The Risk & Security Cockpit is the central source for risk and security information. Customised and easy to understand reports and statistics are available on the push of a button.
The Cockpit provides reports and statistics in the preferred level of detail. It may include a one-page overview for board members or a predefined set out of an extensive array of statistics on vulnerabilities, anomalies, network data, scans, services, inventory, assets, etc. for your IT security team.
The essentials obtained from IT security monitoring and risk detection are presented together with:
- security flaws recognised, classified and prioritised,
- a complete incident workflow,
- the possibility of automated assignment to user groups (teams) as well as dispatching of incidents,
- the client’s employees responsible for remediation as well as the current status of the remediation process.
Urgent information on risk or security flaws leads to alerts which are provided in the Cockpit, via email and/or even via push message on mobile phones if requested.
Internal and external coordination is simplified through an overall risk remediation workflow within the Cockpit and a messaging / feedback system for the communication with the Intelligence Team.
The business process risk view presents the current threats of the IT security flaws to business processes. For example, a server with several vulnerabilities is not only a threat to the IT infrastructure, but also to the IT services provided by the server. Employees might be unable to send and receive emails, web portals are inaccessible or the ERP system is interrupted. Thus communication by email becomes impossible, incoming orders via the web portal are not received or new stock levels cannot be entered in the ERP system. The presentation of IT risks and their influences on IT services and business processes in turn demonstrates clearly and understandably the effects and the overall context at the push of a button.
Asset management functionalities provide an overview about what is really running in the network, from perimeter and corporate network to virtualised machines and cloud services. Unexpected access points, web servers and other devices that may leave a network open to attack are uncovered. Operating systems of each device are identified, open networks ports are found, active services on those ports are determined and crucial information about installed certificates is itemised. Assets are tagged according to a wide range of attributes such as network address, open ports, OS, installed software, found vulnerabilities and a multitude of others to allow automatic selection of hosts for scanning or reporting.