Connect with us

Company News

Cisco completes purchase of security risk-management firm

Cisco continues to expand its security portfolio and this week signed a private agreement with risk-based management firm Kena Security.

Kenna’s risk-based vulnerability management system collects and analyzes security data to inform security teams about threats, prioritize remediation, and better understand risks.

This technology is part of Cisco’s SecureX service, which integrates a number of security components. According to Cisco, the service is an open cloud-native system that detects and fixes threats across Cisco and third-party products from a single interface. The SecureX dashboard accelerates threat investigation and incident management by displaying operational metrics, triggering alerts for new threats, and aggregating and correlating global intelligence and local context into a single view.

In addition, according to Cisco, SecureX offers over 30 pre-built security workflows, 40 turnkey integrations, and orchestration capabilities that can automate and orchestrate security management across enterprise clouds, networks, applications, and endpoints. To do.

“Using data science and real-world threat intelligence, Kenna has a proven ability to ingest data from multi-vendor environments and provide a comprehensive view of IT vulnerability risk,” said Cisco’s security business. Said Gee Rittenhouse, Senior Vice President and General Manager of.Group of blog About the acquisition.

He says that part of SecureX’s Kenna Security allows Cisco to bridge threat management with Kenna’s risk-based vulnerability management to enhance Cisco’s entire platform. “In addition, the combination of Kenna Security and SecureX enables customers to address critical challenges by generating a priority list of vulnerabilities. Streamline collaboration between security and IT teams. Automating repairs to improve, “Rittenhaus said.

Over the past few years, Cisco has made several security acquisitions, including Banzai Cloud, to help customers monitor application development, deployment, runtime, and security workflows. Port shift for application security. Duo for access security and multi-factor authentication. Florida News Times

Click to comment

You must be logged in to post a comment Login

Leave a Reply

Copyright © 2024 Communications Today

error: Content is protected !!