Cisco Kenna Security end of life: how to replace Kenna Security with modern CTEM-ready unified vulnerability management

Kenna_to_Phoenix_Migration

Cisco Kenna Security’s end-of-life is not just a bittersweet feeling for me, but also a strategic and procurement problem. Kenna created the first wave of changes in vulnerability management. 

Kenna Security earned its place by forcing the industry to grow up: normalize findings, rank risk based on real-world signals, and stop pretending “critical by CVSS” is a plan. Kenna advanced the second generation of vulnerability management.

I say this with genuine respect. Back in 2019, we ran one of the largest Kenna deployments I had seen, and we loved the core idea: independent vulnerability management, scanner-agnostic ingestion, and risk scoring that tried to reflect reality.

Then reality changed.

The modern attack surface is not “hosts and patches.” It is code, libraries, build files, base images, CI pipelines, Kubernetes drift, cloud identity, runtime exposure, and the messy chain that connects them. Those assets have complex graph relationships and business organizational relationships. Without attribution, code-to-cloud context, and remediation intelligence, risk-based scoring becomes a dashboard exercise.

Cisco’s announcement makes the next step unavoidable: plan your exit, retain the architectural principles that worked, and transition to a unified vulnerability management model aligned with CTEM.


Kenna Security end of life: the dates that matter (and what stops improving)

Cisco has published the formal end-of-life notice for Cisco Vulnerability Management, Vulnerability Intelligence, and the Application Security Module (formerly Kenna VM, Kenna.VI, and AppSec). Together with the sunsetting of the cloud security suite , Cisco is going out of the code to cloud and vulnerability business to refocus on data center and networking business.

Key milestones:

  • End-of-Life announcement date: December 10, 2025
  • End-of-Sale (last day to buy): March 10, 2026
  • End of renewal/change (last day to renew or extend): June 11, 2026
  • Support will slowly degrade with the last date of support: June 30, 2028

Now, the part most teams miss on first read: Cisco explicitly states the platform will not get the updates you need to stay current.

Cisco says it will no longer provide new features, development, connector updates, or algorithm updates; the Cisco Security Risk Score algorithm will not change, and Cisco will not add support for CVSS v4 or EPSS v4. It also states there is no replacement available at this time. 

That matters because:

  • CVSS v4.0 has been officially published (Nov 1, 2023).
  • EPSS v4 has been released (March 17, 2025).

So you are looking at a risk engine that cannot track the scoring standards, which are now legacy.

Phoenix Security Limited buyback offer for Kenna Security Clients


Why Kenna Security mattered (and why it hits the ceiling in 2026)

Kenna was a statement: vulnerability management should be independent of scanners, and risk should be treated as a measurable program, not a ticket factory.

It also pushed the industry toward:

  • exploitation-aware thinking
  • threat intel enrichment
  • program KPIs that security leaders could defend in front of a board

In 2019, that was already not enough for teams operating modern delivery and cloud stacks. Not because Kenna was “bad,” but because the VM category needed to expand:

  • Aggregate across code, cloud, container, and infrastructure
  • Attribute ownership to teams and services, business units and organizational structure, not “asset groups”
  • Prioritize using exposure + reachability + exploitability, not just a variation of CVSS severity
  • Remediate with actions that reduce the attack surface fast, not generic patch advice

Since then, I’ve had the pleasure of working with leaders like Jay Jacobs on EPSS and spending far too many happy hours discussing vulnerability data quality with Jerry Gamblin. EPSS is a great example of the industry getting sharper about probability, not panic. 

Kenna helped create that mindset. The next generation is CTEM, unifying attribution of code to cloud assets and proposing remediation. 

