TechValidate Research on Cisco Vulnerability Management


Kenna.VM Case Study

Medium Enterprise Pharmaceuticals Company

Introduction

This case study of a medium enterprise pharmaceuticals company is based on an October 2021 survey of Kenna.VM customers by TechValidate, a 3rd-party research service. The profiled company asked to have their name blinded to protect their confidentiality.

Challenges

The business challenges that led the profiled company to evaluate and ultimately select Kenna.VM:

  • The vulnerability management challenges they were experiencing that led them to implement the Kenna.VM:
    • Too many vulnerabilities with no way to effectively prioritize
    • High volume of security data lacking context for decision making
    • Not having a way to quantify or measure risk from vulnerabilities

Use Case

The key features and functionalities of Kenna.VM that the surveyed company uses:

  • The approach they used to prioritize vulnerabilities prior to Kenna:
    • CVSS 10+
  • The criteria they use to evaluate the success of your Kenna.VM implementation:
    • Reduction in vulnerability investigation time
    • Reduction in reporting time

Results

The surveyed company achieved the following results with Kenna.VM:

  • Before Kenna vs. After Kenna: Have you seen a reduction in time spent on the following activities? (Security and IT team time combined)
    • time spent on Vulnerability Investigation: 50 – 75%
    • time spent on remediation: 50 – 75%
    • time spent on reporting: 50 – 75%
  • Kenna‚Äôs primary advantage(s) over other vulnerability management platforms:
    • Kenna goes beyond basic risk scoring and tells me what I need to fix first
    • Kenna provides awareness of how much risk is in our environment




About This Data

This data was sourced directly from verified users of Cisco Vulnerability Management by TechValidate.

TechValidate verifies the identity and organizational affiliation of all participants that contribute to published research data. When research participants so desire, we also guarantee their anonymity so that they may share information honestly and freely.


More Research on Cisco Vulnerability Management