PCI Compliance
The PCI Compliance dashboard helps organizations to continually assess and validate their Payment Card Industry compliance posture.
Visualizations |
Overview |
---|---|
Application Overview |
Displays the top 15 applications ranked by user visits. |
Web Traffic |
Displays the distribution of encrypted and clear-text traffic. |
TLS Versions |
Displays the distribution of applications based on the SSL/TLS versions in use. |
Sessions using Old SSL Versions |
Displays applications and their endpoints that are using deprecated or outdated SSL/TLS versions. |
Total Certificates Expired |
The number of total certificates that have expired. |
Expired TLS Certificate Details |
Displays host IP address and key certificate details of servers using expired certificates. |
Weak Ciphers |
Displays weak cipher suites currently in use. |
Key Exchange Protocols |
Displays the key exchange algorithms currently in use. |
Cryptographic Hash |
Displays the hash mechanism used in certificate signatures to verify their authenticity and integrity. |
SSH Sessions |
Displays the number of SSH sessions operating on non-standard ports. |
Insecure protocols |
Displays the presence of insecure applications and protocols in the network, including SMB, SNMP, FTP, and others. |
SMB Version |
Displays the distribution of SMB versions based on the number of sessions. |
HTTP Version |
Displays the distribution of HTTP versions based on the number of sessions. |
Top IP conversations |
Displays the top IP conversations ranked by their activity. |
Top Layer2 Devices |
Displays the source MAC address of devices. Organizationally Unique Identifiers (OUI) can be integrated with a third-party library to identify them. |