Skyone
English
English
  • Home
  • Skyone Platform
    • Overview
    • Access and Registration
      • Password recovery for the platform
    • Settings and Preferences
      • My Profile
      • User Management
        • How to invite a user to the platform?
        • Options for User Management
        • Types of User Permissions
      • Invitations
      • My Company
      • Support Case Configuration
      • Companies Management
      • Billing
      • Settings
      • Security
      • Feedback
      • Logs
      • Cancellation
      • Partner-Clients
        • My Clients
        • My Partner
    • Notification
    • Health: Platform status check
    • Support Cases
      • How to track and respond to support cases?
      • Guide for opening ABO Tickets
  • Cloud Computer
    • Overview
    • Autosky
      • Login and Password Registration
        • Password RecoveryPassword Registration
      • Profile and Preferences
      • Skyone Autosky Platform
        • Dashboard
        • Accounts
          • Servers
            • Server Options
        • Environments
          • Micro environment
            • Micro environment instance
            • Micro environment servers
          • Scaling environment
            • Scaling environment instances
            • Scaling environment servers
          • Other features of the environments
        • Clients
          • Edit and Clone
          • Users
          • Applications
          • Sessions
          • Manage Access Restrictions
          • Maintenance
            • Maintenance history
        • Users
    • Cloud Server
      • Cloud Server Options
      • Backup Audit
  • Studio
    • Overview
      • Create an account
      • Recover Password
      • Quick Platform Guide
      • How to test the platform for free
      • Workspace
        • Creating a new Workspace
        • Find a Workspace
        • Sending an invitation to a Workspace
        • Editing a Workspace
      • Organizations
        • Creating an Organization
        • Organization Overview
        • Organization Management
        • Organization Monitoring
      • Settings and Preferences
        • Profile
        • Notifications
        • Usage and Billing
        • Users and Permissions
    • Integrations
      • Integration Management
        • Create integration
        • Import Integration
        • Edit Integration
        • Integration Options
        • Flows of this integration
      • Flows
        • Flow management
          • Creating a flow
          • Flow options
          • Flow Canva: configuring and editing the flow
            • Flow Canva: overview
            • Exception Handler
              • Exception Handler - Configuration
              • Exception Handler - Cases
            • Multicontext Flows
              • Example: Multicontext with an API Gateway
              • Example: Multicontext with a Time Trigger
            • Flow Settings
        • Triggers of a flow
          • API Gateway Triggers: Adding and Setting
          • AS2 Triggers: Adding and Setting
          • Queue Triggers: Adding and Setting
          • Flow Triggers: Adding and Setting
          • Time Triggers: Adding and Setting
          • Webhook Triggers: Adding and Setting
        • Tool Modules
          • AS2 Module
          • CSV Module
          • Data Transform Module
          • Data Balancer Module
          • EDI Module
          • Flow Call Module
          • IF Module
          • JavaScript Module
          • Log Module
          • Loop Do While Module
          • Loop For Module
          • Return Module
          • XML Module
          • Other Tool Modules
        • Module Header
        • Connecting components of a flow
        • Editing triggers and modules
        • Data Operations
          • Object Handling
            • Practical example: Handling variables
          • SMOP (Small Operations)
          • Parameterization rules
    • Modules
      • Module management
        • Creating a Module
        • Importing a Module
          • IAC Files - Integration as Code
        • Editing a module
        • Module Options
      • Settings and Operations
        • Module settings
          • Connectivity: Database
          • Connectivity: Email
          • Connectivity: REST
          • Connectivity: SOAP
          • Connectivity: File
          • Connectivity: RFC
          • Connected Account Management
        • Operations
          • Importing operations into REST Modules
          • Operation Management
        • Flows Using This Module
    • API Gateway
    • Terminals & Agent
      • Agent
        • Versions supported by Agent
        • How to Update the Agent Version
        • How to back up Agent files
      • Terminals
    • Data Management
      • Engine
        • How to use the Data Engine Proxy
      • Parameters
      • File filters
      • File templates
      • File Jobs
      • JSONata Jobs
    • Data Lake
    • Data Warehouse
      • Data Jobs
      • Databases
    • Artificial Intelligence
    • How to
      • Insert JSON into databases
      • Flattening: Data transformation using JSONata
      • How to use Form Data
      • Understanding recursion in JSONata
      • REST Module Output Consolidation
      • How to configure a component timeout?
      • Isolated in execution: concept and application in variables
      • URL Parameters in API Gateway
      • Use case: API Gateway trigger parameters
      • Use case: Exception Handler in financial transactions
      • Use case: using Groups to manage access to flows
      • How to create a download endpoint and integrate with Power BI
      • Is it possible to use two triggers in a single flow?
    • FAQ
    • GIGS: The complete guide
    • Glossary
  • Cybersecurity
    • Overview
    • Threat Analysis
      • Security Panel
      • Targets
      • Schedules
      • Target Resolution
      • Threat Group
      • Report
    • How to install Bitdefender security agents
Powered by GitBook
On this page
  • Threat Level
  • Cyber Score
  • Resolutions
  • Resolution Tracking
  • Real-Time Scanning
  • Maturity
  • Threat level by time exposure
  • Top 5 most critical targets
  1. Cybersecurity
  2. Threat Analysis

