With vulnerabilities gaining more visibility in the news, executives and management need to be briefed at least monthly on status updates and mitigations. SecurityCenter Continuous View has the ability to track vulnerabilities as they are discovered on the network and when they are mitigated. This report provides the security operations team with an easy-to-understand report for managers to monitor progress.
SecurityCenter provides organizations with an easy-to-understand platform to collect vulnerability information using three methods: active, passive, and log collection. After the data is collected, the date that a vulnerability is initially discovered and when the vulnerability is remediated can be tracked and reported on. This report provides a high-level executive review of vulnerability detection over the past 30 days.
This report provides executive-level directors and managers with a detailed understanding of the vulnerability risk management program via a series of trend graphs, charts, tables, and other reporting components. A CISO can use this report in monthly meetings to communicate the status of current risk levels to other members of the organization.
The report is available in the SecurityCenter Feed, an app store of dashboards, reports, and assets. The report can be easily located in the SecurityCenter Feed by selecting category Executive. The report requirements are:
- SecurityCenter 4.8.2
- Nessus 6.3.4
SecurityCenter CV enables the organization to react to advanced threats, zero-day vulnerabilities and new forms of regulatory compliance. By providing a unique combination of detection, reporting, and pattern recognition utilizing industry-recognized algorithms and models, SecurityCenter CV can become the cornerstone to any successful security program. Taking a proactive approach to continuous network monitoring, SecurityCenter CV identifies the biggest risks across the entire enterprise. SecurityCenter CV scales to meet future demands of monitoring virtualized systems, cloud services, and the proliferation of devices.
Executive Summary: This chapter provides two matrices to communicate new vulnerabilities and mitigated risk. Each matrix is comprised of four rows that reference a time range in which vulnerabilities are discovered, and columns that indicate their severity levels. The numbers in each cell indicate the number of hosts that match the respective query.
Vulnerability Trends and Indexes: This chapter provides a series of pie charts, area charts, and line graphs that depict the vulnerability status over the past 30 days. This information provides management with a visual representation of new vulnerabilities over the past 30 days.
Highest Ranked Assets: This chapter provides a summary of the top 10 assets on the network based on total vulnerabilities found. The data will help management see vulnerabilities based on similar devices or operating systems. Assets can be used to group similar devices together, or devices with some attribute in common.
Highest Vulnerable Systems in the Network: This chapter provides a summary of the top 10 most vulnerable systems on the network or in an asset group based on total critical severity vulnerabilities found. The data will help management see the systems that require the most immediate attention.