Try our new research platform with insights from 80,000+ expert users

Cisco Vulnerability Management (formerly Kenna.VM) vs Digital Shadows comparison

 

Comparison Buyer's Guide

Executive Summary

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Cisco Vulnerability Managem...
Average Rating
8.0
Reviews Sentiment
6.8
Number of Reviews
1
Ranking in other categories
Cisco Security Portfolio (11th), Risk-Based Vulnerability Management (19th)
Digital Shadows
Average Rating
6.6
Reviews Sentiment
5.5
Number of Reviews
2
Ranking in other categories
Digital Risk Protection (6th)
 

Mindshare comparison

While both are Security Software solutions, they serve different purposes. Cisco Vulnerability Management (formerly Kenna.VM) is designed for Risk-Based Vulnerability Management and holds a mindshare of 2.7%, up 2.0% compared to last year.
Digital Shadows, on the other hand, focuses on Digital Risk Protection, holds 4.4% mindshare, down 7.6% since last year.
Risk-Based Vulnerability Management Market Share Distribution
ProductMarket Share (%)
Cisco Vulnerability Management (formerly Kenna.VM)2.7%
Qualys VMDR12.5%
Rapid7 InsightVM10.8%
Other74.0%
Risk-Based Vulnerability Management
Digital Risk Protection Market Share Distribution
ProductMarket Share (%)
Digital Shadows4.4%
ZeroFOX13.1%
Recorded Future12.9%
Other69.6%
Digital Risk Protection
 

Featured Reviews

AshishPaliwal - PeerSpot reviewer
Self-employed at Self-employed
Offers contextual prioritization and risk-based remediation of vulnerability
An improvement would be some sort of an integration with any GRC suite. There are a lot of GRC suites available, like Archer, MetricStream, Rsam, Protiviti, for example. So how would a solution like this work if my company has already invested thousands or maybe millions in a GRC solution? Do I still need it and how does it fit into an existing SAP environment? There could be interoperability, having more data sources, integrating Splunk, Qualys, FireEye, Rapid7, Carbon Black. I'm sure all that can be done to an extent, with a little more insight and a little more accuracy on the industry numbers and trends. I'd like the solution to offer any sort of assistance in any way with the remediation part, not just identification of vulnerability risk, and that is second.
DavidJones7 - PeerSpot reviewer
Head of Content at Pharmaflow
Has required additional context for alerts but supports monitoring impersonation and threat activity effectively
I do not rate Digital Shadows a nine or ten because there are many things that need improvement. The information we get is kind of generic. For instance, for impersonation, we don't have much detail on their history, when it was used or how it was misused. Those further details would be really helpful, but the information we receive is basic, such as when it was last registered and when it was updated, without more insight about the malicious factors. For basic support from Digital Shadows, my impression is that it is six to seven because many times we see duplications or bugs, and the quality of the alerts is not up to the mark. We have escalated many times, but we do not receive solid responses from them in terms of fixes. Digital Shadows should focus on the engineering side rather than the support aspect because support is there to help us get updates, but in terms of quick fixes, it is not as responsive. The need for improvement lies more with the engineering part in fixing issues, which is linked to support.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"The risk context of any vulnerability is a valuable feature."
"The most effective feature for threat intelligence, in my opinion, is collecting impersonating websites."
"The most effective feature for threat intelligence, in my opinion, is collecting impersonating websites."
"Digital Shadows helps our organization identify and mitigate cyber threats through their crawling of the internet, gathering information, pivoting it, and then sending those alerts to us which we monitor from our SIEM tool."
 

Cons

"An improvement would be some sort of an integration with any GRC suite."
"The solution doesn't pick up all the brands of the URLs."
"For basic support from Digital Shadows, my impression is that it is six to seven because many times we see duplications or bugs, and the quality of the alerts is not up to the mark."
"The solution doesn't pick up all the brands of the URLs. I have a relatively small company name, however, the solution still misses a certain number of URLs with my company's name in it that are impersonating websites. It's not very comprehensive, to be honest."
 

Pricing and Cost Advice

"I think the pricing is based on the number of endpoints, so it's more subscription-based."
Information not available
report
Use our free recommendation engine to learn which Risk-Based Vulnerability Management solutions are best for your needs.
881,757 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Computer Software Company
18%
Financial Services Firm
14%
Retailer
14%
Manufacturing Company
8%
Financial Services Firm
18%
Manufacturing Company
9%
Government
7%
Engineering Company
7%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
No data available
No data available
 

Questions from the Community

Ask a question
Earn 20 points
What is your experience regarding pricing and costs for Digital Shadows?
Regarding the cost of Digital Shadows, I think prices are a bit higher. The information provided is already available; some of it is paid information. However, considering all the information they ...
What needs improvement with Digital Shadows?
I do not rate Digital Shadows a nine or ten because there are many things that need improvement. The information we get is kind of generic. For instance, for impersonation, we don't have much detai...
What is your primary use case for Digital Shadows?
Our main use cases for Digital Shadows are mainly using it for threat intel. For instance, we have our domain listed on Digital Shadows. Whenever we see any sort of impersonation domain registratio...
 

Also Known As

Kenna.VM, Kenna Security, Kenna, Kenna Security Platform
No data available
 

Overview

 

Sample Customers

TransUnion
Accenture, Pret A Manger, Human Rights Watch
Find out what your peers are saying about Qualys, Tenable, Rapid7 and others in Risk-Based Vulnerability Management. Updated: February 2026.
881,757 professionals have used our research since 2012.