Available to users with any package that includes a My Company subscription.
- Quickly identify areas that require focus.
- The cards can be used as a starting point for exploring specific areas of interest.
- Faster risk reduction (less time sorting issues).
- Unique to each user and can be personalized based on their areas of responsibility; Highly customizable and can be tailored to specific areas of responsibility, e.g., by risk vector or a particular subsidiary.
- By highlighting things that have changed recently, the dashboard serves as a summary of those changes across the companies within your organization (My Company and SPM Subsidiaries).
Cards
Default
Card | Description | Actions & Configuration Options |
---|---|---|
Account Recommendations | Consult our recommendations for managing your Bitsight account and for further guidance on managing your organization’s performance. | Once completed, this can be removed from your dashboard [ Edit Dashboard ➔ Remove]. |
Alerts | Automatically detect changes in your security posture with alerts. | Select View Alerts to see your generated alerts. |
Collaboration Inbox | Address your invitations to collaborate via the Client/Vendor Access Program. | |
Subscriptions | See subscription usage. | Save as Image = Download a PNG of this card. |
Vendor Discovery | Summarizes unmonitored discovered vendor risk and monitored discovered vendors. The card displays unsubscribed vendors with the highest relevance. |
|
Company Details
Get a comprehensive dashboard for managing company details, monitoring Bitsight Security Ratings, benchmarking against peers, and tracking.
Card | Description | Actions & Configuration Options |
---|---|---|
Benchmarking | Benchmark your company against your peers. | See changes in your peer group’s ratings from 7, 30, or 90 days. |
Bitsight Security Rating | The company’s rating gauge, their rating category, and any rating designations. | See the changes in your security rating from 7, 30, or 90 days. |
My Rating Changes | Observe the rating changes within your organization. |
|
Rating Overview | Check your company’s performance for each risk vector. |
Configure the card:
|
Security Ratings Timeline | Monitor fluctuations in your cyber security posture. The Security Ratings Timeline & Highlights details the factors behind rating changes over the past year. It includes significant rating drops (10 or more points), adjustments from rating algorithm updates, and historical changes like network remaps. |
|
External Attack Surface Management (EASM)
Explore and manage your external attack surface with enhanced clarity and control. Use dynamic visualizations that bring critical security insights into focus, which empowers you to effectively prioritize and address vulnerabilities.
❖ Available with External Attack Surface Enhanced.
Card | Description | Actions & Configuration Options |
---|---|---|
Attack Surface Exposure❖ | Identify confirmed or suspected vulnerabilities on your infrastructure. |
|
Confirmed Vulnerabilities❖ | Streamline threat management by filtering and exporting confirmed vulnerability exposures based on severity and current exposure. |
|
Deprecated Technology❖ | Detect and prioritize assets with unsupported products for targeted security enhancements. |
|
Evolution of Findings over time❖ | Track and analyze the progression of findings over time. |
|
Findings Backlog Evolution❖ | Monitor and track the evolution of the findings backlog, including resolved and unresolved issues. Use the remediation statuses to take the most advantage out of this card. |
|
Infrastructure Changes | Track the changes in your infrastructure and identify the source of those changes. This includes infrastructure changes of any company in your organization. |
|
New High-Priority Findings | Assess the newest findings, as prioritized by the Asset Risk Matrix. |
|
New Material/Severe Findings | Investigate new findings using the available filters (company, risk vector, finding severity, finding grade). |
|
Remediation Status | Determine when to take action and get an overview of your remediation activities. |
|
Risk Vectors
Manage and prioritize security risks effectively. Track and address specific vulnerabilities within your organization to enhance your overall security posture.
Card | Description | Actions & Configuration Options |
---|---|---|
Compromised Systems | Identify evidence of the presence of malware or unwanted software. See more details about Compromised Systems. |
Configure the card:
|
Remediation Strategy | Remediation Strategy identifies high-impact findings so you can remediate them and improve risk vector grades. |
Configure the card:
|
Unresolved Findings by Severity❖ | See the number of unresolved findings impacting the risk vector. |
|
- October 29, 2024: Navigation instructions.
- July 1, 2024: New External Attack Surface Management cards; Organized by function.
- May 8, 2024: Vendor Discovery card.
Feedback
0 comments
Please sign in to leave a comment.