Skip to main content

Home

The Home dashboard in Risk Monitor gives you a quick overview of the risk status for your IT estate.

Description

The Home dashboard allows you to quickly scan the overall status and discover trends that should be followed up.

You can, for example, see:

  • How many critical vulnerabilities there are in total in your IT estate, in the Total vulnerabilities by severity chart.

  • The applications in your IT estate with the highest number of vulnerabilities in total, in the Top 10 vulnerable applications chart.

  • The number of vulnerable applications that are out of support but for which upgrades are available, in the Installed applications risk cross-over chart.

  • Recommendations on what applications to upgrade to reduce the number of vulnerabilities the most, in the Top 10 recommendations chart.

Characteristics

You can refer to the tables below for descriptions of the key figures and charts on the dashboard.

Key figures

The key figures give a quick overview of the status of your IT estate's exposure to software vulnerabilities.

Key figureDescription
Total vulnerabilitiesThe number of individual instances of vulnerabilities found in the devices in your IT estate.
Unique vulnerabilitiesThe number of unique vulnerabilities in your IT estate. Each CVE ID represents a unique vulnerability.
Vulnerable devicesThe number of devices in your IT estate with at least one vulnerable application installed.
Vulnerable applicationsThe number of installed applications in your IT estate that contain at least one vulnerability.

Charts

The charts give a quick overview of different aspects of the risk status for your IT estate. The charts are interactive, allowing you to further explore aspects of special concern to you.

ChartDescription
Installed applications risk cross-overEach circle in the diagram represents applications in your IT estate with a specific characteristic.
  • The PII circle represents applications that may hold personally identifiable information.
  • The Vulnerable circle represents applications containing one or more vulnerabilities.
  • The Upgradeable circle represents applications for which upgrades are available.
  • The Support ended circle represents applications that are no longer supported by the manufacturer.
Applications with two or more characteristics are represented by the segments of overlapping circles. For example, the segment in the middle of the diagram represents applications with all four characteristics; vulnerable PII applications that are out of support, but for which upgrades are available.
Tip: To further explore the applications in the diagram, select a segment to go to the Applications dashboard. The dashboard is adjusted to only show details about applications having the characteristics of the selected segment. For example, if you select the segment in the middle of the diagram, the Applications dashboard will show you details about vulnerable PII applications that are out of support, but for which upgrades are available.
Top 10 vulnerable applicationsShows the applications in your IT estate with the largest number of total vulnerabilities.
Different versions of an application are displayed as separate bars.
Top 10 recommendationsShows the recommended versions for the applications listed in the Top 10 vulnerable applications chart, and the number of vulnerabilities that will be removed with the upgrade. If you upgrade to the recommended version, as many vulnerabilities as possible will be removed.
Different versions of an application are stacked together in the same bar since they share the same recommendation.
Total vulnerabilities by severityShows the total number of vulnerabilities in your IT estate grouped by base severity.