Zero Trust
Zero Trust dashboards provide real-time visibility into user access, applications, and network activity, ensuring continuous verification and proactive threat detection. It tracks compliance issues, flags security anomalies, and strengthens risk mitigation within the Zero Trust framework.
Visualizations |
Overview |
---|---|
All Applications |
Displays the distribution of applications based on endpoint activity. |
Sanctioned Apps |
Displays approved applications that comply with security policies. |
Unsanctioned Apps |
Displays unauthorized or potentially risky applications running on the network. Ex: bittorrent, gnutella,bitcoin etc |
Endpoints using Apps not allowed |
Displays the endpoints of unsanctioned apps, providing visibility into unauthorized applications in the network. |
Presence of unauthorized apps on the network |
Displays data transmission details for unauthorized apps, showing when and how much data, they send or receive over a specific period to facilitate the detection of suspicious activity. |
Ports not Allowed |
Displays the list of unnecessary open ports. |
Allowed Ports |
Displays the list of allowed Ports to ensure compliance with predefined port security policies. |
Micro-Segmentation Verification |
Provides data to analyze traffic segmentation and confirm policy enforcement. |
4xx Error Frequency |
Displays HTTP error codes, where a high frequency of 4xx errors from a specific host or endpoint may suggest attempts to access unauthorized resources. |
4xx Error count |
Displays the 4xx Error Count to quantify the total number of 4xx errors encountered, helping investigate failed access attempts. |
Sessions with 4xx errors |
Displays sessions with 4xx errors, helping to ensure that only authorized users can access sensitive resources. |
Expired TLS Certs |
Displays the list of expired SSL/TLS certificates. |
TLS Versions |
Displays the distribution of applications based on the SSL/TLS versions in use. |
Weak Ciphers |
Displays the list of weak cipher suites in use. |
Sessions with Old SSL versions |
Displays the list of sessions with old SSL/TLS version such as SSLv3, SSLv2. |
Port spoofing Activity |
Displays the Port Spoofing Activity to detect attempts to impersonate legitimate ports for malicious purposes. |
DNS tunneling |
Displays DNS activity details, aiding in the detection of suspicious behavior and enhancing network visibility. |
DNS queries for suspicious domain |
Displays the list of DNS queries for suspicious domains. |
Identity and Access Management (IAM) |
Provides insights into user authentication, role assignments, and access controls. |
Top User Logins |
Displays the list of top user logins to track frequently logged-in users, ensuring visibility. |
User Access |
Displays the data of user access to analyze and monitor permissions granted to users. |