TechValidate Research on Cisco Vulnerability Management


Kenna Security Case Study

Detasad

Introduction

This case study of DETASAD is based on an October 2019 survey of Kenna Security customers by TechValidate, a 3rd-party research service.

“We have selected Kenna to manage vulnerabilities and so far it works as expected.”

Challenges

The business challenges that led the profiled company to evaluate and ultimately select Kenna Security:

  • Vulnerability management challenges they experienced that led them to implement the Kenna Security Platform:
    • Too many vulnerabilities with no way to effectively prioritize
    • High volume of security data lacking context for decision making
    • No way to quantify or measure risk from vulnerabilities
    • Inefficiencies in vulnerability remediation

Use Case

The key features and functionalities of Kenna Security that the surveyed company uses:

  • Approaches used to prioritize vulnerabilities prior to Kenna:
    • CVSS 7+
    • CVSS 8+
    • CVSS 9+
    • CVSS 10
  • How they evaluate the success of their Kenna Security platform implementation:
    • Reduction in Mean Time To Remediate (MTTR)
    • Kenna risk score reduction
    • SLA Adherence
  • Kenna’s primary advantage(s) over other vulnerability management platforms:
    • Kenna has been integrated with our Secureworks SIEM making our incident response more efficient.

Results

The surveyed company achieved the following results with Kenna Security:

  • Reduction of time spent on the following activities, since using Kenna:
    • Time spent on Vulnerability Investigation: over 50%
    • Time spent on remediation: over 75%
    • Time spent on reporting: over 75%
  • Kenna Security Platform compared to other vulnerability management solutions:




About This Data

This data was sourced directly from verified users of Cisco Vulnerability Management by TechValidate.

TechValidate verifies the identity and organizational affiliation of all participants that contribute to published research data. When research participants so desire, we also guarantee their anonymity so that they may share information honestly and freely.


More Research on Cisco Vulnerability Management