There are many ways to report on your vulnerability data and asset information.
There are many ways you can report on vulnerability data.
Asset Search Report Find hosts based on their attributes then drill down to see host vulnerabilities. |
|
Authentication Report See the authentication status for your scanned hosts. |
|
Compliance Report Identify whether you are compliant with SANS Top 20, Qualys Top 20, and the PCI Data Security Standard. |
|
Consultant Report (Must have Consultant service level) Create reports specific to your customers’ needs. |
|
Map Report View saved maps and identify systems that have been added or removed from your network. |
|
Patch Report Find out the patches you need to apply to fix your current vulnerabilities. Use links to download and install patches. |
|
Remediation Report Get information on remediation tickets like ticket status and overall trend information. |
|
Risk Analysis Determine whether hosts are likely to be at risk to a new vulnerability even before you launch a scan. |
|
Scan Report (template based) Understand the current vulnerabilities on your systems and your security risk. |
|
Scorecard Report Find out about the overall security status of your hosts. |