Home
The Home dashboard in Risk Monitor gives you a quick overview of the risk status for your IT estate.
Description
The Home dashboard allows you to quickly scan the overall status and discover trends that should be followed up.
You can, for example, see:
-
How many critical vulnerabilities there are in total in your IT estate, in the Total vulnerabilities by severity chart.
-
The applications in your IT estate with the highest number of vulnerabilities in total, in the Top 10 vulnerable applications chart.
-
The number of vulnerable applications that are out of support but for which upgrades are available, in the Installed applications risk cross-over chart.
-
Recommendations on what applications to upgrade to reduce the number of vulnerabilities the most, in the Top 10 recommendations chart.
Characteristics
You can refer to the tables below for descriptions of the key figures and charts on the dashboard.
Key figures
The key figures give a quick overview of the status of your IT estate's exposure to software vulnerabilities.
Key figure | Description |
---|---|
Total vulnerabilities | The number of individual instances of vulnerabilities found in the devices in your IT estate. |
Unique vulnerabilities | The number of unique vulnerabilities in your IT estate. Each CVE ID represents a unique vulnerability. |
Vulnerable devices | The number of devices in your IT estate with at least one vulnerable application installed. |
Vulnerable applications | The number of installed applications in your IT estate that contain at least one vulnerability. |
Charts
The charts give a quick overview of different aspects of the risk status for your IT estate. The charts are interactive, allowing you to further explore aspects of special concern to you.
Chart | Description |
---|---|
Installed applications risk cross-over | Each circle in the diagram represents applications in your IT estate with a specific characteristic.
Tip: To further explore the applications in the diagram, select a segment to go to the Applications dashboard. The dashboard is adjusted to only show details about applications having the characteristics of the selected segment. For example, if you select the segment in the middle of the diagram, the Applications dashboard will show you details about vulnerable PII applications that are out of support, but for which upgrades are available. |
Top 10 vulnerable applications | Shows the applications in your IT estate with the largest number of total vulnerabilities. Different versions of an application are displayed as separate bars. |
Top 10 recommendations | Shows the recommended versions for the applications listed in the Top 10 vulnerable applications chart, and the number of vulnerabilities that will be removed with the upgrade. If you upgrade to the recommended version, as many vulnerabilities as possible will be removed. Different versions of an application are stacked together in the same bar since they share the same recommendation. |
Total vulnerabilities by severity | Shows the total number of vulnerabilities in your IT estate grouped by base severity. |