Security Panel

PreviousThreat AnalysisNextTargets

Last updated 5 months ago

The "Security Dashboard" provides a range of information about the company’s security status, enabling the monitoring of vulnerabilities, threats, and resolution statuses.

Below are the details of this dashboard:

Threat Level

The "Threat Level" section offers an overview of vulnerabilities detected in the system, categorized into four severity levels: Critical, High, Medium, and Low. Each level reflects the urgency and potential impact of the threats, helping to prioritize security actions.

Cyber Score

The Cyber Score evaluation is based on threats identified in the system, adjusting the rating according to the severity of the threats:

  • Grade A: The system receives an "A" rating when no threats are detected.

  • Grade B: Each low-level threat slightly impacts the Cyber Score. For instance, one or two low threats cause minimal impact, but reaching four low threats raises the system to a higher risk level.

  • Grade C: A medium-level threat has a greater impact than several low-level threats, indicating an elevated alert level. For example, a system with thirteen low threats and one medium threat will have its Cyber Score adjusted to reflect the presence of the medium threat.

  • Grade D: High and critical threats take precedence over others. Even with multiple low threats, a single high or critical threat indicates a more severe problem and requires immediate attention.

Resolutions

The "Resolutions" section provides a summary of detected threats, organized by severity level. It displays the total number of accumulated threats and specifies the quantity for each type. To view threats by category, simply click on the section.

Resolution Tracking

The "Resolution Tracking" section provides an overview of ongoing and completed resolutions:

  • Resolved: Indicates the number of vulnerabilities that have been addressed.

  • Pending: Refers to the total number of vulnerabilities that still require action.

Real-Time Scanning

The "Real-Time Scanning" section lists the status of security checks in progress. Each entry includes:

  • Name: The name of the item being scanned.

  • Start Time: The time when the scan began.

  • Status: The current scan status, displayed as a percentage indicating the analysis progress.

Maturity

The "Maturity" indicator evaluates the company’s ability to manage cybersecurity, assigning a score from 1 to 10.

The maturity levels represent the degree of adoption of security best practices within the company and are categorized as: Initial, Basic, Defined, Managed, and Optimized.

Periodically review this index by clicking "Review".

Threat level by time exposure

The "Threat level by time exposure" chart allows you to visualize the severity of threats over a selected date range. Severity filters (Critical, High, Medium, Low) can be adjusted as needed to refine the view.

Top 5 most critical targets

This section lists the five most critical items, helping prioritize efforts in areas with the greatest security needs. Each entry includes:

  • Target: Web address or IP of the target.

  • Target Type

  • Incluided By: Manual or Auto Discovery.

  • Last Scan: The date and time of the last scan, or if it is currently "In Progress."

  • Threats Found: A breakdown of threat types. Clicking on this directs you to the "Target Resolutions" section.

  • Current Status

On the right side of each item, you’ll find a "More Options" menu (three dots) with the following actions:

  • Target Threats: Opens the "Target Resolutions" screen.

  • Inactivate Target: Displays a modal to confirm deactivation of the target.

  • Re-scan Target: Initiates a new scan for the target.

  • Delete: Removes the target.

You can also view items filtered as muted, if applicable. For more details about the resolution process, click "See more" to be redirected to the "Target Resolutions" page. .

For more details about the resolution process, click "See more" to be redirected to the "Target Resolutions" page. .

For more details about the scanning process, click "See more" to be redirected to the "Schedules" page. .

Read the documentation here
Read the documentation here
Read the documentation here
Security dashboard example