Loading glossary...
Definition
Known Exploited Vulnerabilities; CISA catalog of vulnerabilities confirmed to be exploited in the wild.
In Practice
In practice, KEV helps teams reduce risk by improving visibility, control, and response speed. It is often paired with adjacent controls depending on environment constraints and compliance needs.
Solutions
Detect and contain endpoint threats with EDR/XDR coverage, telemetry, and response readiness.
ExploreEstablish current-state visibility and a practical security baseline with a risk-informed roadmap for hybrid IT/OT environments.
ExploreProtect uptime and safety with controls aligned to OT realities, availability testing, and regulatory expectations.
ExploreReduce exploitable risk across hybrid IT/OT with risk-based remediation, patch governance, and measurable exposure reduction that stands up to audit.
ExploreContext
This term appears across solutions and services. Explore the glossary for related terms or browse by capability.