TechValidate Research on Kenna.VM

These pages present data that TechValidate has sourced via direct research with verified customers and users of Kenna.VM. TechValidate stands behind the authenticity of all published data. Learn more »



321 Customers Surveyed

2,532 Data Points Collected

191 Published TechFacts

10 Published Charts

87 Published Case Studies



Selected Research Highlights


Kenna Security Customer Research

What vulnerability management challenges were you experiencing that led you to implement the Kenna Security Platform?
Too many vulnerabilities with no way to effectively prioritize
69%
High volume of security data lacking context for decision making
44%
No way to quantify or measure risk from vulnerabilities
49%
Inefficiencies in vulnerability remediation
47%

Kenna Security Customer Testimonial

Kenna is very helpful for generating risk reports in less time. We can remediate risks within a short period.

Karthika B., Information Security Assurance Analyst, Verifone

Kenna.VM Customer Testimonial

The customer success team is excellent and one of the best parts of the service.

Chief Security Officer, State & Local Government

Kenna.VM Case Study

Medium Enterprise Financial Services Company

Introduction

This case study of a medium enterprise financial services company is based on a September 2020 survey of Kenna.VM customers by TechValidate, a 3rd-party research service. The profiled company asked to have their name blinded to protect their confidentiality.

“Kenna allowed us to tackle a large backlog of vulnerabilities and provide teams with real-time data. It eliminated outdated methods such as working off of and sending out spreadsheets.”

“Our (Kenna) Customer Success Engineer is extremely knowledgeable and if she doesn’t know the answer always works quickly to get the correct solution. "

Challenges

The business challenges that led the profiled company to evaluate and ultimately select Kenna.VM:

  • The vulnerability management challenges they were experiencing that led them to implement the Kenna.VM:
    • High volume of security data lacking context for decision making
    • Inefficiencies in vulnerability remediation

Use Case

The key features and functionalities of Kenna.VM that the surveyed company uses:

  • The approach they used to prioritize vulnerabilities prior to Kenna:
    • A rating system from scanner
  • They best describe their current engagement model between the Security and IT team as Security investigates; Security and IT work together to prioritize; IT remediates.
  • The criteria they use to evaluate the success of your Kenna.VM implementation:
    • SLA adherence

Results

The surveyed company achieved the following results with Kenna.VM:

  • Before Kenna vs. After Kenna: Have you seen a reduction in time spent on the following activities? (Security and IT team time combined)
    • time spent on Vulnerability Investigation: 25 – 50%
    • time spent on remediation: 10 – 25%
    • time spent on reporting: 25 – 50%
  • Kenna’s primary advantage(s) over other vulnerability management platforms:
    • Kenna is updated continuously with real-time information
    • Kenna aggregates data and reporting from multiple tools (vuln scanners, CMDB, discovery)
  • Rates the following for Kenna.VM compared to other vulnerability management solutions:
    • remediation Intelligence (guidance on “what to fix first”): superior
    • integrated real-time global exploit intelligence: superior
    • data science-based risk scoring methodology: superior
    • “Off the shelf” integrations with a wide range of security data sources: superior
    • predictive vulnerability modeling: superior

Kenna Security Customer Research

Before Kenna vs. After Kenna: Have you seen a reduction in time spent on the following activities? (Security and IT team time combined)

Over 75% Over 50% Over 25% Over 10% 0%
Time spent on Vulnerability Investigation

16%

39%

19%

19%

7%

Time spent on remediation

12%

32%

24%

15%

17%

Time spent on reporting

27%

25%

25%

13%

10%

Kenna Security Case Study

Hampshire County Council

Introduction

This case study of Hampshire County Council is based on an October 2018 survey of Kenna Security customers by TechValidate, a 3rd-party research service.

“The Kenna Security Platform gives us the ability to maximize the security team’s impact on the organization’s risk posture.”

“We have a number of security standards to meet. This is normally done by external ITHC or equivalent. Kenna puts us in a better place to meet these requirements in advance. We have a large number of SSL certificates to manage. Kenna certificate management really helps with this.”

Challenges

The business challenges that led the profiled organization to evaluate and ultimately select Kenna Security:

  • Security challenges experienced that led to implementing the Kenna Security Platform:
    • Too many vulnerabilities with no way to effectively prioritize
    • High volume of security data lacking context for decision making
  • Previously used the following to prioritize vulnerability scan data:
    • Spreadsheets
    • An internally developed tool

Use Case

The key features and functionalities of Kenna Security that the surveyed organization uses:

  • Has been actively using the Kenna Security Platform for 6-9 months.
  • Kenna Security Platform features most important to them when evaluating competitive or alternative solutions:
    • Integrated real-time global exploit intelligence
    • “off the shelf” integrations with a wide range of security data sources
    • Integrated remediation and ticketing

Results

The surveyed organization achieved the following results with Kenna Security:

  • Most important security challenges the Kenna Security Platform has helped solve:
    • Addressing vulnerabilities that pose the greatest risk to their environment
    • Increased efficiency of vulnerability remediation
  • Since implementing the Kenna Security Platform, they have been able to reduce their risk posture score by 10%.
  • Most important factors that contributed to the success of their Kenna Security implementation:
    • A partner (MSSP, Reseller)


More to Explore



About Kenna.VM

Kenna is a software-as-a-service Risk and Vulnerability Intelligence platform that accurately measures risk and prioritizes remediation efforts before an attacker can exploit an organization’s weaknesses. Kenna automates the correlation of vulnerability data, threat data, and 0-day data, analyzing security vulnerabilities against active Internet breaches so that InfoSec teams can prioritize remediations and report on their overall risk posture.

  Kenna Security Website