Home / Linux / How to Configure Acunetix with Kenna Security

How to Configure Acunetix with Kenna Security

You can integrate Acunetix with Kenna Security as a connector, out of the box. The following configuration applies to both the Kenna VM appliance and the SaaS solution.

First, create a new Kenna instance. On the Home page, you can see statistics for imported vulnerability assets together with risk management data.

kenna security
To integrate Acunetix with Kenna Security, you must install the Acunetix connector. To do this, navigate to Connectors and select Acunetix in the Dynamic Assessment section.

You can use the configuration page to rename the connector, set the host URL, and schedule the import of vulnerabilities into the platform. To establish a connection with Acunetix, you need an API key. You can find the API key on the Acunetix Profile page.

After populating all the fields for the Acunetix connector configuration, click on the Save And Verify button. You can now click on the Run button to start the import process.

The import process can take some time, depending on the number of targets and vulnerabilities in Acunetix. When the process completes, you will see risk trend charts and additional data in the Kenna Security instance.

For more information on settings up Kenna Security with Acunetix, contact our support team: support@acunetix.com.

Daniel Zammit Technical Support Engineer
LinkedIn: https://www.linkedin.com/in/danielzammit/

Daniel Zammit is a Technical Support Engineer working for Acunetix. He’s a Business and I.T. graduate with an interest in web development and machine learning techniques for network security applications. Experienced in system administration, he’s now gaining experience in Web Application Security sphere

Source link

Leave a Reply

Your email address will not be published. Required fields are marked *


This site uses Akismet to reduce spam. Learn how your comment data is processed.


Check Also

What Are Injection Attacks | Acunetix

What is Code Injection | Acunetix

Code Injection or Remote Code Execution (RCE) enables the attacker to execute malicious code as ...