TechValidate Research on Cisco Vulnerability Management


Kenna Security Case Study

Bandwidth.Com, Inc.

Introduction

This case study of Bandwidth.com, Inc. is based on an October 2019 survey of Kenna Security customers by TechValidate, a 3rd-party research service.

“Kenna has become the sole-solution used by both Information Security and partner IT and development teams for current vulnerability and risk status of the environment, as well as high level reporting and threat intelligence gathering.”

Challenges

The business challenges that led the profiled company to evaluate and ultimately select Kenna Security:

  • Vulnerability management challenges they experienced that led them to implement the Kenna Security Platform:
    • No way to quantify or measure risk from vulnerabilities

Use Case

The key features and functionalities of Kenna Security that the surveyed company uses:

  • Approaches used to prioritize vulnerabilities prior to Kenna:
    • We created our own matrix based on CVSS criteria
  • How they evaluate the success of their Kenna Security platform implementation:
    • Kenna risk score reduction
    • Reduction in vulnerability investigation time
    • SLA Adherence
    • Reduction in reporting time
  • Kenna’s primary advantage(s) over other vulnerability management platforms:
    • Kenna goes beyond basic risk scoring and tells them what they need to fix first
    • Kenna provides awareness of how much risk is in their environment
    • Kenna is updated continuously with real-time information
    • Kenna includes multiple threat intel feeds (eliminating the need for subscription)

Results

The surveyed company achieved the following results with Kenna Security:

  • Reduction of time spent on the following activities, since using Kenna:
    • Time spent on Vulnerability Investigation: over 75%
    • Time spent on remediation: 0%
    • Time spent on reporting: over 75%




About This Data

This data was sourced directly from verified users of Cisco Vulnerability Management by TechValidate.

TechValidate verifies the identity and organizational affiliation of all participants that contribute to published research data. When research participants so desire, we also guarantee their anonymity so that they may share information honestly and freely.


More Research on Cisco Vulnerability Management