Try our new research platform with insights from 80,000+ expert users

Cisco Vulnerability Management (formerly Kenna.VM) vs RiskIQ Illuminate comparison

 

Comparison Buyer's Guide

Executive Summary
 

Categories and Ranking

Cisco Vulnerability Managem...
Average Rating
8.0
Reviews Sentiment
6.8
Number of Reviews
1
Ranking in other categories
Cisco Security Portfolio (11th), Risk-Based Vulnerability Management (18th)
RiskIQ Illuminate
Average Rating
0.0
Number of Reviews
1
Ranking in other categories
Attack Surface Management (ASM) (27th)
 

Mindshare comparison

While both are Security Software solutions, they serve different purposes. Cisco Vulnerability Management (formerly Kenna.VM) is designed for Risk-Based Vulnerability Management and holds a mindshare of 3.4%, up 1.9% compared to last year.
RiskIQ Illuminate, on the other hand, focuses on Attack Surface Management (ASM), holds 1.1% mindshare, down 3.0% since last year.
Risk-Based Vulnerability Management
Attack Surface Management (ASM)
 

Featured Reviews

AshishPaliwal - PeerSpot reviewer
Offers contextual prioritization and risk-based remediation of vulnerability
An improvement would be some sort of an integration with any GRC suite. There are a lot of GRC suites available, like Archer, MetricStream, Rsam, Protiviti, for example. So how would a solution like this work if my company has already invested thousands or maybe millions in a GRC solution? Do I still need it and how does it fit into an existing SAP environment? There could be interoperability, having more data sources, integrating Splunk, Qualys, FireEye, Rapid7, Carbon Black. I'm sure all that can be done to an extent, with a little more insight and a little more accuracy on the industry numbers and trends. I'd like the solution to offer any sort of assistance in any way with the remediation part, not just identification of vulnerability risk, and that is second.
SimonClark - PeerSpot reviewer
Able to discover unpatched servers, offers good stability, and scales very well
A low-cost service to evaluate the risk score of a supply chain would be very helpful. This could be useful for insurance companies offering cyber insurance to enterprise customers, providing the insurer with a valuable way to unobtrusively, quickly, and frequently assess their customers and apply appropriate premiums for the level of risk. This would also be useful for enterprises. They could, for example, assess companies prior to a merger or acquisition. What would also be useful for any enterprise would be if their supply chain has some kind of direct digital access to parts of their network.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"The risk context of any vulnerability is a valuable feature."
"The solution is stable with 12 years of established historical data."
 

Cons

"An improvement would be some sort of an integration with any GRC suite."
"A low-cost service to evaluate the risk score of a supply chain would be very helpful."
 

Pricing and Cost Advice

"I think the pricing is based on the number of endpoints, so it's more subscription-based."
Information not available
report
Use our free recommendation engine to learn which Risk-Based Vulnerability Management solutions are best for your needs.
825,399 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Computer Software Company
24%
Financial Services Firm
15%
Retailer
7%
Insurance Company
7%
Financial Services Firm
21%
Computer Software Company
20%
Manufacturing Company
7%
Real Estate/Law Firm
5%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
No data available
No data available
 

Also Known As

Kenna.VM, Kenna Security, Kenna, Kenna Security Platform
RiskIQ Digital Threat Management
 

Learn More

 

Overview

 

Sample Customers

TransUnion
DocuSign, Outbrain, The Economist Group, Rackspace, The Citizen Lab
Find out what your peers are saying about Tenable, Qualys, Rapid7 and others in Risk-Based Vulnerability Management. Updated: December 2024.
825,399 professionals have used our research since 2012.