Brinqa vs Cisco Vulnerability Management (formerly Kenna.VM) comparison

Cancel
You must select at least 2 products to compare!
Comparison Buyer's Guide
Executive Summary

We performed a comparison between Brinqa and Cisco Vulnerability Management (formerly Kenna.VM) based on real PeerSpot user reviews.

Find out what your peers are saying about Tenable, Qualys, Rapid7 and others in Risk-Based Vulnerability Management.
To learn more, read our detailed Risk-Based Vulnerability Management Report (Updated: April 2024).
768,857 professionals have used our research since 2012.
Featured Review
Quotes From Members
We asked business professionals to review the solutions they use.
Here are some excerpts of what they said:
Pros
"The most valuable features of Brinqa are its data integration capabilities."

More Brinqa Pros →

"The risk context of any vulnerability is a valuable feature."

More Cisco Vulnerability Management (formerly Kenna.VM) Pros →

Cons
"Brinqa could improve in terms of the speed of their service and resource provision."

More Brinqa Cons →

"An improvement would be some sort of an integration with any GRC suite."

More Cisco Vulnerability Management (formerly Kenna.VM) Cons →

Pricing and Cost Advice
Information Not Available
  • "I think the pricing is based on the number of endpoints, so it's more subscription-based."
  • More Cisco Vulnerability Management (formerly Kenna.VM) Pricing and Cost Advice →

    report
    Use our free recommendation engine to learn which Risk-Based Vulnerability Management solutions are best for your needs.
    768,857 professionals have used our research since 2012.
    Questions from the Community
    Top Answer:The most valuable features of Brinqa are its data integration capabilities.
    Top Answer:I would rate the costliness of the solution at a seven out of ten. It is on the expensive side and there are some additional fees.
    Top Answer:Brinqa could improve in terms of the speed of their service and resource provision. We felt they were somewhat slow in assisting us in maturing our processes. Additionally, we encountered some… more »
    Top Answer:The risk context of any vulnerability is a valuable feature.
    Top Answer:I think the pricing is based on the number of endpoints, so it's more subscription-based. If you have 10 computers versus a million computers, obviously the pricing will change.
    Top Answer:An improvement would be some sort of an integration with any GRC suite. There are a lot of GRC suites available, like Archer, MetricStream, Rsam, Protiviti, for example. So how would a solution like… more »
    Ranking
    Views
    332
    Comparisons
    219
    Reviews
    1
    Average Words per Review
    746
    Rating
    7.0
    Views
    684
    Comparisons
    473
    Reviews
    1
    Average Words per Review
    498
    Rating
    8.0
    Comparisons
    Also Known As
    Kenna.VM, Kenna Security, Kenna, Kenna Security Platform
    Learn More
    Overview
    Brinqa GRC provides a pluggable set of building blocks for meeting your IT process governance, risk management, and compliance reporting needs.

    Cisco Vulnerability Management equips you with the contextual insight and threat intelligence needed to intercept the next exploit and respond with precision.

    Prioritization is no longer a dark art—it's data science. Advanced algorithms, combined with rich internal and external intel, offer recommended fixes that will lower risk in as few moves as possible.

    Track vulnerability fluctuations and forecast weaponization with up to 94% accuracy, giving you the chance to remediate high-risk vulnerabilities before bad actors can mount an attack.

    With more than 19 threat intelligence feeds at your fingertips, you gain a comprehensive view of emerging threats, shifting trends, and your own risk profile.

    A single source of data-verified truth aligns security and IT, eliminating friction and freeing up resources. And intuitive, simplified risk scores help you generate reports anyone can understand.

    Sample Customers
    Depository Trust and Clearing Corporation
    TransUnion
    Top Industries
    VISITORS READING REVIEWS
    Financial Services Firm21%
    Computer Software Company13%
    Insurance Company9%
    Retailer8%
    VISITORS READING REVIEWS
    Computer Software Company22%
    Financial Services Firm13%
    Insurance Company7%
    Retailer7%
    Company Size
    VISITORS READING REVIEWS
    Small Business15%
    Midsize Enterprise7%
    Large Enterprise78%
    VISITORS READING REVIEWS
    Small Business13%
    Midsize Enterprise20%
    Large Enterprise67%
    Buyer's Guide
    Risk-Based Vulnerability Management
    April 2024
    Find out what your peers are saying about Tenable, Qualys, Rapid7 and others in Risk-Based Vulnerability Management. Updated: April 2024.
    768,857 professionals have used our research since 2012.

    Brinqa is ranked 11th in Risk-Based Vulnerability Management with 1 review while Cisco Vulnerability Management (formerly Kenna.VM) is ranked 10th in Risk-Based Vulnerability Management with 1 review. Brinqa is rated 7.0, while Cisco Vulnerability Management (formerly Kenna.VM) is rated 8.0. The top reviewer of Brinqa writes "Allows us to configure the risk algorithm to suit our specific needs". On the other hand, the top reviewer of Cisco Vulnerability Management (formerly Kenna.VM) writes "Offers contextual prioritization and risk-based remediation of vulnerability". Brinqa is most compared with Vulcan Cyber, Axonius, Nucleus, Avalor and Tenable Security Center, whereas Cisco Vulnerability Management (formerly Kenna.VM) is most compared with Rapid7 InsightVM, Qualys VMDR, Tenable Security Center, Ivanti Neurons for RBVM and Avalor.

    See our list of best Risk-Based Vulnerability Management vendors.

    We monitor all Risk-Based Vulnerability Management reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.