Security Posture
The Security Posture dashboard provides insights into active crypto-inventory, ensuring compliance with security policies. It helps identify instances of non-compliance and facilitates corrective actions.
|
Visualizations |
Overview |
|---|---|
|
TLS Versions seen in the network |
Displays all TLS/SSL versions detected in your network. |
|
Sessions using Old SSL Versions |
Displays applications and their endpoints that are using deprecated or outdated SSL/TLS versions. |
|
Weak Ciphers |
Displays weak ciphers in use. |
|
Key Exchange Protocols seen on the network |
Displays the signature algorithms used in SSL/TLS key exchanges. |
|
Signature Algorithm |
Displays the signature algorithm used in certificates. |
|
Cryptographic Hash |
Displays the distribution of SSL/TLS signature hash algorithms. |
|
Compression Algorithms detected |
Displays various compression methods detected based on HTTP content type. |
|
Sessions using compression algorithms |
Displays the compression algorithms used per flow by each application. |



