Kenna Pricing, Features, Reviews & Comparison of Alternatives


Prioritize your scan data

  0 reviews

Kenna overview

What is Kenna?

Kenna (formerly Risk I/O) empowers customers such as DirectTV, Toyota, Spotify, and University of Chicago to remediate vulnerabilities and prevent breaches at a faster rate. Kenna provides:

24/7 Threat Processing: The Kenna threat processing engine continuously aggregates attack data, threat data, and exploit data feeds covering attacks in-the-wild, zero-day vulnerabilities, and active Internet breaches. A single day of Kenna threat processing is the equivalent of 475,000 security analysts matching known breaches and attacks against your vulnerabilities.

Attack Correlation: Kenna correlates the attack, threat and exploit data aggregated by our threat processing engine against your vulnerabilities twenty-four hours a day, seven days a week. Simply connect your vulnerability scanner to Kenna and we’ll identify where, when and how your organization is most likely to be attacked.

Risk Meters: A risk meter is a real-time measure of the risk a group of assets pose to your organization, and can be created for those critical systems in your environment you’d like to monitor. The Risk Meter dashboard gives your team and management a quick, at-a-glance view of your vulnerability and exploit risk across your business, categorized by what’s meaningful to you.

Remediation Management: Remediation Lists calculate the impact against your security risk for each remediation, and prioritize the vulnerabilities that pose the biggest threat to their network. Kenna connects to external ticketing systems to close the loop when tickets have been remediated with verification scans to confirm proper remediation steps have been taken.

Kenna integrates with over 20 different connectors, including leading vulnerability scanners such as Qualys, Nessus, and rapid7. It uses 8 external threat feeds including Metasploit. We're able to stop breaches before they occur by syncing your vulnerability scan data against active Internet data from our threat feed integrations. You're also able to quickly and clearly communicate your company's security posture to the entire organization.


Starting from
Pricing options
Free trial
Value for money
View Pricing Plans

Business size



United States

Supported languages

Kenna screenshot: See Active Internet BreachesRisk I/OKenna screenshot: See Your Vulnerabilities at a GlanceKenna screenshot: Connect with all Main ScannersKenna screenshot: Integrated Real-World Threat IntelligenceKenna screenshot: Easy-to-Understand DashboardsKenna screenshot: Executive View of Your Security PostureKenna screenshot: The Kenna dashboardKenna screenshot: Get a clear insight into risk with Kenna reports

Kenna reviews

There are currently no reviews of Kenna.

Kenna pricing

Starting from
Pricing options
Free trial
View Pricing Plans

Contact Kenna directly for pricing information.

Kenna features

API (133 other apps)
Access Control (98 other apps)
Activity Dashboard (75 other apps)
Alerts / Escalation (52 other apps)
Audit Trail (47 other apps)
Auditing (69 other apps)
Authentication (58 other apps)
Compliance Management (98 other apps)
Monitoring (109 other apps)
Password Management (52 other apps)
Policy Management (58 other apps)
Real Time Monitoring (59 other apps)
Reporting & Statistics (71 other apps)
Risk Alerts (46 other apps)
SSL Security (52 other apps)
Secure Data Storage (57 other apps)
Single Sign On (49 other apps)
Third Party Integration (67 other apps)
Two-Factor Authentication (52 other apps)
User Management (52 other apps)

Videos and tutorials

Additional information for Kenna

Key features of Kenna

  • 24/7 Threat Processing
  • Executive Dashboards
  • Attack Correlation
  • Alerting
  • Measuring/monitoring risk of asset groups
  • Threat Trends
  • Remediation Management
  • Asset Tagging
  • Active Internet Breach Data
  • Qualys Connectivity
  • Nessus Connectivity
  • Nexpose Rapid7 Connectivity
  • Vulnerability Prioritization
  • Jira Integration
  • Metasploit and other Threat Feeds
  • Vulnerability Scanner Analytics
View All Features


Time Savings – Days saved by no more analyzing, deduping, and prioritizing scan data, while still keeping up with new data

No blind spots with respect to any group of assets – Each group is completely understood in terms of vulnerabilities and remediations, as well as "what to fix first"

Instant, clear communication of security posture via management-ready dashboards

Single pane of glass that unites security and the rest of IT

Real-world threat intelligence seamlessly integrated with internal scan data -- Enabling users to know their specific vulnerabilities, unique to their environment

Time to Value - Up & running in 10 minutes -- easy to use ongoing