Why controlling Risk with a unified Vulnerability and Independent UVM matters today more than when we started

kenna security, cisco kenna security, cisco vulnerability management, kenna security end of life, cisco kenna end of life, kenna eol, kenna end of sale, kenna renewals end, kenna support ends 2028, replace kenna security, replace kenna security with, kenna security alternative, kenna security replacement, migrate from kenna, kenna migration plan, risk-based vulnerability management, RBVM, unified vulnerability management, UVM, exposure management, continuous threat exposure management, CTEM, vulnerability management platform, vulnerability aggregation, vulnerability normalization, vulnerability deduplication, vulnerability prioritization, threat intelligence vulnerability management, EPSS, EPSS v4, CVSS v4, application security, ASPM, application security posture management, devsecops vulnerability management, code to cloud security, code-to-cloud reachability, software supply chain security, supply chain attacks, SCA, container vulnerability management, cloud vulnerability management, runtime exposure, remediation prioritization, remediation intelligence, security champions vulnerability management, vulnerability program metrics, phoenix security, aspm

The numbers that matter

  • RBVM adoption trend: Risk-Based Vulnerability Management is growing at a 7.1% CAGR [Mordor Intelligence]
  • Supply chain “how common” forecast: Gartner predicted 45% of organizations would have experienced software supply chain attacks by 2025, a 3x increase from 2021.
  • Supply chain blast radius (packages impacted): Sha1-hulud and react2shell have shown a rapid exploitation (1 day) with rapid adoption by 6+ threat actors
  • Open-source malware surge: Sonatype reported a 156% YoY increase in malicious open-source packages, bringing the total to 704,102 since 2019.
  • Breach data signaling third-party risk: Verizon’s 2025 DBIR found third-party involvement doubled to 30%.
  • Vuln exploitation momentum: Verizon’s 2025 DBIR also reported vulnerability exploitation up 34%, based on 22,000+ incidents and 12,195 confirmed breaches analyzed.
  • Economic impact of supply chain attacks: Cybersecurity Ventures estimates $60B (2025) rising to $138B (2031) in annual global costs.

CTEM is the new bar, and Kenna-style “risk scoring only” is not CTEM

kenna security, cisco kenna security, cisco vulnerability management, kenna security end of life, cisco kenna end of life, kenna eol, kenna end of sale, kenna renewals end, kenna support ends 2028, replace kenna security, replace kenna security with, kenna security alternative, kenna security replacement, migrate from kenna, kenna migration plan, risk-based vulnerability management, RBVM, unified vulnerability management, UVM, exposure management, continuous threat exposure management, CTEM, vulnerability management platform, vulnerability aggregation, vulnerability normalization, vulnerability deduplication, vulnerability prioritization, threat intelligence vulnerability management, EPSS, EPSS v4, CVSS v4, application security, ASPM, application security posture management, devsecops vulnerability management, code to cloud security, code-to-cloud reachability, software supply chain security, supply chain attacks, SCA, container vulnerability management, cloud vulnerability management, runtime exposure, remediation prioritization, remediation intelligence, security champions vulnerability management, vulnerability program metrics, CTEM, Phoenix Security

CTEM (Continuous Threat Exposure Management) is Gartner’s push for a program that continuously reduces exposure rather than episodically reports on it. 

CTEM is commonly described as a five-phase loop (scope, discover, prioritize, validate, mobilize), with an emphasis on execution and measurement, not just visibility. 

A CTEM-aligned vulnerability management platform must do more than ingest and score:

  • Scope: define what “material exposure” means (apps, crown-jewel services, internet-facing paths)
  • Discover: unify findings across code, runtime, cloud, containers, and infra (see below the elements that form a CTEM program)
  • Prioritize: rank by real exploitability + reachability + exposure + business impact
  • Validate: prove what is actually reachable, deployed, and exploitable in your environment.
  • Mobilize: drive ownership, SLA policies, security champions, and measurable remediation throughput.
kenna security, cisco kenna security, cisco vulnerability management, kenna security end of life, cisco kenna end of life, kenna eol, kenna end of sale, kenna renewals end, kenna support ends 2028, replace kenna security, replace kenna security with, kenna security alternative, kenna security replacement, migrate from kenna, kenna migration plan, risk-based vulnerability management, RBVM, unified vulnerability management, UVM, exposure management, continuous threat exposure management, CTEM, vulnerability management platform, vulnerability aggregation, vulnerability normalization, vulnerability deduplication, vulnerability prioritization, threat intelligence vulnerability management, EPSS, EPSS v4, CVSS v4, application security, ASPM, application security posture management, devsecops vulnerability management, code to cloud security, code-to-cloud reachability, software supply chain security, supply chain attacks, SCA, container vulnerability management, cloud vulnerability management, runtime exposure, remediation prioritization, remediation intelligence, security champions vulnerability management, vulnerability program metrics, Gartner, Phoenix, CTEM

If any of those pieces are missing, CTEM collapses into reporting.


