Customer Demand Drives New Eclypsium Integration with Kenna.VM

Organizations Apply Risk-Based Vulnerability Management to Firmware and Hardware Infrastructure

Portland, OR – February 8, 2021 – Eclypsium®, the enterprise device security company, today announces a new technology integration with Kenna Security’s Kenna.VM, to extend risk-based vulnerability management (RBVM) to the firmware layer. The integration, developed at the request of a major financial institution and now available for other customers, provides joint customers with a consolidated and comprehensive view of vulnerability risk down to the firmware of a device.

Firmware and device-level attacks have become a staple of attackers from state-backed threat actors to financially motivated ransomware campaigns. Attackers have become increasingly sophisticated, finding new ways to introduce vulnerabilities throughout the supply chain, evade security tools, persist within compromised devices, and cause the greatest damage possible. Malware and ransomware like TrickBot have increasingly targeted vulnerabilities in firmware, giving attackers virtually complete control over a device – including the ability to subvert the operating system and other security protections. As a result, managing risks at the hardware and firmware layers is increasingly a requirement that must be integrated with an organization’s ongoing risk management efforts.    

“Modern IT and security teams face a cybersecurity landscape that is both expansive and sophisticated, with the majority of organizations lacking insight into their firmware and hardware attack surface,” said Alex Bazhaniuk, Co-Founder and CTO of Eclypsium. “The integration of the Eclypsium solution and Kenna.VM changes that. For the first time, organizations can now take action with ease to reduce attack surface risks at the hardware layer.”

Eclypsium gives organizations visibility and control over their firmware and hardware risk. The solution scans devices at levels that traditional vulnerability scanners and security tools miss, to reveal device level vulnerabilities, misconfigurations, and threats. With Eclypsium, teams can easily maintain visibility into their server and endpoint hardware, and VPN and other network infrastructure to find vulnerabilities, misconfigurations, and signs that the integrity of the device has been compromised.

“Our research shows that Windows 10 hardware alone has an average of 14 high-risk vulnerabilities per device. It’s imperative that organizations have the ability to identify and remediate the riskiest vulnerabilities across their vast endpoint infrastructure at scale,” said Jason Rolleston, Chief Product Officer at Kenna Security. “Eclypsium’s integration with Kenna.VM enables our joint customers to enhance their existing risk-based vulnerability management programs with increased visibility and efficient remediation of threats that reside in their endpoint devices, down to the firmware level.”

Historically, organizations see vulnerabilities and risk at the software level. Network-based vulnerability scans often only discover vulnerabilities at the operating system or service level but lack insights into the underlying device itself. Identifying and remediating vulnerabilities at the device-level is often a manual and highly technical process that is mostly performed by exception, leading to longer dwell times when firmware attacks do occur.

The integration enables Eclypsium firmware security data to be imported into Kenna.VM, where it is combined with real-world threat and exploit intelligence and advanced data science to determine which vulnerabilities pose the highest risk and which can be deprioritized. This gives IT and security teams a complete view of their device risk enabling them to make smarter patching and hardware configuration decisions. 

To learn more about the Eclypsium and Kenna.VM integration, or to request a demo, visit

About Eclypsium

Eclypsium delivers a cloud-based enterprise device security platform for modern distributed organizations. From corporate laptops and desktops, to servers in data centers, to network infrastructure devices, Eclypsium protects the devices that organizations rely on, all the way down to firmware. Eclypsium provides comprehensive device and firmware inventory, automatically identifies and patches firmware risks, scans devices for supply chain breaches, and continuously monitors devices for persistent and stealthy firmware attacks. Eclypsium’s cloud-based solution is deployed in minutes. Protecting Fortune 100 enterprises and federal agencies, Eclypsium was named a Gartner Cool Vendor in Security Operations and Threat Intelligence, a TAG Cyber Distinguished Vendor, one of the World’s 10 Most Innovative Security Companies by Fast Company, a CNBC Upstart 100, a CB Insights Cyber Defender, and an RSAC Innovation Sandbox finalist. For more information, visit


ZAG Communications for Eclypsium, Inc.
[email protected]

*** This is a Security Bloggers Network syndicated blog from Eclypsium authored by Eclypsium. Read the original post at: