What's So Great About Reports?

In this video, we walk through how easy it is to build out and share data from four of our built-in reports, including:

  1. Alerts– A customizable, detailed summary of your alerts, including information on what is open, what’s been closed, severity levels and more.

  2. Asset Inventory Data- View all your assets and detailed information about them, including firmware versions, make, model, serial number, IP addresses and more.

  3. CIS Controls Mapping- See how your current asset and security information maps to the CIS Controls.

  4. Vulnerability Assessment- Quickly identify weak points in your operations, including malware, insecure protocols, CVSS and likelihood scores of open vulnerabilities and more.

View Resource

Speakers

What's So Great About Reports?

What's So Great About Reports?

In this video, we walk through how easy it is to build out and share data from four of our built-in reports, including:

  1. Alerts– A customizable, detailed summary of your alerts, including information on what is open, what’s been closed, severity levels and more.

  2. Asset Inventory Data- View all your assets and detailed information about them, including firmware versions, make, model, serial number, IP addresses and more.

  3. CIS Controls Mapping- See how your current asset and security information maps to the CIS Controls.

  4. Vulnerability Assessment- Quickly identify weak points in your operations, including malware, insecure protocols, CVSS and likelihood scores of open vulnerabilities and more.

Speakers

What's So Great About Reports?

In this video, we walk through how easy it is to build out and share data from four of our built-in reports, including:

  1. Alerts– A customizable, detailed summary of your alerts, including information on what is open, what’s been closed, severity levels and more.

  2. Asset Inventory Data- View all your assets and detailed information about them, including firmware versions, make, model, serial number, IP addresses and more.

  3. CIS Controls Mapping- See how your current asset and security information maps to the CIS Controls.

  4. Vulnerability Assessment- Quickly identify weak points in your operations, including malware, insecure protocols, CVSS and likelihood scores of open vulnerabilities and more.

Take the next step.

Discover how easy it is to identify and respond to cyber threats by automating your IoT and OT asset discovery, inventory, and management.