Solutions and Applications
Vulnerability Response Managem...
Using Vulnerability Response Management
1 min
vulnerability management dashboard overview key sections include active findings this section shows the total number of unresolved vulnerabilities in your environment these findings indicate potential security risks that require your attention by monitoring them, you are able to prioritize remediation efforts and reduce exposure to threats total assets displays the number of assets you are currently monitoring, including servers, workstations, databases, cloud resources, and network devices understanding your asset inventory helps you assess risk levels and apply security measures effectively critical assets identifies the number of assets in your environment classified as critical these are high priority assets essential to business operations, such as core infrastructure and sensitive data repositories ensuring their security helps you minimize business risks mean time to resolution (mttr) for critical tracks the average time it takes you to resolve critical vulnerabilities a lower mttr means you are addressing high risk threats more efficiently, reducing the chance of exploitation monitoring this metric helps you improve response times and strengthen your security posture open cases shows the number of ongoing cases related to vulnerability management these cases may require further investigation, remediation planning, or compliance assessments keeping track of open cases ensures you are staying on top of security tasks and resolving issues in a timely manner exception findings displays the number of vulnerabilities in your environment that have been flagged as exceptions these may be issues that cannot be immediately resolved due to business constraints or operational limitations managing these findings allows you to document risks and implement compensating controls where necessary active findings by severity displays a breakdown of vulnerabilities based on severity levels, including critical, high, medium, and low understanding the distribution of vulnerabilities allows you to focus on addressing the most severe risks first while ensuring lower severity issues are managed appropriately assets by risk severity highlights the number of assets associated with different risk levels, categorized as critical, high, medium, or low this helps you assess which assets require immediate attention and ensures that the most vulnerable or business critical assets are properly secured sla status indicates how well vulnerabilities are being resolved within the required service level agreement (sla) this section helps you track whether vulnerabilities are being addressed within the agreed upon timeframe or if any have exceeded their sla monitoring this ensures that your organization meets security compliance requirements and maintains an effective remediation process interactive filters and drill down capabilities allow you to explore specific vulnerabilities or asset details