Kenna Pricing, Features, Reviews & Comparison of Alternatives

Kenna

Prioritize your scan data

  0 reviews

Kenna overview

Kenna (formerly Risk I/O) empowers customers such as DirectTV, Toyota, Spotify, and University of Chicago to remediate vulnerabilities and prevent breaches at a faster rate. Kenna provides:

24/7 Threat Processing: The Kenna threat processing engine continuously aggregates attack data, threat data, and exploit data feeds covering attacks in-the-wild, zero-day vulnerabilities, and active Internet breaches. A single day of Kenna threat processing is the equivalent of 475,000 security analysts matching known breaches and attacks against your vulnerabilities.

Attack Correlation: Kenna correlates the attack, threat and exploit data aggregated by our threat processing engine against your vulnerabilities twenty-four hours a day, seven days a week. Simply connect your vulnerability scanner to Kenna and we’ll identify where, when and how your organization is most likely to be attacked.

Risk Meters: A risk meter is a real-time measure of the risk a group of assets pose to your organization, and can be created for those critical systems in your environment you’d like to monitor. The Risk Meter dashboard gives your team and management a quick, at-a-glance view of your vulnerability and exploit risk across your business, categorized by what’s meaningful to you.

Remediation Management: Remediation Lists calculate the impact against your security risk for each remediation, and prioritize the vulnerabilities that pose the biggest threat to their network. Kenna connects to external ticketing systems to close the loop when tickets have been remediated with verification scans to confirm proper remediation steps have been taken.

Kenna integrates with over 20 different connectors, including leading vulnerability scanners such as Qualys, Nessus, and rapid7. It uses 8 external threat feeds including Metasploit. We're able to stop breaches before they occur by syncing your vulnerability scan data against active Internet data from our threat feed integrations. You're also able to quickly and clearly communicate your company's security posture to the entire organization.
www.kennasecurity.com

Pricing

Starting from
$1200
Pricing options
Free trial
Value for money
View Pricing Plans

Business size

S
M
L

Markets

United States

Supported languages

English
Kenna screenshot: Executive View of Your Security PostureRisk I/OKenna screenshot: Easy-to-Understand DashboardsKenna screenshot: Integrated Real-World Threat IntelligenceKenna screenshot: Connect with all Main ScannersKenna screenshot: See Your Vulnerabilities at a GlanceKenna screenshot: See Active Internet BreachesKenna screenshot: The Kenna dashboardKenna screenshot: Get a clear insight into risk with Kenna reports

Kenna reviews

There are currently no reviews of Kenna.
 

Kenna pricing

Starting from
$1200
Pricing options
Free trial
View Pricing Plans

Contact Kenna directly for pricing information.

Kenna features

API (53 other apps)
Access Control (35 other apps)
Activity Dashboard (30 other apps)
Alerts / Escalation (17 other apps)
Application Security (30 other apps)
Audit Trail (20 other apps)
Auditing (42 other apps)
Authentication (29 other apps)
Automatic Notifications (20 other apps)
Compliance Management (29 other apps)
Monitoring (50 other apps)
Password Management (24 other apps)
Permission Management (20 other apps)
Reporting & Statistics (21 other apps)
SSL Security (35 other apps)
Secure Data Storage (19 other apps)
Security Auditing (16 other apps)
Single Sign On (30 other apps)
Third Party Integration (23 other apps)
Two-Factor Authentication (26 other apps)

Additional information for Kenna

Key features of Kenna

  • 24/7 Threat Processing
  • Executive Dashboards
  • Attack Correlation
  • Alerting
  • Measuring/monitoring risk of asset groups
  • Threat Trends
  • Remediation Management
  • Asset Tagging
  • Active Internet Breach Data
  • Qualys Connectivity
  • Nessus Connectivity
  • Nexpose Rapid7 Connectivity
  • Vulnerability Prioritization
  • Jira Integration
  • Metasploit and other Threat Feeds
  • Vulnerability Scanner Analytics
View All Features

Benefits

Time Savings – Days saved by no more analyzing, deduping, and prioritizing scan data, while still keeping up with new data

No blind spots with respect to any group of assets – Each group is completely understood in terms of vulnerabilities and remediations, as well as "what to fix first"

Instant, clear communication of security posture via management-ready dashboards

Single pane of glass that unites security and the rest of IT

Real-world threat intelligence seamlessly integrated with internal scan data -- Enabling users to know their specific vulnerabilities, unique to their environment

Time to Value - Up & running in 10 minutes -- easy to use ongoing