Executive Overview Dashboard
The Executive Overview dashboard offers a holistic view of an organization's application security portfolio, empowering executives to make informed decisions.
The filters are adjusted to display only critical and high vulnerabilities to maintain focus and minimize noise. Additionally, sorting options are available by project, solution, and date.
Applications Rating Score
The Applications Rating Score provides an overview of the overall health of the application portfolio. The following approach is applied to determine the Rating Score:
Bad:
Applications with at least one project containing a Critical severity issue.
Applications where more than 50% of projects have at least one High severity issue.
Poor:
Applications where more than 25% of projects have at least one High severity issue.
Fair:
Applications in which more than 0% and up to 5% of projects have at least one High severity issue.
Good:
Applications with no Critical or High severity issues in any project.
Excellent:
Applications with no Critical, High, or Medium severity issues in any project.
Top vulnerable Applications or Projects
The list of top vulnerable applications highlights the highest concentration of critical vulnerabilities identified through our thorough scanning and analysis. This list is instrumental in prioritizing security efforts, focusing on applications that urgently require attention due to their current vulnerability status.
Clicking the project icon switches the view to a list of top vulnerable projects.
Trend Indicators
Recent changes in the health of each application are indicated at the end of each bar, enabling managers to track progress in mitigating associated risk factors.
Tracking security progress and trends with Over Time chart
The next logical step is to examine the trends graph. While an effective AppSec program encompasses more than remediated vulnerabilities, tracking these trend lines provides valuable insights into process effectiveness. Currently, the overtime graph allows visualization of the number of vulnerabilities divided by lines of code and the total number of vulnerabilities fixed over time.