TechValidate Research on Kenna.VM


Kenna.VM Case Study

State & Local Government

Introduction

This case study of a state & local government is based on a November 2020 survey of Kenna.VM customers by TechValidate, a 3rd-party research service. The profiled organization asked to have their name blinded to protect their confidentiality.

“Providing insight and prioritization into our organization’s vulnerabilities, in an intelligible and logical manner.”

“The customer success team is excellent and one of the best parts of the service.”

Challenges

The business challenges that led the profiled organization to evaluate and ultimately select Kenna.VM:

  • The vulnerability management challenges they were experiencing that led them to implement the Kenna.VM:
    • Too many vulnerabilities with no way to effectively prioritize
    • Not having a way to quantify or measure risk from vulnerabilities

Use Case

The key features and functionalities of Kenna.VM that the surveyed organization uses:

  • The approach they used to prioritize vulnerabilities prior to Kenna:
    • A homegrown prioritization tool
  • They best describe their current engagement model between the Security and IT team as Security investigates; Security and IT work together to prioritize; IT remediates.
  • The criteria they use to evaluate the success of your Kenna.VM implementation:
    • Reduction in Mean Time To Remediate (MTTR)
    • Kenna risk score reduction
    • Reduction in IT remediation time
    • Reduction in reporting time

Results

The surveyed organization achieved the following results with Kenna.VM:

  • Before Kenna vs. After Kenna: Have you seen a reduction in time spent on the following activities? (Security and IT team time combined)
    • time spent on Vulnerability Investigation: 1 – 10%
    • time spent on remediation: 1 – 10%
    • time spent on reporting: 1 – 10%
  • Kenna’s primary advantage(s) over other vulnerability management platforms:
    • Kenna goes beyond basic risk scoring and tells me what I need to fix first
    • Kenna includes multiple threat intel feeds (eliminating the need for subscription)
  • Rates the following for Kenna.VM compared to other vulnerability management solutions:
    • remediation Intelligence (guidance on “what to fix first”): highly superior
    • integrated real-time global exploit intelligence: superior
    • data science-based risk scoring methodology: highly superior
    • “Off the shelf” integrations with a wide range of security data sources: highly superior
    • predictive vulnerability modeling: superior




About This Data

This data was sourced directly from verified users of Kenna.VM by TechValidate.

TechValidate verifies the identity and organizational affiliation of all participants that contribute to published research data. When research participants so desire, we also guarantee their anonymity so that they may share information honestly and freely.


More Research on Kenna.VM