Hi [[ session.user.profile.firstName ]]

Introduction to Kenna Security: How it Works

Kenna is a software-as-a-service Risk and Vulnerability Intelligence platform that accurately measures risk and prioritizes remediation efforts before an attacker can exploit an organization's weaknesses. Kenna accomplishes this by automating the correlation of customer vulnerability data, threat data, and 0-day data, analyzing security vulnerabilities against active Internet breaches. For more information, visit kennasecurity.com
Recorded Oct 20 2015 2 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Kenna Security
Presentation preview: Introduction to Kenna Security: How it Works

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Kenna Platform Demo: Your Risk Revealed Recorded: Dec 30 2015 25 mins
    Kenna Security
    Join Brian Kavanagh and Kyle Havens as they offer a fast but detailed tour of the platform. See how Kenna has become an indispensable part of the security arsenal at companies such as PTC, Anthem, Hanesbrands, and Metlife.

    In just 30 minutes, we'll cover how to:
    - Connect all your scanner feeds to the Kenna platform
    - Set up your risk meter dashboards for your technology environments
    - View, track, and report on your risk posture
    - See which patches give you the biggest bang for your buck
  • Introduction to Kenna Security: How it Works Recorded: Oct 20 2015 2 mins
    Kenna Security
    Kenna is a software-as-a-service Risk and Vulnerability Intelligence platform that accurately measures risk and prioritizes remediation efforts before an attacker can exploit an organization's weaknesses. Kenna accomplishes this by automating the correlation of customer vulnerability data, threat data, and 0-day data, analyzing security vulnerabilities against active Internet breaches. For more information, visit kennasecurity.com
  • CVSS Under Fire: How to Solve The Prioritization Problem Recorded: Aug 26 2015 43 mins
    Michael Roytman, Chief Data Scientist at Kenna
    In the landscape of vulnerability management, you know that effective prioritization of vulnerabilities is the difference between "playing the numbers game" and truly being an InfoSec rock star. But too often, our primary resource--the CVSS--is relied on too heavily, with disastrous consequences.

    Michael Roytman, Chief Data Scientist at Kenna, will explain what IT security professionals miss by placing too much trust in CVSS when it comes to prioritization efforts. He will also explain what information should absolutely be taken into consideration in order to focus on vulnerabilities posing the greatest risk. Topics covered include:

    - Why CVSS sometimes gets it wrong
    - Specific examples of serious exploits being given low scores
    - What IT security professionals should do to supplement CVSS
    - How the proper use of threat intelligence can accelerate your vuln management program
Know Your Risk
Kenna is a pioneer and leader of a new category of IT security solutions that allows security and IT teams to efficiently focus on the vulnerabilities posing the greatest risk to their IT environments. We’ve experienced firsthand just how frustrating and challenging security can be – the struggles with being unable to keep up with the volume of scan data, having to settle for inadequate security due to budget constraints, picking a remediation list at random (and hoping for the best), and being unable to measure and report on your team's efforts to reduce your exposure to risk.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Introduction to Kenna Security: How it Works
  • Live at: Oct 20 2015 7:05 pm
  • Presented by: Kenna Security
  • From:
Your email has been sent.
or close