Cisco Vulnerability Management vs. HackerOne

Overview
ProductRatingMost Used ByProduct SummaryStarting Price
Cisco Vulnerability Management
Score 8.5 out of 10
N/A
Cisco Vulnerability Management (formerly Kenna.VM by Kenna Security, which was acquired by Cisco in June of 2021), is a vulnerability management platform featuring real-time cyber-risk analysis and predictive modeling based on intelligence feeds and global attack telemetries to provide accurate, reliable risk prioritization and protection.N/A
HackerOne
Score 9.0 out of 10
N/A
HackerOne is a hacker-powered security platform, helping organizations find and fix critical vulnerabilities before they can be exploited, from the company of the same name in San Francisco. The service is used for vulnerability location, pen testing, bug bounty, and vulnerability triage services.N/A
Pricing
Cisco Vulnerability ManagementHackerOne
Editions & Modules
No answers on this topic
No answers on this topic
Offerings
Pricing Offerings
Cisco Vulnerability ManagementHackerOne
Free Trial
NoNo
Free/Freemium Version
NoNo
Premium Consulting/Integration Services
NoNo
Entry-level Setup FeeNo setup feeNo setup fee
Additional DetailsFor more information please email www.hackerone.com/contact or find us on the AWS Marketplace: https://aws.amazon.com/marketplace/seller-profile?id=10857e7c-011b-476d-b938-b587deba31cf
More Pricing Information
Community Pulse
Cisco Vulnerability ManagementHackerOne
Features
Cisco Vulnerability ManagementHackerOne
Threat Intelligence
Comparison of Threat Intelligence features of Product A and Product B
Cisco Vulnerability Management
8.8
2 Ratings
9% above category average
HackerOne
-
Ratings
Network Analytics7.31 Ratings00 Ratings
Threat Recognition10.01 Ratings00 Ratings
Vulnerability Classification9.42 Ratings00 Ratings
Automated Alerts and Reporting7.52 Ratings00 Ratings
Threat Analysis7.52 Ratings00 Ratings
Threat Intelligence Reporting10.01 Ratings00 Ratings
Automated Threat Identification10.01 Ratings00 Ratings
Vulnerability Management Tools
Comparison of Vulnerability Management Tools features of Product A and Product B
Cisco Vulnerability Management
9.4
2 Ratings
13% above category average
HackerOne
-
Ratings
IT Asset Realization9.42 Ratings00 Ratings
Configuration Monitoring9.42 Ratings00 Ratings
Vulnerability Intelligence9.42 Ratings00 Ratings
Best Alternatives
Cisco Vulnerability ManagementHackerOne
Small Businesses
Action1
Action1
Score 9.5 out of 10

No answers on this topic

Medium-sized Companies
Action1
Action1
Score 9.5 out of 10

No answers on this topic

Enterprises
CrowdStrike Falcon
CrowdStrike Falcon
Score 9.1 out of 10

No answers on this topic

All AlternativesView all alternativesView all alternatives
User Ratings
Cisco Vulnerability ManagementHackerOne
Likelihood to Recommend
10.0
(1 ratings)
7.0
(2 ratings)
Usability
10.0
(1 ratings)
-
(0 ratings)
User Testimonials
Cisco Vulnerability ManagementHackerOne
Likelihood to Recommend
Cisco
It works well when interfacing with Qualys VM QualysGuard to highlight server vulnerabilities, providing details on the affected packages and programs, along with solutions and links to the provider's websites, so our servers can be kept safe by quickly addressing issues. Because vulnerability scores are assigned, we can prioritize which servers to address first.
Read full review
HackerOne
It is one of the good platforms for security researchers to submit bugs and other vulnerabilities, it however, has some challenges, in terms of un-verified and duplicate submissions.
Read full review
Pros
Cisco
  • Vulnerability tracking
  • Risk Meter reporting to pinpoint specific systems or vulnerabilities
  • Provides vulnerability scores to see what is high / medium / low urgency
Read full review
HackerOne
  • Filter for spammy bug reports
  • Nice central interface
  • Payment/reward system is nice
Read full review
Cons
Cisco
  • The layout of the information could use some improvement.
Read full review
HackerOne
  • A lot of duplicate bugs get reported, although it does offer automatic suggestion of previously reported bugs that may be duplicates, it is far from perfect.
  • Anyone can report bugs, a lot of them are not verified before submission. This sometimes leads to a lot of time spent in verifying if the bug is really actionable.
  • Each submission has to be treated with equal potential, a lot of time, some time gets invested in vulnerabilities that aren't as important as some others.
Read full review
Usability
Cisco
CVM provides a very easy to understand and use interfaces. Dashboards and reporting are compiled nicely when risk meters are created. After initial setup of software cisco onboarding teams do an amazing job going over all areas of this software to provide best overall usability of the product. Against other tools setup and usability is at a higher standard
Read full review
HackerOne
No answers on this topic
Alternatives Considered
Cisco
We run a flavor of multiple products and CVM enhances/complements those tools by pinpointing where the vulnerabilities are at on our network. Intune and Automox being products CVM works well with when its time to patch affected systems. Tenable we used prior to CVM and its product was too complex and clunky and always had issues with asset duplication. CVM simplified vulnerability scanning and made it a lot easier to manage compared to Tenable
Read full review
HackerOne
These were very close and we liked HackerOne better. For a time we did have both and we felt the need to consolidate the information into one platform and end of life our internal offering. Overall we've been fairly happy with HackerOne.
Read full review
Return on Investment
Cisco
  • Has kept our company safe from exploits.
Read full review
HackerOne
  • Bugs that can't be tracked internally are submitted by external researchers, which is an important factor for security vulnerabilities.
  • Even if the bugs reported are duplicates, there still is provision to award reputation points, that keep the researchers engaged.
  • It also requires a lot of verification and validation, as a lot of the submissions are unverified to begin with.
Read full review
ScreenShots