The trap: “replace Kenna Security” with scanner-centric platforms

Many Kenna customers chose a scanner-agnostic VM for reasons that still hold.

Moving from Kenna to a scanner-centric “platform” often creates predictable failure modes:

1) Prioritization bias and partial telemetry

When the same vendor detects and prioritizes, the model naturally favors what the vendor can see best. Cross-tool correlation becomes secondary.

2) Deduplication breaks at the seams

Scanner outputs do not agree on asset identity, package naming, container lineage, or cloud resources. Without a true governance layer, your “one backlog” becomes five backlogs glued together.

3) Remediation stays generic

Scanners can tell you what is present. They rarely tell you the remediation that yields the biggest attack surface reduction in production:

  • Which base image upgrade removes the most reachable container CVEs
  • which builds file change collapses dozens of SCA findings
  • Which fix is safe, given where the vulnerable code is actually called

4) Ownership becomes politics

Without attribution to services, repos, teams, and security champions, you end up measuring “tickets created,” not “risk retired.”

5) Vendor lock-in becomes the roadmap

Kenna’s value was independence. Replacing it with “one vendor’s worldview” is a maturity regression, not modernization.


What a Kenna Security alternative must look like in 2026

If you are shopping for a Kenna Security alternative, use a blunt checklist. A modern unified vulnerability management platform should provide:

Unified ingestion and normalization

  • first-class support for heterogeneous tools
  • asset identity that survives cloud ephemerality
  • dedupe across SAST, SCA, container, cloud, VM, DAST
  • trace vulnerabilities from repo → build → artifact → container → workload → exposed service
  • reachability signals that separate “present” from “actionable”

Modern scoring that evolves

Given Cisco’s statement that Kenna’s algorithm will not change and CVSS4/EPSS v4 will not be added, you need scoring that keeps pace. 

Remediation intelligence, not patch advice

  • recommendations tied to deployment context
  • fixes that collapse duplicates and reduce exposure fastest
  • evidence of reduction, not promises

Operational mobilization

  • security champions and ownership mapping
  • SLAs by business criticality and exposure
  • metrics that measure throughput and debt burn-down

That is CTEM-ready vulnerability management.


A practical migration plan to replace Kenna Security without breaking your program

Kenna customers usually have years of tuning in:

  • scoring targets and risk acceptance thresholds
  • asset groups and business criticality
  • workflow integration with Jira/ServiceNow
  • executive reporting and KPIs

A sane transition keeps those stable while expanding coverage.

Step 1: Lock down your timeline against renewal reality

If you want zero disruption, your plan needs to be real before June 11, 2026 (last renewal date). 

Step 2: Export what matters (not just findings)

Carry forward:

  • asset inventory and ownership logic
  • risk scoring outputs and thresholds
  • exception policies and rationale
  • your “definition of done” for remediation

Step 3: Rebuild identity and attribution first

Before you migrate prioritization, migrate ownership.

If you cannot map vulnerabilities to teams and services, you will not mobilize.

Step 4: Run dual scoring for a short period

Keep Kenna-style risk targets for continuity, then layer in:

  • reachability and exposure (you can adjust those in Phoenix Security)
  • CVSS, CVSS v4, where available
  • CTI, EPSS v4, ARGUS and Threat Centric, probability signals (you can adjust those in Phoenix Security)

Step 5: Expand scope into code, containers, and cloud

This is where most Kenna migrations either become transformative or become a sideways move.


How Phoenix Security helps Cisco Kenna customers transition to unified VM + CTEM

Phoenix Security exists because we hit these limits ourselves and built what we needed internally first, then scaled it.

If you are replacing Kenna Security, Phoenix is designed to keep what worked and extend it into modern CTEM:

  • Kenna-style continuity: familiar risk-based scoring and targets, so you do not need to reinvent your operating model on day one.
  • Unified coverage: code, SCA, containers, cloud, and vulnerability management in one governance layer.
  • Verification and exposure validation: reduce the gap between “detected” and “reachable in production.” Phoenix Security traceability enables defining exposure and tracing exposure from runtime to code.
  • Modern scoring: designed to align with evolving standards and to exploit probability signals with the ability to customize risk scoring methods.
  • Remediation that reduces the attack surface: focus on plans that deliver the highest remediation-to-effort ratio. Phoenix Security focuses on the remediation that matters most e.g., which library needs to be upgraded in which build file, and which container base image needs to be upgraded where, and which file needs to be changed. 
  • Security champions and attribution: Phoenix Security’s attribution and team-based structure enable a security champion program focused on remediation metrics and the most significant mistakes across teams.

