Kenna Security Customer Testimonial
The integration with multiple tools will be invaluable, especially because prior to Kenna we had a very difficult time getting departments to take ownership for mystery configuration items that no one had listed in their inventory. It left many vulnerabilities unaddressed and everyone scrambling at the end of the quarter.
— Claudia Kallesen, IT Operations Manager, Wyndham Destinations
This data was sourced directly from a verified user of Cisco Vulnerability Management by TechValidate.
TechValidate verifies the identity and organizational affiliation of all participants that contribute to published research data. When research participants so desire, we also guarantee their anonymity so that they may share information honestly and freely.
More Research on Cisco Vulnerability Management