Vulnerability graphs include related vulnerability based graphs. All of the graphs can be filtered with asset labels and severities.
One of the basic graphs about the current vulnerability distribution is the categorization of the vulnerabilities. So the graph shown below is the distribution of vulnerability categories against severities.
One of the most important graphs to have is the historical trend of vulnerabilities. Are the vulnerability program is at its infancy? Are there any effects of it to the overall security posture? ... All of these questions can be answered the graph below with the ability of zooming to the day granularity!
Vulnerabilities are internally classified into 5 category types; Application related problems, Application Server related problems, Design related problems, Network related problems, OS related problems and DB related problems. The graph shown below is the distribution of these category types against current OPEN vulnerabilities.
NormShield can be fed by several commercial and non-commercial scanners. More importantly manual vulnerabilities... The graph shown below the distribution of this information.
The graph shown below gives insight about the performance of the ratio of new findings. Are we frequently finding vulnerabilities frequently or not? How should any acceleration be read?
The graph shown below is the mitigation mirror of the above trend graph. How are we doing on closing vulnerabilities; slow or on track?
If vulnerability categories are tagged appropriately, then vulnerability group prioritization is possible with the graph shown below. Should we pay specific attention to default password problem or dns related problems?
It is important for a vulnerability management program not only treat symptoms but also, indeed, fix the root causes. In order Normshield to produce a insightful graph below, IT security professionals should assign root causes their vulnerability categories, which is a pretty easy job.