BMC TrueSight Vulnerability Management vs Cisco Vulnerability Management (formerly Kenna.VM) comparison

Cancel
You must select at least 2 products to compare!
Comparison Buyer's Guide
Executive Summary

We performed a comparison between BMC TrueSight Vulnerability Management and Cisco Vulnerability Management (formerly Kenna.VM) based on real PeerSpot user reviews.

Find out what your peers are saying about Tenable, Wiz, Check Point Software Technologies and others in Vulnerability Management.
To learn more, read our detailed Vulnerability Management Report (Updated: April 2024).
769,789 professionals have used our research since 2012.
Featured Review
Quotes From Members
We asked business professionals to review the solutions they use.
Here are some excerpts of what they said:
Pros
"Takes reports from other vulnerabilities."

More BMC TrueSight Vulnerability Management Pros →

"The risk context of any vulnerability is a valuable feature."

More Cisco Vulnerability Management (formerly Kenna.VM) Pros →

Cons
"No third-party applications or integrations with additional software solutions."

More BMC TrueSight Vulnerability Management Cons →

"An improvement would be some sort of an integration with any GRC suite."

More Cisco Vulnerability Management (formerly Kenna.VM) Cons →

Pricing and Cost Advice
Information Not Available
  • "I think the pricing is based on the number of endpoints, so it's more subscription-based."
  • More Cisco Vulnerability Management (formerly Kenna.VM) Pricing and Cost Advice →

    report
    Use our free recommendation engine to learn which Vulnerability Management solutions are best for your needs.
    769,789 professionals have used our research since 2012.
    Questions from the Community
    Ask a question

    Earn 20 points

    Top Answer:The risk context of any vulnerability is a valuable feature.
    Top Answer:I think the pricing is based on the number of endpoints, so it's more subscription-based. If you have 10 computers versus a million computers, obviously the pricing will change.
    Top Answer:An improvement would be some sort of an integration with any GRC suite. There are a lot of GRC suites available, like Archer, MetricStream, Rsam, Protiviti, for example. So how would a solution like… more »
    Ranking
    49th
    Views
    167
    Comparisons
    127
    Reviews
    0
    Average Words per Review
    0
    Rating
    N/A
    Views
    691
    Comparisons
    476
    Reviews
    1
    Average Words per Review
    498
    Rating
    8.0
    Comparisons
    Also Known As
    TrueSight Vulnerability Management, SecOps Response Service, BladeLogic Threat Director
    Kenna.VM, Kenna Security, Kenna, Kenna Security Platform
    Learn More
    Overview

    Helps security and IT operations teams prioritize and remediate risks based on potential impact to the business.

    • Powerful dashboards highlight vulnerability data, performance trends, and SLA compliance for quick prioritization of remediation tasks
    • Streamlined workflows combine scan verification and remediation tasks, leveraging BladeLogic Server Automation and Microsoft SCCM systems management
    • Blindspot awareness enables you to identify areas of your infrastructure which are not being monitored, leaving you exposed
    • Rapid import lets you quickly consume vulnerability scanning reports with native integration to Qualys, Tenable, and Rapid 7
    • Data export enables deep analysis and custom reports to help meet audit requirements and fuel process improvements

    Cisco Vulnerability Management equips you with the contextual insight and threat intelligence needed to intercept the next exploit and respond with precision.

    Prioritization is no longer a dark art—it's data science. Advanced algorithms, combined with rich internal and external intel, offer recommended fixes that will lower risk in as few moves as possible.

    Track vulnerability fluctuations and forecast weaponization with up to 94% accuracy, giving you the chance to remediate high-risk vulnerabilities before bad actors can mount an attack.

    With more than 19 threat intelligence feeds at your fingertips, you gain a comprehensive view of emerging threats, shifting trends, and your own risk profile.

    A single source of data-verified truth aligns security and IT, eliminating friction and freeing up resources. And intuitive, simplified risk scores help you generate reports anyone can understand.

    Sample Customers
    Online Business Systems
    TransUnion
    Top Industries
    VISITORS READING REVIEWS
    Financial Services Firm22%
    Government12%
    Wholesaler/Distributor12%
    Computer Software Company10%
    VISITORS READING REVIEWS
    Computer Software Company22%
    Financial Services Firm14%
    Retailer7%
    Insurance Company7%
    Company Size
    No Data Available
    VISITORS READING REVIEWS
    Small Business13%
    Midsize Enterprise21%
    Large Enterprise66%
    Buyer's Guide
    Vulnerability Management
    April 2024
    Find out what your peers are saying about Tenable, Wiz, Check Point Software Technologies and others in Vulnerability Management. Updated: April 2024.
    769,789 professionals have used our research since 2012.

    BMC TrueSight Vulnerability Management is ranked 49th in Vulnerability Management while Cisco Vulnerability Management (formerly Kenna.VM) is ranked 11th in Risk-Based Vulnerability Management with 1 review. BMC TrueSight Vulnerability Management is rated 7.0, while Cisco Vulnerability Management (formerly Kenna.VM) is rated 8.0. The top reviewer of BMC TrueSight Vulnerability Management writes "Good features for infrastructure application; lacking in integrations with other software ". On the other hand, the top reviewer of Cisco Vulnerability Management (formerly Kenna.VM) writes "Offers contextual prioritization and risk-based remediation of vulnerability". BMC TrueSight Vulnerability Management is most compared with Qualys VMDR and Tenable Nessus, whereas Cisco Vulnerability Management (formerly Kenna.VM) is most compared with Rapid7 InsightVM, Qualys VMDR, Tenable Security Center, Ivanti Neurons for RBVM and Avalor.

    We monitor all Vulnerability Management reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.