Kenna (formerly Risk I/O) empowers customers such as DirectTV, Toyota, Spotify, and University of Chicago to remediate vulnerabilities and prevent breaches at a faster rate. Kenna provides:
24/7 Threat Processing: The Kenna threat processing engine continuously aggregates attack data, threat data, and exploit data feeds covering attacks in-the-wild, zero-day vulnerabilities, and active Internet breaches. A single day of Kenna threat processing is the equivalent of 475,000 security analysts matching known breaches and attacks against your vulnerabilities.
Attack Correlation: Kenna correlates the attack, threat and exploit data aggregated by our threat processing engine against your vulnerabilities twenty-four hours a day, seven days a week. Simply connect your vulnerability scanner to Kenna and we’ll identify where, when and how your organization is most likely to be attacked.
Risk Meters: A risk meter is a real-time measure of the risk a group of assets pose to your organization, and can be created for those critical systems in your environment you’d like to monitor. The Risk Meter dashboard gives your team and management a quick, at-a-glance view of your vulnerability and exploit risk across your business, categorized by what’s meaningful to you.
Remediation Management: Remediation Lists calculate the impact against your security risk for each remediation, and prioritize the vulnerabilities that pose the biggest threat to their network. Kenna connects to external ticketing systems to close the loop when tickets have been remediated with verification scans to confirm proper remediation steps have been taken.
Kenna integrates with over 20 different connectors, including leading vulnerability scanners such as Qualys, Nessus, and rapid7. It uses 8 external threat feeds including Metasploit. We're able to stop breaches before they occur by syncing your vulnerability scan data against active Internet data from our threat feed integrations. You're also able to quickly and clearly communicate your company's security posture to the entire organization.
Key benefits of Kenna
Time Savings – Days saved by no more analyzing, deduping, and prioritizing scan data, while still keeping up with new data
No blind spots with respect to any group of assets – Each group is completely understood in terms of vulnerabilities and remediations, as well as "what to fix first"
Instant, clear communication of security posture via management-ready dashboards
Single pane of glass that unites security and the rest of IT
Real-world threat intelligence seamlessly integrated with internal scan data -- Enabling users to know their specific vulnerabilities, unique to their environment
Time to Value - Up & running in 10 minutes -- easy to use ongoing
- Free Trial
Compare with Popular Alternatives
Total features of Kenna: 5
- Asset Tagging
- Remote Access/Control
- Vulnerability Scanning
- Web Scanning