This dashboard provides information on SSH remote access vulnerabilities, exploits, and network traffic flow. SSH (Secure Shell) is used by *nix, Mac OS, and Windows to remotely manage other devices on the network.
The Monetary Authority of Singapore (MAS) published new Technology Risk Management (TRM) Guidelines in June 2013. The MAS TRM Guidelines dashboard provides a high level overview of information relevant to specific sections in the TRM Guidelines.
Information Security professionals continuously perform various types of risk assessments within their environment. SecurityCenter users have a secret weapon in the battle to properly assess risk, and that weapon is SecurityCenter’s native ability to fully use the CVSS scoring system.
This dashboard presents vulnerability summary information grouped in various ways. It provides a succinct visual representation of how quickly vulnerabilities on the network are being mitigated and how many exploitable vulnerabilities remain.
On April 15, 2014, the U.S. Securities and Exchange Commission’s Office of Compliance Inspections and Examinations (OCIE) issued a Risk Alert describing its Cybersecurity Initiative "to assess cybersecurity preparedness in the securities industry." This dashboard presents network information that can assist organizations in evaluating and improving their cybersecurity preparedness.
In conjunction with CVSS Temporal score heat maps, SecurityCenter can also provide a more detailed analysis such as exploitability. This dashboard uses a heat map approach and provides an analysis of the vulnerabilities and notes if a published exploit is available.
The use of heat maps is commonplace in all types of risk analysis. SecurityCenter customers have the ability to combine matrix components together to create a heat map to assess risk with an organization. This dashboard uses CVSS temporal metrics to display risk levels of systems and their vulnerabilities.
The Common Vulnerability Scoring System (CVSS) provides an open framework for assessing the risk of discovered vulnerabilities. The scoring system has three metric types, the second being “Temporal Metric”. This dashboard provides four risk analysis matrices, two risk-based heat maps, and two with published exploit ratios.
The cookie settings on this website are set to 'allow all cookies' to give you the very best website experience. If you continue without changing these settings, you consent to this - but if you want, you can opt out of all cookies by clicking below.