Software Vulnerability Insights
This report offers a robust multi-page framework for analyzing and managing vulnerabilities, threats, and lifecycle risks across an organization.
Whether you are conducting vulnerability assessments, responding to security incidents, or planning for future enhancements, this report serves as your comprehensive solution for managing vulnerabilities and strengthening your organization's cybersecurity defenses.
Software Vulnerability Insights Report Pages
This report includes the following pages:
Page Name |
Details |
Vulnerability Exposure & Threat Exploit Summary |
Provides a high-level view of installs with vulnerabilities, risk levels, attack vectors, CVE counts, and categorization. |
Technology Currency & Threat Summary |
Highlights lifecycle currency data tied to vulnerabilities by CVE publish date and category. |
Most Affected Software & Devices |
Details vulnerabilities by manufacturers, top devices, and software products, with drill through for device-specific CVE details and software impacts. |
CVE Publish Timeline |
Tracks CVEs by publication year/month alongside associated risks, criticality, and affected versions. |
Domain & Malware Exposure |
Maps vulnerabilities to malware and domain exploit risks, showing affected installs and versions. |
Business Services & Other Exposures |
Links vulnerabilities to Business services, Business units, locations, and cost centers, with lifecycle stage details. |
Secunia Security Advisory Summary |
Covers zero-day vulnerabilities, advisory publish timelines, and newly discovered software vulnerabilities. |
Solution Status & Threat Summary |
Breaks down vulnerabilities by Solution (e.g., unpatched, partially fix, vendor patched, vendor workaround) with associated risks and criticalities. |
Recommended Software Upgrades |
Identifies top installs requiring updates, CVE scores, and actionable recommendations, with drill throughs to specific upgrade paths. |
Vulnerability Explorer |
An interactive exploration page for filtering vulnerabilities by exploitability, impact metrics, and Base severity. |
Vulnerability Trends |
Tracks trend over the last 7 days, weekly and monthly for the vulnerabilities and CVE in your environment. |
This report includes drill through functionality on all pages to the Vulnerability Details page, enabling granular views of device and software-level information along with tailored recommendations. An additional filter enables you to identify vulnerabilities in your environment that have been exploited in the wild (EITW). Also, an additional column on the Device Details drill through page identifies devices lacking protection from security software such as antivirus, antimalware, or Endpoint Detection and Response (EDR) solutions.