TrustRadius: an HG Insights company

Cisco Vulnerability Management

Score8.5 out of 10

5 Reviews and Ratings

What is Cisco Vulnerability Management?

Cisco Vulnerability Management (formerly Kenna.VM by Kenna Security, which was acquired by Cisco in June of 2021), is a vulnerability management platform featuring real-time cyber-risk analysis and predictive modeling based on intelligence feeds and global attack telemetries to provide accurate, reliable risk prioritization and protection.

Categories & Use Cases

Top Performing Features

  • Threat Recognition

    Detection and recognition of malicious software within a network that could pose a threat to sensitive information.

    Category average: 7.9

  • Threat Intelligence Reporting

    Generates reports that display information on threats (such as name, type, frequency of attack, area affected, etc.)

    Category average: 7.5

  • Automated Threat Identification

    Leveraging multiple sources of information (such as threat intelligence databases) to automatically identify threats.

    Category average: 7.8

Areas for Improvement

  • Network Analytics

    Analyzes various data reports and logs (DNS, firewall, user data, security information etc.) to identify threats in a network.

    Category average: 7.3

  • Automated Alerts and Reporting

    Systems in place to automatically alert, report, or notify of issues that may need timely remediation.

    Category average: 8.2

  • Threat Analysis

    Analyzing known factors such as behavior patterns, affected areas, and other specific features to more easily identify a threat.

    Category average: 7.8

Good Tool for Managing Vulnerabilities.

Use Cases and Deployment Scope

Our organization uses Cisco Vulnerability Management to ensure servers are up to date with the latest security patches. It keeps our servers safe from infiltration by bad actors and categorizes vulnerabilities with scores that indicate their severity. Various operating systems are supported, including Windows, Linux, and Unix.

Pros

  • Categorizes severs with vulnerability scores.
  • Lists the fixes for vulnerabilities.
  • Indicates specific programs and versions with vulnerabilities.

Cons

  • The layout of the information could use some improvement.

Return on Investment

  • Has kept our company safe from exploits.

Other Software Used

Qualys TotalCloud

Simplified Vulnerability Management

Use Cases and Deployment Scope

We utilize CVM to manage vulnerabilities and to mitigate those vulnerabilities found in a timely coordinated fashion. The product gives us a big picture of the threats found ranging from user end devices to server level systems. Having this information we are able then to mend these security gaps and patch systems to better protect our company as a whole.

Pros

  • Vulnerability tracking
  • Risk Meter reporting to pinpoint specific systems or vulnerabilities
  • Provides vulnerability scores to see what is high / medium / low urgency

Cons

  • Faster system scan times in background
  • more accurate vulnerability remediation links

Return on Investment

  • We have lowered our companies risk score from 850 to 660 in less than 6 months.
  • We have mitigated over 120,000 Vulnerabilities on our network since using CVM.
  • We have been able to streamline/prioritize patch management based off scans CVM provides from our assets.

Alternatives Considered

Automox, Microsoft Intune and Tenable Vulnerability Management

Other Software Used

Cisco Secure Endpoint, Cisco Umbrella, Automox, Microsoft Intune

Usability