Security Posture

The Security Posture dashboard provides insights into active crypto-inventory, ensuring compliance with security policies. It helps identify instances of non-compliance and facilitates corrective actions.

Visualizations

Overview

TLS Versions seen in the network

Displays all TLS/SSL versions detected in your network.

Sessions using Old SSL Versions

Displays applications and their endpoints that are using deprecated or outdated SSL/TLS versions.

Weak Ciphers

Displays weak ciphers in use.

Key Exchange Protocols seen on the network

Displays the signature algorithms used in SSL/TLS key exchanges.

Signature Algorithm

Displays the signature algorithm used in certificates.

Cryptographic Hash

Displays the distribution of SSL/TLS signature hash algorithms.

Compression Algorithms detected

Displays various compression methods detected based on HTTP content type.

Sessions using compression algorithms

Displays the compression algorithms used per flow by each application.