Clickable Elements: As you scroll through the dashboard, you will notice that certain elements change the cursor from an arrow to a hand, indicating that they are clickable. By clicking on these elements, you can access further details and go to the Exposures View for a more focused analysis.
Assets Overview: This section presents graphs that offer insights into different aspects of your assets and exposures, enabling you to understand the risk vectors holistically.
This widget provides an overview of the assets present in your organization. It categorizes the assets and displays the number of exposures within each category. You can click on any section to access a detailed view and analyze the selected asset category.
Assets Classified by Categories
Categorizing Assets: To enhance the clarity and management of assets, the widget classifies them into different categories. Each category represents a specific group of assets that share similar characteristics or functionalities. You can quickly identify the number of exposures within each category and prioritize and address potential vulnerabilities.
Asset Categories and Descriptions
This graph shows you how many of your assets are cloud deployments, physical hardware that reside on-prem, and the hybrids.
Assets Classified by Where They Are Hosted
Clicking the bubble takes you to the list of assets in that particular deployment type in the workspace.
All Assets View
An overview of the different cloud hosting platforms
When managing assets, it is crucial to know where they are hosted. This distinction helps determine the infrastructure requirements, security measures, and operational considerations for assets.
Cloud Assets
The provided chart offers an overview of asset distribution across various cloud platforms, showcasing the number of assets deployed on each platform.
A look at the ports and other open services in the networks that are exposed to attacks
Exposed Services
The Exposed Services chart offers insights into open and exposed ports on the network, presenting a potential vulnerability for malicious attacks. The chart lists the number of assets with open ports, highlighting the critical risk they pose to organizations. Prompt action is necessary to address these exposed assets and mitigate the associated risks.
A look at the geographical distribution of assets
Geographical Distribution of Assets
The Hosts by Geo Location graph displays the geographical spread of assets and provides the following information:
When considering the remediation process, critical assets hold the highest priority. Especially when these assets are located in geographical areas targeted by trending threat actors, they require immediate attention in the remediation cadence.
A funnel approach, based on severity, of the exposures in your network.
The Exposures Breakup chart offers a structured and severity-based overview of the vulnerabilities present in your network. It follows a funnel approach, categorizing exposures into four levels:
As the graph progresses through these stages, the severity of the exposure increases. The vulnerabilities categorized under the ransomware stage are of the highest criticality and demand immediate remediation to safeguard against potential ransomware incidents.
Vulnerabilities with exploits that are highly critical to organizations
Vulnerabilities by Exploits
The Vulnerabilities by Exploits section highlights vulnerabilities that pose significant risks. These vulnerabilities are accompanied by publicly available exploits, enabling attackers to compromise organizational networks potentially. The exploits associated with these vulnerabilities encompass a wide range of attack vectors, including remote code execution, privilege escalation, DDoS attacks, and manipulation of web applications. Given the availability of these exploits, prompt remediation is crucial to mitigate the potential impact of these critical vulnerabilities on organizational security.
A look at the exposures that have been remediated over the last six months
A Look at Remediated Exposures
The Exposures Remediation chart displays recently addressed exposures and provides insights into the impact on affected assets. It also offers a breakdown of exposure severity. This chart serves as a valuable tool to gauge the progress of your organization's security teams and evaluate the effectiveness of implemented security measures.
On the right side of the chart, a table presents a detailed breakdown of exposures that have been successfully remediated during the selected month. This table offers a comprehensive view of the exposures that have been addressed, providing valuable information for tracking remediation efforts and measuring the overall success of security initiatives.
Graph Breakdown