Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

Preparing for Cisco Vulnerability Management (formerly Kenna) End-of-Life: How Tenable Can Help



abstract image of disparate blocks entering a center orb and transforming into security to illustrate the blog post Preparing for Cisco Vulnerability Management (formerly Kenna) End-of-Life: How Tenable Can Help

Cisco Vulnerability Management (formerly Kenna) has long been a valuable partner for security teams. With its end-of-life now underway, Tenable One offers a clear path forward, delivering end-to-end unified exposure management for the future of risk management.

Key takeaways:

  1. Tenable’s strong partnership with Cisco helps customers with a natural path forward and easy transition to exposure management.
     
  2. Exposure management is the next frontier, taking organizations beyond risk-based vulnerability management (RBVM) by delivering insight across various domains.
     
  3. The Tenable One Exposure Management Platform is built for security programs of all maturity levels and sizes.

Security teams are used to change, The way organizations think about risk is evolving, and many cybersecurity leaders and practitioners are realizing that the tools built for yesterday’s vulnerability management — while essential for their operations — aren’t enough for today’s exposure.

For years, risk-based vulnerability management (RBVM) tools like Cisco Vulnerability Management (formerly Kenna) have helped teams aggregate data from different security scanners into one place. But simple aggregation is now table stakes; the security requirements of most organizations have outgrown it. Seeing one-dimensional findings of risk creates more noise from those same tools. What’s lacking is connectivity across all risk, a view of exposures created from the sum of the parts, together. Modern security programs need insight — how assets, vulnerabilities, misconfigurations, and identity relationships are connected. The same view threat actors have by probing and connecting these pieces together to create the next breach.

Moving towards exposure management can help. It meets the modern security organization’s needs, going beyond listing CVEs to focus on the real story behind your risk: how everything in your environment interacts, so you can identify your most toxic combinations based on analysis of the insights provided by your various security tools.

With Cisco entering end-of-life and end-of-sale for Cisco Vulnerability Management, Vulnerability Intelligence, and their Application Security Module, many teams are finding themselves at a decision point. Cisco announced on Dec. 9 that there is no replacement available for the Cisco Vulnerability Management, Vulnerability Intelligence, and Application Security Module (formerly known as Kenna.VM, Kenna.VI, and AppSec) at this time. The key EoL / EoS dates are as follows:

  • March 10, 2026: End of Sale — The last date to order the product through Cisco point-of-sale mechanisms. The product is no longer for sale after this date.
  • June 11, 2026: End of Service — The last date to extend or renew a service contract for the product.
  • June 30, 2028: Last date of support subscription — The last date to receive applicable subscription entitlements, service, and support for the product as entitled by active subscriptions and service contracts (as applicable) or by warranty terms and conditions. After this date, all subscription and support services for the product are unavailable, and the product becomes obsolete.

Organizations of all backgrounds and maturity have the chance to treat this moment not as a replacement project, but as an opportunity to change how they approach proactive security.

The differences are in the hidden details: The new era of exposure management

Although risk-based vulnerability management provides a solid foundation, it hits a natural limitation. At best, it aggregates the data, showing only a handful of disconnected severity scores.

While RVBM offers a new lens through which to view your environment, the core challenge still remains the same: security teams are stuck sifting through various findings across tools. Sure, it’s all in one place but it’s impossible to make a true “apples to apples” comparison because the findings aren’t normalized and deduplicated. Visibility alone is insufficient for effective exposure prioritization; the missing detail that RBVM lacks is insight.

Tenable’s take on exposure management breaks that barrier by connecting the findings from your various security tools to create insights from your entire environment. You can see the big picture. It’s the difference between staring at isolated findings with different risk scores and truly understanding how your entire attack surface looks to an adversary at any given time.

Insight comes from connecting context, not just critical severity scores, which is where exposure management distinguishes itself.

Let’s look at a simple example. There is a stark difference between:

  • Individual findings: These ~100 servers are running Windows OS with a critical vulnerability.
    Versus
  • Insight: This specific server is exposed to the internet, has a medium-severity vulnerability, and is accessible by a compromised admin.

In the first example, security teams waste time deciphering which handful of the 100 Windows servers are the most at risk, wasting resources and efforts working with IT to remediate. In reality, the biggest threat is the one server everyone saw, but no one thought about. How could they? It’s a single step in a multi-chained attack path.

By mapping out how different flaws connect to compromise your critical assets, you can ignore the noise of consolidated tools and zero in on the specific toxic combinations that leave your organization exposed. This shifts your team from constantly reacting to seemingly critical fire drills to preemptively shutting down the most dangerous attack paths — the ones you wouldn’t be able to piece together using simple aggregation tools.

Tenable is elevating how organizations of all sizes and maturity levels can identify their exposure.

Exposure management maturity model: A true one-size-fits-all model

One of the most compelling aspects of exposure management is that it isn’t reserved for organizations with bottomless budgets or sprawling security teams; it meets you exactly where you are. Whether your program is currently in a reactive "fire drill" phase — scrambling to patch whatever feels urgent today — or you have a robust set of tools that unfortunately don't talk to each other, exposure management offers a structured path forward.

Tenable’s maturity model highlights that every security program sits somewhere on a spectrum, from "ad hoc" teams keeping the lights on to "standardized" operations that have reached a complexity ceiling. Exposure management creates a unified fabric across these stages, allowing even smaller teams to shift from chaotic, siloed scanning to a more cohesive view of their attack surface without needing to rip-and-replace their entire stack overnight.

Top industry analyst firms name Tenable One a Leader

If you’re making a change, you want to be confident in where you’re heading. Tenable was recently named a Leader in the first-ever 2025 Gartner® Magic Quadrant™ for Exposure Assessment Platforms, ranking highest in both execution and vision.

Tenable was also named a Leader in the IDC MarketScape: Worldwide Exposure Management 2025 Vendor Assessment and The Forrester Wave™️: Unified Vulnerability Management, Q3 2025.

Simply put, Tenable isn’t catching up to exposure management — it’s leading it.

Built to work with the tools you already have

With 300+ integrations and an open, flexible architecture, Tenable One connects with the security tools you already rely on. Instead of forcing you into a new ecosystem, it strengthens the one you’ve built. Think of Tenable One as the central hub of your security program — the place where everything finally comes together in a clear, contextual view.

Moving beyond lists into real exposure management

Shifting to Tenable One isn’t just about finding a new home for your vulnerability data. It’s about stepping into the next generation of risk management.

  • Gain unified visibility: Bring together vulnerabilities, misconfigurations, identities, and operational technology (OT) risks from across your security tools into a single platform.
  • Connect the dots: Understand how risks connect across domains to identify toxic risk combinations across your environment.
  • See full attack paths: See the paths attackers could take across your environment, from initial entry point to business-critical crown jewels.
  • Remediate with context: Use holistic risk insights, business context, and threat intelligence to focus remediation on the exposures that matter most.
  • Communicate with confidence: Deliver executives and board members holistic reports that show how security actions reduce overall organizational business risk.

Exposure management changes the security conversation from “What vulnerabilities do we have?” to “What combinations of risk create the highest exposure ?”

Ready to see what Tenable One can do? View the demo below:

 

The transition from Cisco VM (Kenna) doesn’t have to be disruptive. It can be transformative. If you’re ready to see how Tenable One can elevate your security program, request a demo of Tenable One today.


Cybersecurity news you can use

Enter your email and never miss timely alerts and security guidance from the experts at Tenable.

× Contact our sales team