New and Improved Uptycs Overview Dashboard

New and Improved Uptycs Overview Dashboard

Short Feature Video


Introduction

We are excited to announce the launch of our new and improved Uptycs Overview Dashboard. In our continuous efforts to enhance your experience and provide you with advanced security analytics, we have invested significant time and resources into developing a more intuitive and powerful dashboard.

This document serves as an introductory guide to the enhanced features and benefits of our new Uptycs Overview Dashboard. The goal is to highlight the value that the new dashboard brings to your organization's security operations.

Uptycs Overview Dashboard

The Uptycs overview dashboard provides a unified view across all telemetry sources i.e cloud, endpoint, and Kubernetes workloads. The enhanced dashboard offers a powerful asset and resource overview, providing a holistic view of your organization's inventory for efficient management. It highlights top vulnerabilities, threats, malware, secrets, and misconfigurations, thus enabling proactive threat identification and resolution. By streamlining the process, the dashboard allows for easy assignment of responsibilities to address potential security threats.

To access the previously available dashboard that focuses on endpoint security, simply navigate to the left side menu and click on "Overview" under the Endpoint section.

Uptycs Overview Dashboard
On the top section of the Uptycs Overview dashboard, you can view the inventory of endpoints, cloud, and Kubernetes workloads.

Below the inventory section, you can view threat intelligence data collected from social media sites. This provides real-time information on emerging threats.

Inventory and Threat Intelligence data

Vulnerabilities

The Urgent Vulnerabilities is a list of the top 20 vulnerabilities across your endpoints, prioritized by the highest CVE scores. The widget allows you to quickly access the list of Assigned, Unassigned, Open, and Total vulnerabilities by clicking on the corresponding filters.

From this prioritized list, you have the flexibility to assign vulnerabilities to users, modify due dates, close issues, or adjust scores effortlessly. Clicking on a vulnerability link seamlessly navigates you to the corresponding CVE in Uptycs, ensuring a seamless and streamlined vulnerability management experience.

Urgent Vulnerabilities and Trends

On the right side of the dashboard, you can easily track the top Trending Vulnerabilities, which are gaining traction in the cybersecurity community. This feature empowers you to identify and mitigate potential risks before they escalate. By clicking on a trending vulnerability link, you can navigate to the CVE database, gaining valuable insights and taking informed actions.


Threats & Malware

The Threats & Malware widget allows you to quickly access the list of Assigned, Unassigned, Open, and Total threats and malware across your cloud, endpoints, and Kubernetes workloads. The list of the top 20 threats and malware across your assets are prioritized by their severity scores. From the top 20 threats and malware list, you can assign a threat or malware to a user, change the due date, close, or change its score.

Threats and Malware

On the right, you can also view a list of top Trending Threats and Malware that are gaining traction in the cybersecurity community. This enables you to stay ahead of rising threats and malware, and proactively mitigate potential risks.


Secrets & Private Keys

The Secrets and Private Keys widget presents a comprehensive list of vulnerable or exposed secrets and private keys across your assets. Prioritized by their severity scores, this list highlights critical security risks within your environment.


Secrets and Private Keys

Click View All to view the list in a separate tab where you can filter the list, assign to a user, change the due date, close it, or change its score.


Misconfigurations

The Misconfigurations widget presents a comprehensive list of misconfigurations within your cloud and Kubernetes workloads, emphasizing potential vulnerabilities. Prioritized by their severity score, this list offers a focused view of misconfigurations across your workloads.

Misconfigurations

Click View All to view the list in a separate tab where you can filter the list, assign it to a user, change the due date, close it, or change its score.

For additional details and documentation, please refer to the help section of Uptycs Portal.

    • Related Articles

    • New and Improved AWS Overview Dashboard

      Short Feature Video Introduction We are excited to announce the launch of our new and improved AWS Overview Dashboard. In our continuous efforts to enhance your experience and provide you with advanced security analytics, we have invested significant ...
    • Uptycs Cloud 146 Release Notes

      Disclaimer: This document is for information purposes only. It is subject to change due to ongoing product development by Uptycs. You should not interpret this information as a binding commitment from Uptycs. Without prior written consent from ...
    • Uptycs Cloud 147 Release Notes

      Disclaimer: This document is for information purposes only. It is subject to change due to ongoing product development by Uptycs. You should not interpret this information as a binding commitment from Uptycs. Without prior written consent from ...
    • Uptycs Cloud 148 Release Notes

      Disclaimer: This document is for information purposes only. It is subject to change due to ongoing product development by Uptycs. You should not interpret this information as a binding commitment from Uptycs. Without prior written consent from ...
    • Uptycs Cloud 144 Release Notes

      Uptycs Cloud 144 Release Notes Disclaimer: This document is for information purposes only. It is subject to change due to ongoing product development by Uptycs. You should not interpret this information as a binding commitment from Uptycs. Without ...