Kenna Security is now part of Cisco

|Learn more

Vulnerability Cage Match

Mar 10, 2015
Andrea Bailiff-Gush

Share with Your Network

Sometimes you want to see the status of your open vulnerabilities across the various assets in your environment. And operating system continues to be an important datapoint. That’s why we’ve improved the TagView dashboard. With a new name, Compare, and an expanded set of filters (we’ve added the ability to filter by assets running a specific operating system) you can now compare your assets from even more angles.

Asset Filters

Simply choose the contenders from the drop-downs (asset tag vs. operating system), select to view as grouped, and voilá: your open vulnerability count, month-over-month, will appear for easy comparison.

Compare Dashboard Grouped

You can also compare multiple asset tags vs. multiple operating systems in the ultimate Battle Royale. Simply choose your asset values for tag1 vs tag2 vs tag3 vs os1 vs os2 etc., select to view the set as stacked, and your open vulnerabilities for each asset will appear, by month.

Compare Dashboard Stacked

This expanded Compare dashboard is just another way that Risk I/O is giving you visibility into your open vulnerabilities to aid in prioritization.

We’ve also updated our API with new asset group endpoints as well as new attributes. Users can now make calls to their API and pull all risk meter asset scores (as well as scores for individual assets). And users who use different methods to report on risk meter scores for assets and asset groups may find our new attribute risk_meter_score handy.

API Group Endpoints

Information on these new API features is located in our API documentation.

So whether you are setting up assets to duke it out in the open vulnerabilities match-of-the-century, or you’re one of our API users who check their asset risk meter scores daily, we think you’ll find our new features will enhance how you’re already using Risk I/O.

Read the Latest Content

Research Reports

Prioritization to Prediction Volume 5: In Search of Assets at Risk

The fifth volume of the P2P series explores the vulnerability risk landscape by looking at how enterprises often view vulnerabilities.
DOWNLOAD NOW
eBooks

5 Things Every CIO Should Know About Vulnerability Management

If you view vulnerability management (VM) as just a small part of your operation, it might be time to take another look.  Managing vulnerabilities is...
DOWNLOAD NOW

Videos

Videos

Get Started Using the Exploit Prediction Scoring System (EPSS).

Cyentia Institute’s Chief Data Scientist and Founder Jay Jacobs gives tips on how to get started using the Exploit Prediction Scoring System (EPSS). You...
READ MORE
FacebookLinkedInTwitterYouTube

© 2022 Kenna Security. All Rights Reserved. Privacy Policy.