Software & IT Technology

FireEye Events Dashboard

by Josef Weiss
July 23, 2014

This dashboard displays a summary status of FireEye events, providing an overview of collected events using several techniques. This event data provides the analyst with many different methods to quickly respond to triggered alerts.

Tenable Admin

by Josef Weiss
July 10, 2014

This dashboard provides an administrative overview of Tenable Applications, and highlights potential problems. These eight components provide indications to common problems, and allow the administrator to quickly take action to resolve concerns, and to minimize the potential loss of vulnerability or event data.

Unknown Process(es)

by Josef Weiss
June 17, 2014

Unknown Process Dashboard Image
This dashboard displays unknown processes, Microsoft Windows autoruns, gray area processes, and known installed software across a series of components.

Internet Explorer Vulnerabilities

by Cody Dumont
April 30, 2014

Internet Explorer Vulnerabilities Screenshot
The latest zero-day Internet Explorer vulnerability leaves organizations open to new attacks using remote execution exploits. How vulnerable is your organization? With this dashboard, SecurityCenter customers can better analyze risk and create remediation strategies.

Tracking Risk

by Josef Weiss
October 30, 2013

Tracking unsupported and exploitable software along with critical vulnerabilities over time offers a variety of insights to the security of your network.

Software Summary

by Josef Weiss
May 2, 2013

Ideally, updates and security patches should be deployed as soon as they become available, to prevent exploitable vulnerabilities. Reality is, that is a somewhat difficult task, and rarely do patches get deployed as fast as they should.

This dashboard assists organizations by implementing controls to quickly identify, and reduce the potential exploitation of application vulnerabilities.

Teredo Detection

by Randal T. Rioux
July 29, 2012


Teredo introduces yet another way for data to travel to and from the Internet. This dashboard reports on Teredo servers and Teredo traffic entering and exiting your network. Based on your organization's policies, this data will help you track and address systems whose IPs have been identified with Teredo traffic.