Kenna - Prix, fonctionnalités, avis et comparateur de logiciels

Kenna

Prioritize your scan data

(0 avis)

Kenna - Présentation

Kenna (formerly Risk I/O) empowers customers such as DirectTV, Toyota, Spotify, and University of Chicago to remediate vulnerabilities and prevent breaches at a faster rate. Kenna provides:

24/7 Threat Processing: The Kenna threat processing engine continuously aggregates attack data, threat data, and exploit data feeds covering attacks in-the-wild, zero-day vulnerabilities, and active Internet breaches. A single day of Kenna threat processing is the equivalent of 475,000 security analysts matching known breaches and attacks against your vulnerabilities.

Attack Correlation: Kenna correlates the attack, threat and exploit data aggregated by our threat processing engine against your vulnerabilities twenty-four hours a day, seven days a week. Simply connect your vulnerability scanner to Kenna and we’ll identify where, when and how your organization is most likely to be attacked.

Risk Meters: A risk meter is a real-time measure of the risk a group of assets pose to your organization, and can be created for those critical systems in your environment you’d like to monitor. The Risk Meter dashboard gives your team and management a quick, at-a-glance view of your vulnerability and exploit risk across your business, categorized by what’s meaningful to you.

Remediation Management: Remediation Lists calculate the impact against your security risk for each remediation, and prioritize the vulnerabilities that pose the biggest threat to their network. Kenna connects to external ticketing systems to close the loop when tickets have been remediated with verification scans to confirm proper remediation steps have been taken.

Kenna integrates with over 20 different connectors, including leading vulnerability scanners such as Qualys, Nessus, and rapid7. It uses 8 external threat feeds including Metasploit. We're able to stop breaches before they occur by syncing your vulnerability scan data against active Internet data from our threat feed integrations. You're also able to quickly and clearly communicate your company's security posture to the entire organization.

Prix

À partir de
$1200
Types de licence
version d'essai gratuite

Type d'entreprise

S
M
L

Disponible dans les pays suivants

États-Unis

Langues

anglais

Kenna - Prix

À partir de
$1200
Types de licence
version d'essai gratuite

Contact Kenna directly for pricing information.

Kenna - Fonctionnalités


  • API
  • Audit
  • Authentification
  • Authentification unique
  • Authentification à 2 facteurs
  • Contrôle d'accès
  • Gestion de la conformité
  • Gestion des autorisations
  • Gestion des candidatures
  • Gestion des mots de passe
  • Intégration de tiers
  • Monitoring
  • Notifications automatiques
  • Piste d'audit
  • Rapports et statistiques
  • Stockage sécurisé des données
  • Suivi des activités
  • Sécurité SSL
  • Sécurité des applications
  • Tableau de bord d'activités

Plus d'informations sur Kenna

Kenna - Principales fonctionnalités

  • 24/7 Threat Processing
  • Active Internet Breach Data
  • Alerting
  • Asset Tagging
  • Attack Correlation
  • Executive Dashboards
  • Jira Integration
  • Measuring/monitoring risk of asset groups
  • Metasploit and other Threat Feeds
  • Nessus Connectivity
  • Nexpose Rapid7 Connectivity
  • Qualys Connectivity
  • Remediation Management
  • Threat Trends
  • Vulnerability Prioritization
  • Vulnerability Scanner Analytics

Avantages

Time Savings – Days saved by no more analyzing, deduping, and prioritizing scan data, while still keeping up with new data

No blind spots with respect to any group of assets – Each group is completely understood in terms of vulnerabilities and remediations, as well as "what to fix first"

Instant, clear communication of security posture via management-ready dashboards

Single pane of glass that unites security and the rest of IT

Real-world threat intelligence seamlessly integrated with internal scan data -- Enabling users to know their specific vulnerabilities, unique to their environment

Time to Value - Up & running in 10 minutes -- easy to use ongoing

Kenna - FAQ

Voici quelques-unes des questions fréquentes sur Kenna.

Q. Quels sont les types de licence disponibles pour Kenna ?

Types de licences disponibles pour Kenna :

À partir de: $1200

version d'essai gratuite: Disponible

Contact Kenna directly for pricing information.

Q. Quelles sont les principales fonctionnalités du logiciel Kenna ?

Fonctionnalités du logiciel Kenna :

  • 24/7 Threat Processing
  • Active Internet Breach Data
  • Alerting
  • Asset Tagging
  • Attack Correlation
  • Executive Dashboards
  • Jira Integration
  • Measuring/monitoring risk of asset groups
  • Metasploit and other Threat Feeds
  • Nessus Connectivity
  • Nexpose Rapid7 Connectivity
  • Qualys Connectivity
  • Remediation Management
  • Threat Trends
  • Vulnerability Prioritization
  • Vulnerability Scanner Analytics

Q. Qui utilise Kenna ?

Utilisateurs habituels du logiciel Kenna :

Entreprises de taille moyenne

Q. Dans quelles langues Kenna est-il disponible ?

Langues dans lesquelles Kenna est disponible :

anglais

Q. Quels sont les types de licence disponibles pour Kenna ?

Nous n'avons pas d'informations sur les types de licences de Kenna.

Q. Kenna prend-il en charge les appareils mobiles ?

Nous n'avons pas d'informations sur les appareils pris en charge par Kenna.

Q. Avec quelles applications Kenna peut-il s'intégrer ?

Nous n'avons pas d'informations sur les intégrations offertes par Kenna.

Q. Quelles sont les ressources d'aide disponibles pour Kenna ?

Nous n'avons pas d'informations sur les ressources d'aide disponibles pour Kenna.

Logiciels les + demandés