Security Panel
Last updated
Last updated
The "Security Dashboard" provides a range of information about the company’s security status, enabling the monitoring of vulnerabilities, threats, and resolution statuses.
Below are the details of this dashboard:
The "Threat Level" section offers an overview of vulnerabilities detected in the system, categorized into four severity levels: Critical, High, Medium, and Low. Each level reflects the urgency and potential impact of the threats, helping to prioritize security actions.
The Cyber Score evaluation is based on threats identified in the system, adjusting the rating according to the severity of the threats:
Grade A: The system receives an "A" rating when no threats are detected.
Grade B: Each low-level threat slightly impacts the Cyber Score. For instance, one or two low threats cause minimal impact, but reaching four low threats raises the system to a higher risk level.
Grade C: A medium-level threat has a greater impact than several low-level threats, indicating an elevated alert level. For example, a system with thirteen low threats and one medium threat will have its Cyber Score adjusted to reflect the presence of the medium threat.
Grade D: High and critical threats take precedence over others. Even with multiple low threats, a single high or critical threat indicates a more severe problem and requires immediate attention.
The "Resolutions" section provides a summary of detected threats, organized by severity level. It displays the total number of accumulated threats and specifies the quantity for each type. To view threats by category, simply click on the section.
The "Resolution Tracking" section provides an overview of ongoing and completed resolutions:
Resolved: Indicates the number of vulnerabilities that have been addressed.
Pending: Refers to the total number of vulnerabilities that still require action.
The "Real-Time Scanning" section lists the status of security checks in progress. Each entry includes:
Name: The name of the item being scanned.
Start Time: The time when the scan began.
Status: The current scan status, displayed as a percentage indicating the analysis progress.
The "Maturity" indicator evaluates the company’s ability to manage cybersecurity, assigning a score from 1 to 10.
The maturity levels represent the degree of adoption of security best practices within the company and are categorized as: Initial, Basic, Defined, Managed, and Optimized.
Periodically review this index by clicking "Review".
The "Threat level by time exposure" chart allows you to visualize the severity of threats over a selected date range. Severity filters (Critical, High, Medium, Low) can be adjusted as needed to refine the view.
This section lists the five most critical items, helping prioritize efforts in areas with the greatest security needs. Each entry includes:
Target: Web address or IP of the target.
Target Type
Incluided By: Manual or Auto Discovery.
Last Scan: The date and time of the last scan, or if it is currently "In Progress."
Threats Found: A breakdown of threat types. Clicking on this directs you to the "Target Resolutions" section.
Current Status
On the right side of each item, you’ll find a "More Options" menu (three dots) with the following actions:
Target Threats: Opens the "Target Resolutions" screen.
Inactivate Target: Displays a modal to confirm deactivation of the target.
Re-scan Target: Initiates a new scan for the target.
Delete: Removes the target.
You can also view items filtered as muted, if applicable. For more details about the resolution process, click "See more" to be redirected to the "Target Resolutions" page. .
For more details about the resolution process, click "See more" to be redirected to the "Target Resolutions" page. .
For more details about the scanning process, click "See more" to be redirected to the "Schedules" page. .