Proof points from public case studies and published results:

  • ClearBank: 98% reduction in container vulnerabilities through container throttling and remediation optimization.
  • Bazaarvoice: drove critical vulnerabilities to zero and reduced high-risk findings by 40% within two weeks of implementation (published by Phoenix).
  • Integral Ad Science: reported 78% reduction in active container vulnerabilities and reduced SCA-to-container noise through correlation and deduplication.

If you are a Cisco client planning a transition before renewal and end-of-life deadlines, Phil Moroni (Head of Sales) can put together a structured migration plan aligned to your timeline.

Phoenix Security Limited buyback offer for Kenna Security Clients

How Phoenix Security Can Help

attack graph phoenix security
ASPM

Organizations often face an overwhelming volume of security alerts, including false positives and duplicate vulnerabilities, which can distract from real threats. Traditional tools may overwhelm engineers with lengthy, misaligned lists that fail to reflect business objectives or the risk tolerance of product owners.

Phoenix Security offers a transformative solution through its Actionable Application Security Posture Management (ASPM), powered by AI-based Contextual Quantitative analysis and an innovative Threat Centric approach. This innovative approach correlates runtime data with code analysis and leverages the threats that are more likely to lead to zero day attacks and ransomware to deliver a single, prioritized list of vulnerabilities. This list is tailored to the specific needs of engineering teams and aligns with executive goals, reducing noise and focusing efforts on the most critical issues. Why do people talk about Phoenix

Automated Triage: Phoenix streamlines the triage process using a customizable 4D risk formula, ensuring critical vulnerabilities are addressed promptly by the right teams.

Contextual Deduplication: Utilizing canary token-based traceability, Phoenix accurately deduplicates and tracks vulnerabilities within application code and deployment environments, allowing teams to concentrate on genuine threats.

Actionable Threat Intelligence: Phoenix provides real-time insights into vulnerability’ exploitability, combining runtime threat intelligence with application security data for precise risk mitigation.

ASPm, CISA KEV, Remote Code Execution, Inforamtion Leak, Category, Impact, MITRE&ATTACK, AI Assessment, Phoenix CISA KEV, Threat intelligence

By leveraging Phoenix Security, you not only unravel the potential threats but also take a significant stride in vulnerability management, ensuring your application security remains up to date and focuses on the key vulnerabilities.

Get in control of your Application Security posture and Vulnerability management

Francesco is an internationally renowned public speaker, with multiple interviews in high-profile publications (eg. Forbes), and an author of numerous books and articles, who utilises his platform to evangelize the importance of Cloud security and cutting-edge technologies on a global scale.

Discuss this blog with our community on Slack

Join our AppSec Phoenix community on Slack to discuss this blog and other news with our professional security team

From our Blog

React2Shell is a pre-auth, single-request RCE in React Server Components that turned Next.js App Router deployments into high-value internet targets overnight. This write-up breaks down the exploit chain, what attackers do after landing, and the fast-moving follow-up CVEs that forced teams to patch again.
Francesco Cipollone
React4Shell (also tracked as React2Shell and “Freight Night”) turns React Server Components into an unauthenticated remote code execution path via the Flight protocol. Public PoCs are circulating, scanning is spiking, and large-scale exploitation has already been reported. Patch fast, then verify what’s actually running.
Francesco Cipollone
React4Shell (also tracked as React2Shell and “Freight Night”) turns React Server Components into an unauthenticated remote code execution path via the Flight protocol. Public PoCs are circulating, scanning is spiking, and large-scale exploitation has already been reported. Patch fast, then verify what’s actually running.
Francesco Cipollone
Two critical CVEs (React and Next.js now called React2Shell or React4shell recalling log4j and spring4shell vulnerabilities) expose an unauthenticated remote code execution path via the “Flight” protocol. If you are running server-rendered React with RSC enabled, assume exposure until you prove otherwise and patch fast.
Francesco Cipollone
The Shai Hulud campaign marks a major escalation in npm supply chain attacks. This article examines how the malware executes during preinstall, steals cloud and CI/CD secrets, injects GitHub workflows, attempts container breakout, and propagates across nearly 700 compromised packages. The full timeline tracks the attack from the first September incidents through the November V2 expansion.
Francesco Cipollone
Shai Hulud weaponised npm’s trust model with stolen maintainer credentials, poisoned tarballs, and GitHub Actions backdoors that keep exfiltrating from CI. At least 608 packages are in scope, including assets from PostHog, ENS, AsyncAPI, Postman, and Zapier. This article maps the updated blast radius and gives a remediation plan built on ASPM, reachability, and remediation-aware exposure management.
Francesco Cipollone
Derek

