

Find out what your peers are saying about Qualys, Horizon3.ai, Tenable and others in Risk-Based Vulnerability Management.
| Product | Mindshare (%) |
|---|---|
| Cisco Vulnerability Management (formerly Kenna.VM) | 2.4% |
| Qualys VMDR | 10.5% |
| Rapid7 InsightVM | 8.8% |
| Other | 78.3% |
| Product | Mindshare (%) |
|---|---|
| RiskIQ Illuminate | 0.9% |
| CrowdStrike Falcon | 6.4% |
| Darktrace | 4.5% |
| Other | 88.2% |


Cisco Vulnerability Management (formerly Kenna.VM) provides a comprehensive approach to identifying, prioritizing, and mitigating vulnerabilities in IT environments, helping organizations to manage risk effectively.
Designed with advanced analytics, Cisco Vulnerability Management supports risk-based vulnerability management, enabling IT teams to focus on the most critical threats. This platform integrates seamlessly with existing security tools, offering a centralized solution for prioritizing vulnerabilities based on risk level. By aligning security efforts with business objectives, it ensures that resources are directed towards the most impactful areas of risk reduction.
What are the key features of Cisco Vulnerability Management?In industries like finance and healthcare, Cisco Vulnerability Management is crucial for maintaining stringent compliance standards. Its ability to integrate within complex IT ecosystems allows for flexible adaptation across sectors, ensuring that industry-specific vulnerabilities are effectively managed and mitigated.
RiskIQ Illuminate offers comprehensive cybersecurity insights by identifying and mitigating digital threats across the web.
RiskIQ Illuminate provides organizations with advanced threat detection and intelligence capabilities, enabling them to proactively manage security risks. By monitoring web assets in real time, it empowers teams to safeguard digital environments against malicious actors effectively.
What are the key features of RiskIQ Illuminate?RiskIQ Illuminate is used across industries such as finance, healthcare, and retail to protect sensitive data and maintain operational integrity. It is implemented to enhance cybersecurity frameworks, ensuring compliance and safeguarding critical information at scale.
We monitor all Risk-Based Vulnerability Management reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.