Kenna Security, a leader in predictive cyber risk, announced major updates to the†Kenna Security Partner Program†that equips channel partners with the tools to deliver the benefits of Kenna Security’s industry-leading, risk-based vulnerability management platform and drives greater security for customers and value for partners.
The Kenna Security Partner Program delivers a comprehensive set of tools for marketing, deal registration, technical support, and training to so partners can quickly and easily help their customers adopt a risk-based approach to vulnerability management.
Designed from the ground up to complement, the value-added services offered by channel partners, the program offers partners a significant opportunity to develop their own consultancy, technical, professional, and training services to provide additional value and enhanced security effectiveness.
Other benefits include:
- Consistent and predictable annual revenue through a SaaS subscription model
- Easy implementation as a standalone service or as part of a suite of existing security offerings
- Fast deployment and effortless scale to provide rapid return on investment
- Optional white labeled services and volume pricing through a purpose-built Managed Security Service Provider offering
- Compatibility with all major vulnerability scanners, featuring built-in integrations with more than 55 data sources, and a vendor-neutral philosophy, enabling partners to integrate the platform within existing solution portfolios
Companies today face more vulnerabilities than their security teams can handle. Yet, just†five percent of vulnerabilities seen in enterprises have known exploits, and†less than 2 percent of known vulnerabilities are ever exploited in the wild. The Kenna Security Platform leverages data science to correlate an organization’s disparate internal asset data with more than 15 sources of external threat intelligence to prioritize the threats that matter most, based on the risk they pose.
The platform then delivers prioritized remediation guidance to help teams quickly and address those threats and predict the likelihood that new vulnerabilities will be exploited in the future, giving security professionals the context they need to prioritize the riskiest vulnerabilities for remediation. The Kenna Security Platform easily integrates with all major vulnerability scanners, and can be applied to IT infrastructure assets, applications, and more.
Supporting Quotes
Hayley Roberts, CEO, Distology
“Kenna’s cloud-based solution represents the innovative and collaborative technology that is shaping the future of our business and is a natural fit for our security and cloud partners. With the launch of Kenna Security’s Partner Program in the EMEA region, resellers and MSSPs can now help their clients make better, faster and more accurate decisions, ensuring a greater impact on their organization’s risk posture.”
Chuck Crawford, CSO & Co-Founder of Fishtech Group
“Partnering with Kenna Security will enable us to provide our customers with advanced, risk-based prioritization across their entire organizations – full stack. We look forward to great success together as we leverage new sales tools, inventive marketing programs, and joint campaigns that are included in the updated partner program.”
Pip Witheridge, Director, Grove Group
“As an experienced MSSP with over 2,500 clients across the world, we’re acutely aware of the need for risk-based cybersecurity applications. Grove is excited to offer the Kenna Security Platform’s services to its customers.”
John McCann, Managing Director, Satisnet
“The challenges of vulnerability detection, response and remediation can be relentless if not done properly. A risk-based approach is, increasingly, the centerpiece of any remediation strategy. Utilizing Kenna as part of our vulnerability management managed service helps us to provide added value to our customers, including real-time vulnerability detection, mitigation, and response, as well as comprehensive reporting to measure, track and reduce risk across their entire organization.”
†