What's So Great About Reports?

In this video, we walk through how easy it is to build out and share data from four of our built-in reports, including:

  1. Alerts– A customizable, detailed summary of your alerts, including information on what is open, what’s been closed, severity levels and more.

  2. Asset Inventory Data- View all your assets and detailed information about them, including firmware versions, make, model, serial number, IP addresses and more.

  3. CIS Controls Mapping- See how your current asset and security information maps to the CIS Controls.

  4. Vulnerability Assessment- Quickly identify weak points in your operations, including malware, insecure protocols, CVSS and likelihood scores of open vulnerabilities and more.

Watch Video

Speakers

What's So Great About Reports?
Videos

What's So Great About Reports?

April 14, 2023

In this video, we walk through how easy it is to build out and share data from four of our built-in reports, including:

  1. Alerts– A customizable, detailed summary of your alerts, including information on what is open, what’s been closed, severity levels and more.

  2. Asset Inventory Data- View all your assets and detailed information about them, including firmware versions, make, model, serial number, IP addresses and more.

  3. CIS Controls Mapping- See how your current asset and security information maps to the CIS Controls.

  4. Vulnerability Assessment- Quickly identify weak points in your operations, including malware, insecure protocols, CVSS and likelihood scores of open vulnerabilities and more.

In this video, we walk through how easy it is to build out and share data from four of our built-in reports, including:

  1. Alerts– A customizable, detailed summary of your alerts, including information on what is open, what’s been closed, severity levels and more.

  2. Asset Inventory Data- View all your assets and detailed information about them, including firmware versions, make, model, serial number, IP addresses and more.

  3. CIS Controls Mapping- See how your current asset and security information maps to the CIS Controls.

  4. Vulnerability Assessment- Quickly identify weak points in your operations, including malware, insecure protocols, CVSS and likelihood scores of open vulnerabilities and more.

SPEAKERS

In this video, we walk through how easy it is to build out and share data from four of our built-in reports, including:

  1. Alerts– A customizable, detailed summary of your alerts, including information on what is open, what’s been closed, severity levels and more.

  2. Asset Inventory Data- View all your assets and detailed information about them, including firmware versions, make, model, serial number, IP addresses and more.

  3. CIS Controls Mapping- See how your current asset and security information maps to the CIS Controls.

  4. Vulnerability Assessment- Quickly identify weak points in your operations, including malware, insecure protocols, CVSS and likelihood scores of open vulnerabilities and more.

IN PARTNERSHIP WITH
No items found.
SPEAKERS

What's So Great About Reports?

In this video, we walk through how easy it is to build out and share data from four of our built-in reports, including:

  1. Alerts– A customizable, detailed summary of your alerts, including information on what is open, what’s been closed, severity levels and more.

  2. Asset Inventory Data- View all your assets and detailed information about them, including firmware versions, make, model, serial number, IP addresses and more.

  3. CIS Controls Mapping- See how your current asset and security information maps to the CIS Controls.

  4. Vulnerability Assessment- Quickly identify weak points in your operations, including malware, insecure protocols, CVSS and likelihood scores of open vulnerabilities and more.

Subscribe to our newsletter

Take the next step.

Discover how easy it is to identify and respond to cyber threats by automating your IoT and OT asset discovery, inventory, and management.