
Tufin Orchestration Suite
Automates and orchestrates network security policy changes across heterogeneous environments.

Risk-based vulnerability prioritization powered by real-world threat intelligence and advanced data science.

Cisco Vulnerability Management, formerly Kenna Security's Kenna.VM, is a risk-based vulnerability management platform designed to prioritize vulnerabilities based on real-world threat intelligence and data science. It aggregates vulnerability data from various sources, including scanners and threat feeds, to provide a unified view of an organization's risk posture. The platform uses machine learning algorithms to analyze vulnerabilities, prioritize remediation efforts, and track progress over time. Key use cases include reducing mean time to remediation (MTTR), improving security team efficiency, and demonstrating compliance with industry regulations. The platform's architecture includes data connectors for integrating with existing security tools, a cloud-based analytics engine for risk scoring, and reporting dashboards for visualizing vulnerability trends.
Cisco Vulnerability Management, formerly Kenna Security's Kenna.
Explore all tools that specialize in risk scoring. This domain focus ensures Cisco Vulnerability Management (formerly Kenna Security) delivers optimized results for this specific requirement.
Explore all tools that specialize in prioritize vulnerabilities. This domain focus ensures Cisco Vulnerability Management (formerly Kenna Security) delivers optimized results for this specific requirement.
Explore all tools that specialize in identify vulnerabilities. This domain focus ensures Cisco Vulnerability Management (formerly Kenna Security) delivers optimized results for this specific requirement.
Predicts the likelihood of a vulnerability being exploited based on historical data and threat intelligence.
Prioritizes vulnerabilities based on the business criticality of the affected assets.
Automatically creates and assigns remediation tasks based on vulnerability risk scores.
Integrates with multiple threat intelligence feeds to provide up-to-date information on emerging threats.
Tracks the age of vulnerabilities and prioritizes those that have been open for a long time.
Deploy data connectors to integrate with vulnerability scanners and other security tools.
Configure threat intelligence feeds to receive real-time threat data.
Import asset inventory data to map vulnerabilities to critical assets.
Define business impact criteria to prioritize vulnerabilities based on their potential impact.
Train security teams on how to use the platform to identify and remediate high-risk vulnerabilities.
Set up automated reporting to track progress and demonstrate compliance.
All Set
Ready to go
Verified feedback from other users.
"Customers praise the platform's ability to prioritize vulnerabilities effectively and improve remediation efficiency."
Post questions, share tips, and help other users.

Automates and orchestrates network security policy changes across heterogeneous environments.

A fun, effective platform to learn cybersecurity through hands-on labs.

Uncovers exposed non-human identities (NHIs) and their secrets, securing everything from open-source projects to global enterprises.

Visual risk intelligence for preventing fraud using authenticated visuals and AI manipulation detection.

Browse privately, explore freely, and defend against tracking, surveillance, and censorship.

Gain visibility across your attack surface and accurately communicate cyber risk to support optimal business performance.