PCI Compliance
The PCI Compliance dashboard helps organizations to continually assess and validate their Payment Card Industry compliance posture.
|
Visualizations |
Overview |
|---|---|
|
Application Overview |
Displays the top 15 applications ranked by user visits. |
|
Web Traffic |
Displays the distribution of encrypted and clear-text traffic. |
|
TLS Versions |
Displays the distribution of applications based on the SSL/TLS versions in use. |
|
Sessions using Old SSL Versions |
Displays applications and their endpoints that are using deprecated or outdated SSL/TLS versions. |
|
Total Certificates Expired |
The number of total certificates that have expired. |
|
Expired TLS Certificate Details |
Displays host IP address and key certificate details of servers using expired certificates. |
|
Weak Ciphers |
Displays weak cipher suites currently in use. |
|
Key Exchange Protocols |
Displays the key exchange algorithms currently in use. |
|
Cryptographic Hash |
Displays the hash mechanism used in certificate signatures to verify their authenticity and integrity. |
|
SSH Sessions |
Displays the number of SSH sessions operating on non-standard ports. |
|
Insecure protocols |
Displays the presence of insecure applications and protocols in the network, including SMB, SNMP, FTP, and others. |
|
SMB Version |
Displays the distribution of SMB versions based on the number of sessions. |
|
HTTP Version |
Displays the distribution of HTTP versions based on the number of sessions. |
|
Top IP conversations |
Displays the top IP conversations ranked by their activity. |
|
Top Layer2 Devices |
Displays the source MAC address of devices. Organizationally Unique Identifiers (OUI) can be integrated with a third-party library to identify them. |



