You Can Get With This or You Can Get With That

Mar 14, 2013
Ed Bellis
Chief Technology Officer, Co-founder

Share with Your Network

Dashboards and metrics the way you like ’em. Today we are launching our new filtered dashboards feature, which allows you to use custom tags to see different views of your vulnerability metrics.

In addition to the default dashboard view, which provides a summary of your security state across the entire organization, you can now filter those metrics using the custom tags you’ve created right in Risk I/O. This empowers you to perform comparisons across your entire business and technology stack.

Filter your dashboard by custom tags to see a specific view of your vulnerability metrics.

Simply select a tag from the drop-down list located above the dashboard. You’ll notice that your vulnerability metrics will update depending on the tag chosen. Selecting a custom tag on one tab will automatically cause the metrics to reflect that selection when navigating to another tab. You can reset your search by selecting the “x” located in the drop-down. Please note that custom tags can be managed right on your Vulnerabilities and Assets tabs. Because the Benchmark tab aggregates data our global data set, the tag filter is disabled on that tab.

We encourage you to check back often as we add additional metrics to the Risk I/O dashboard, as we anticipate the use of tags will give you some very unique views into your security posture.

Read the Latest Content

Research Reports

Prioritization to Prediction Volume 5: In Search of Assets at Risk

The fifth volume of the P2P series explores the vulnerability risk landscape by looking at how enterprises often view vulnerabilities.
DOWNLOAD NOW
eBooks

5 Things Every CIO Should Know About Vulnerability Management

If you view vulnerability management (VM) as just a small part of your operation, it might be time to take another look.  Managing vulnerabilities is...
DOWNLOAD NOW

Videos

Videos

Get Started Using the Exploit Prediction Scoring System (EPSS).

Cyentia Institute’s Chief Data Scientist and Founder Jay Jacobs gives tips on how to get started using the Exploit Prediction Scoring System (EPSS). You...
READ MORE
FacebookLinkedInTwitterYouTube

© 2022 Kenna Security. All Rights Reserved. Privacy Policy.