help.kennasecurity.com
Kenna Release Notes – Kenna FAQ
https://help.kennasecurity.com/hc/en-us/articles/205581819-Kenna-Release-Notes
Winter 2017 Release Notes. Number of Fixes added to Risk Meter summaries in dashboard and reports. Remedy Connector launched for Remedy On Demand and on-premise. Jira connector now supports Jira 7 and Jira Cloud. New Alert: Connector Failure. Notes field now included in CSV exports. Fall 2016 Release Notes. ServiceNow connector now supports custom tables. Kenna now supports CWE identifiers in addition to WASC-TC and CVE. All file based connectors now support .zip uploads. SAML support is here! Spring 201...
kennasecurity.com
Qualys Vulnerability Scanning | Kenna Security Vulnerability & Risk Intelligence | Kenna Vulnerability Threat Management Platform | Kenna Security Vulnerability & Risk Intelligence
https://www.kennasecurity.com/qualys-vulnerability-scanning-best-practices
Tips for Qualys Vulnerability Scanning –. The Qualys scanning platform is one of the most widely used vulnerability scanners in the industry. IT Security pros love the solution for its proven ability to pull massive amounts of data in regards to at-risk environments. It’s like trying to swim out from underneath a wave—only to have five more waves crash on top of you again. Try Kenna for Free. Find Your Weaknesses and Protect Your Organization. The secret sauce of Kenna is its ability to look at real-time...
kennasecurity.com
Rapid7 Vulnerability Scanning | Kenna Security Vulnerability & Risk Intelligence | Kenna Vulnerability Threat Management Platform | Kenna Security Vulnerability & Risk Intelligence
https://www.kennasecurity.com/prioritize-rapid7-scanning-results
Protect Your Data and Reduce Risk with Rapid7 Nexpose and Kenna. With today’s threat landscape, it’s a given that your IT infrastructure will be attacked with attempts to steal sensitive data. And it’s what you do to prepare that makes all the difference. Rapid7 Nexpose is one of the most widely used network scanners that continuously scans assets, applications and vulnerabilities to identify patterns of attack. Connect with Threat Feeds. Don’t Just Analyze, Prioritize. Stay Ahead of Emerging Attacks.
kennasecurity.com
Security & Vulnerability Testing Tools | Kenna Security Vulnerability & Risk Intelligence | Kenna Vulnerability Threat Management Platform | Kenna Security Vulnerability & Risk Intelligence
https://www.kennasecurity.com/security
The measures we take to ensure your data is safe and secure. Eating our own dog food is more than just a saying for a marketing document. Not only do we use Kenna to manage our vulnerabilities, we give our clients read access to our account. We understand the trust our customers place in our services and are committed to transparency in our controls. Data at rest encrypted using AES 256. User passwords stored in one way salted hash. Centralized logging and alerting. All application traffic over SSL/TLS.
kennasecurity.com
Who We Are | Kenna Vulnerability Scanning Tools | Kenna Vulnerability Threat Management Platform | Kenna Security Vulnerability & Risk Intelligence
https://www.kennasecurity.com/about
Kenna is growing every year. Kenna is a Vulnerability and Risk Intelligence platform that’s never been seen before. Our customers face a lot of vulnerabilities would you believe, millions? We’re good at this. But we could always use more help. Would you like to join us? Check out the jobs link on the right. Fortune 500 Style Benefits. A Team that Will Fight Beside You Every Day. View Jobs at Kenna. Chief of Design, Cofounder. Qualys Scanning and Kenna. Prioritize Rapid7 Scanning Results.
kennasecurity.com
Data-Driven Vulnerability Scanning | Kenna Security Vulnerability & Risk Intelligence | Kenna Vulnerability Threat Management Platform | Kenna Security Vulnerability & Risk Intelligence
https://www.kennasecurity.com/data-driven-security
Adopting A Real-Time,. How Security Practitioners Can Prioritize Vulnerability Scanning Data to Make Intelligent Decisions that Minimize Risk. The Kenna team is always conducting new research and development for our platform. We'd love to keep you up-to-date on what we’re working on. If you're interested, feel free to register below. Security Is Now A Data Problem. Current risk assessment methodologies do not fit real in the wild attack data. Why fix it if it’s not broken? Because it’s quite broken. M...
kennasecurity.com
Features | Kenna Security Vulnerability & Risk Intelligence | Kenna Vulnerability Threat Management Platform | Kenna Security Vulnerability & Risk Intelligence
https://www.kennasecurity.com/features
Our approach to threat and vulnerability management integrates the results of vulnerability scan data—Qualys, Nessus, Rapid 7, and dozens more—with the results from 8 different threat feeds. The result? You know what vulnerabilities need to be prioritized in order to improve your company’s security posture. Then you can report on your team’s activity, showing the impact of your remediations. No one will doubt your work—or effectiveness. A Clear Insight into Risk Kenna Reports. Here’s where you shave hour...
kennasecurity.com
Jobs | Kenna Vulnerability Threat Management Platform | Kenna Security Vulnerability & Risk Intelligence
https://www.kennasecurity.com/jobs
We’re looking for the best to join the best. Kenna is an early-stage technology company based in San Francisco, CA and is funded by USVP, Costanoa Venture Capital and Tugboat Ventures. We are a small but mighty team committed to constantly learning, measuring, and improving our products and our customers’ experience. Ruby Engineer (Chicago, IL). Customer Support Engineer (Chicago, IL). What We’re Looking For. Ambitious and being up for any challenge. Infectious enthusiasm, encouragement and support.
kennasecurity.com
Kenna Pricing | Kenna Security Vulnerability & Risk Intelligence | Kenna Vulnerability Threat Management Platform | Kenna Security Vulnerability & Risk Intelligence
https://www.kennasecurity.com/pricing
Kenna prices based on the number of assets you scan. We have customers who scan all sizes of environments from 2,000 assets to 200,000. Volume pricing kicks in quickly and we can generally find a way to work within your existing vulnerability management budget. Simple pricing that scales. In order to get an exact quote, please tell us a little about your environment. We’ll be happy to follow up and give you a price quote based on what you tell us. Give us 5 minutes and 1,000 assets.
kennasecurity.com
Resources | Kenna Vulnerability Threat Management Platform | Kenna Security Vulnerability & Risk Intelligence
https://www.kennasecurity.com/resources
Learn cutting-edge practices and know-how from experts in information security. Reporting on Risk to the Board: A CISO’s Approach. What’s the right metric to use when reporting on your team’s ability to reduce exposure to risk? How the Rise in Non-Targeted Attacks Has Widened the Remediation Gap. Exclusive report: Find out why InfoSec teams are under the gun to keep up with the increased cadence of non-targeted attacks and what they can do about them. Common Vulnerability Management Mistakes to Avoid.