Derek Fisher

Head of product security at a global fintech

Derek Fisher – Head of product security at a global fintech. Speaker, instructor, and author in application security.

Derek is an award winning author of a children’s book series in cybersecurity as well as the author of “The Application Security Handbook.” He is a university instructor at Temple University where he teaches software development security to undergraduate and graduate students. He is a speaker on topics in the cybersecurity space and has led teams, large and small, at organizations in the healthcare and financial industries. He has built and matured information security teams as well as implemented organizational information security strategies to reduce the organizations risk.

Derek got his start in the hardware engineering space where he learned about designing circuits and building assemblies for commercial and military applications. He later pursued a computer science degree in order to advance a career in software development. This is where Derek was introduced to cybersecurity and soon caught the bug. He found a mentor to help him grow in cybersecurity and then pursued a graduate degree in the subject.

Since then Derek has worked in the product security space as an architect and leader. He has led teams to deliver more secure software in organizations from multiple industries. His focus has been to raise the security awareness of the engineering organization while maintaining a practice of secure code development, delivery, and operations.

In his role, Jeevan handles a range of tasks, from architecting security solutions to collaborating with Engineering Leadership to address security vulnerabilities at scale and embed security into the fabric of the organization.

Jeevan Singh

Jeevan Singh

Founder of Manicode Security

Jeevan Singh is the Director of Security Engineering at Rippling, with a background spanning various Engineering and Security leadership roles over the course of his career. He’s dedicated to the integration of security practices into software development, working to create a security-aware culture within organizations and imparting security best practices to the team.
In his role, Jeevan handles a range of tasks, from architecting security solutions to collaborating with Engineering Leadership to address security vulnerabilities at scale and embed security into the fabric of the organization.

James

James Berthoty

Founder of Latio Tech

James Berthoty has over ten years of experience across product and security domains. He founded Latio Tech to help companies find the right security tools for their needs without vendor bias.

christophe

Christophe Parisel

Senior Cloud Security Architect

Senior Cloud Security Architect

Chris

Chris Romeo

Co-Founder
Security Journey

Chris Romeo is a leading voice and thinker in application security, threat modeling, and security champions and the CEO of Devici and General Partner at Kerr Ventures. Chris hosts the award-winning “Application Security Podcast,” “The Security Table,” and “The Threat Modeling Podcast” and is a highly rated industry speaker and trainer, featured at the RSA Conference, the AppSec Village @ DefCon, OWASP Global AppSec, ISC2 Security Congress, InfoSec World and All Day DevOps. Chris founded Security Journey, a security education company, leading to an exit in 2022. Chris was the Chief Security Advocate at Cisco, spreading security knowledge through education and champion programs. Chris has twenty-six years of security experience, holding positions across the gamut, including application security, security engineering, incident response, and various Executive roles. Chris holds the CISSP and CSSLP certifications.

jim

Jim Manico

Founder of Manicode Security

Jim Manico is the founder of Manicode Security, where he trains software developers on secure coding and security engineering. Jim is also the founder of Brakeman Security, Inc. and an investor/advisor for Signal Sciences. He is the author of Iron-Clad Java: Building Secure Web Applications (McGraw-Hill), a frequent speaker on secure software practices, and a member of the JavaOne Rockstar speaker community. Jim is also a volunteer for and former board member of the OWASP foundation.

Join our Mailing list!

Get all the latest news, exclusive deals, and feature updates.

The IKIGAI concept
x  Powerful Protection for WordPress, from Shield Security
This Site Is Protected By
ShieldPRO