Kenna Security

www.kennasecurity.com

We pioneered risk-based vulnerability management, and now we’re doing the same for Modern Vulnerability Management. What is Modern Vulnerability Management? It’s a new model for managing the right level of risk for your business. It provides clear prioritization based on real-time threat and exploit intelligence, and uses those insights to deliver guidance unique to your environment. And it eliminates the friction between Security and IT teams about what to patch, and when. So you can save time, money and resources—and keep your teams efficiently focused on reducing the biggest risks to your business.

Read more

Reach decision makers at Kenna Security

Lusha Magic

Free credit every month!

We pioneered risk-based vulnerability management, and now we’re doing the same for Modern Vulnerability Management. What is Modern Vulnerability Management? It’s a new model for managing the right level of risk for your business. It provides clear prioritization based on real-time threat and exploit intelligence, and uses those insights to deliver guidance unique to your environment. And it eliminates the friction between Security and IT teams about what to patch, and when. So you can save time, money and resources—and keep your teams efficiently focused on reducing the biggest risks to your business.

Read more
icon

Country

icon

State

California

icon

City (Headquarters)

Santa Clara

icon

Founded

2010

icon

Estimated Revenue

$5,000,000 to $10,000,000

icon

Social

  • icon
  • icon

Employees statistics

View all employees

Potential Decision Makers

  • Board Member

    Email ****** @****.com
    Phone (***) ****-****
  • Board Member

    Email ****** @****.com
    Phone (***) ****-****
  • Chief Technology Officer , Co Founder

    Email ****** @****.com
    Phone (***) ****-****
  • Director of Security Research

    Email ****** @****.com
    Phone (***) ****-****

Technologies

(97)

Reach decision makers at Kenna Security

Free credits every month!

My account

Kenna Security FAQ

Computer and Network Security

Sign up now to uncover all the contact details