ID the vulnerabilities that put you at the greatest risk, create a self-service environment for remediation teams, set intelligent SLAs based on your risk tolerance, compare your risk posture against industry peers, deliver clear reports with intuitive metrics, and more.

Cisco Vulnerability Management Website   Cisco Vulnerability Management Website