Cyber Monitoring
Navigation to Cyber Monitoring
This will then redirect you to the dashboard as seen below.
Here you will see the 6 modules:
- Cyber Incident Management (SIEM and XDR)
- Cloud Security Posture Management (CSPM)
- Endpoint Detection and Response (EDR, MDR)
- Security Orchestration, Automation and Response (SOAR)
- User and Entity Behavior Analysis (UEBA)
- Threat Intelligence (TI)
By clicking on their icons, you will be redirected to the modules' "Main Page" section.
Below the modules, you will find the overview.
Average Key Risk Indicator (KRI) Changes
Understanding the volume of digital assets within your environment is fundamental to managing cyber risk. The total number of assets reflects the scale of your digital footprint and highlights potential vectors for exploitation. By quantifying these assets, organizations gain clarity on how broad their exposure surface truly is. This visibility allows teams to prioritize defenses, allocate resources effectively, and reduce blind spots. Recognizing the scope of what’s connected is the first step toward controlling it.
CSPM Rank
Understanding the state of your cloud security is critical. The Cloud Security Posture Management (CSPM) score provides a quantifiable snapshot of how securely your cloud environments are configured. It reflects alignment with established best practices and recognized security standards, offering a clear benchmark for posture maturity. By highlighting deviations, gaps, or misconfigurations, the score empowers teams to prioritize remediation efforts based on risk impact. This metric doesn’t just inform—it drives accountability and continuous improvement, giving organizations the visibility needed to evolve with confidence in an ever-changing threat landscape.
Cases
This section showsprovides thea comprehensive overview of your casesactive and historical cases. It is designed to helpassist you prioritize.in quickly assessing the status and urgency of each case, enabling effective prioritization and informed decision-making.
This showsmetric howdisplays manthe number of days have passedelapsed since the lastmost recent detection of high or critical-level monitoring alerts. A shorter durationinterval may indicatesignal persistentthe presence of ongoing or recentrecently seriousemerged significant threats.
This displayssection thepresents distributiona visual breakdown of active cases basedcategorized onby severity levelslevels: (Severe, High, Elevated, Guarded, and Low)Low. ThisThe helpsdistribution prioritizeprovides a clear snapshot of the current threat landscape and assists in the prioritization of response efforts basedaccording onto urgency.the urgency of each case.
This showssection displays the totalcumulative numbercount of open cases groupedcategorized by their current stage within the Threat Escalation Protocol (TEP). stages.It Thisprovides alsoa indicatesclear overview of how individual threats are progressingadvancing through the definedstructured escalation process.process, enabling efficient tracking and management of threat progression.
Log Sources
This section showsprovides thea consolidated overview of yourall configured log sourcessources. Its primary purpose is to helpassist youusers prioritize.in assessing the current log ingestion landscape, enabling effective prioritization of monitoring, investigation, and resource allocation efforts.
This section presents the total count of endpoints currently managed by Endpoint Detection and Response (EDR) agents. It also provides a real-time status breakdown, indicating how many endpoints are online and how many are offline.
This section presents the distribution of collected log data categorized by individual source. It serves as a valuable reference for identifying the most active log-generating systems. Understanding this distribution is essential for optimizing data flow, resource allocation, and maintaining efficient log management practices.
This shows the total volume of logs collected daily, measured against allocate capacity. Helps manage storage utilization and detect unusual log activity.
This section displays a comprehensive list of all installed log collectors, along with the agents associated with each log collector.