Security Posture
The Security Posture dashboard provides insights into active crypto-inventory, ensuring compliance with security policies. It helps identify instances of non-compliance and facilitates corrective actions.
Visualizations |
Overview |
---|---|
TLS Versions seen in the network |
Displays all TLS/SSL versions detected in your network. |
Sessions using Old SSL Versions |
Displays applications and their endpoints that are using deprecated or outdated SSL/TLS versions. |
Weak Ciphers |
Displays weak ciphers in use. |
Key Exchange Protocols seen on the network |
Displays the signature algorithms used in SSL/TLS key exchanges. |
Signature Algorithm |
Displays the signature algorithm used in certificates. |
Cryptographic Hash |
Displays the distribution of SSL/TLS signature hash algorithms. |
Compression Algorithms detected |
Displays various compression methods detected based on HTTP content type. |
Sessions using compression algorithms |
Displays the compression algorithms used per flow by each application. |