Zero Trust

Zero Trust dashboards provide real-time visibility into user access, applications, and network activity, ensuring continuous verification and proactive threat detection. It tracks compliance issues, flags security anomalies, and strengthens risk mitigation within the Zero Trust framework.

Visualizations

Overview

All Applications

Displays the distribution of applications based on endpoint activity.

Sanctioned Apps

Displays approved applications that comply with security policies.

Unsanctioned Apps

Displays unauthorized or potentially risky applications running on the network.

Ex: bittorrent, gnutella,bitcoin etc

Endpoints using Apps not allowed

Displays the endpoints of unsanctioned apps, providing visibility into unauthorized applications in the network.

Presence of unauthorized apps on the network

Displays data transmission details for unauthorized apps, showing when and how much data, they send or receive over a specific period to facilitate the detection of suspicious activity.

Ports not Allowed

Displays the list of unnecessary open ports.

Allowed Ports

Displays the list of allowed Ports to ensure compliance with predefined port security policies.

Micro-Segmentation Verification

Provides data to analyze traffic segmentation and confirm policy enforcement.

4xx Error Frequency

Displays HTTP error codes, where a high frequency of 4xx errors from a specific host or endpoint may suggest attempts to access unauthorized resources.

4xx Error count

Displays the 4xx Error Count to quantify the total number of 4xx errors encountered, helping investigate failed access attempts.

Sessions with 4xx errors

Displays sessions with 4xx errors, helping to ensure that only authorized users can access sensitive resources.

Expired TLS Certs

Displays the list of expired SSL/TLS certificates.

TLS Versions

Displays the distribution of applications based on the SSL/TLS versions in use.

Weak Ciphers

Displays the list of weak cipher suites in use.

Sessions with Old SSL versions

Displays the list of sessions with old SSL/TLS version such as SSLv3, SSLv2.

Port spoofing Activity

Displays the Port Spoofing Activity to detect attempts to impersonate legitimate ports for malicious purposes.

DNS tunneling

Displays DNS activity details, aiding in the detection of suspicious behavior and enhancing network visibility.

DNS queries for suspicious domain

Displays the list of DNS queries for suspicious domains.

Identity and Access Management (IAM)

Provides insights into user authentication, role assignments, and access controls.

Top User Logins

Displays the list of top user logins to track frequently logged-in users, ensuring visibility.

User Access

Displays the data of user access to analyze and monitor permissions granted to users.