• Plot the data on a variety of graph types from line, bar, area, spline, pie, etc. • Choose the time range to for consideration • Choose both the x and y axis from all applicable data sets • Filter the data based on the results collected • Sort the data on any column in the customized report • Save the customized template for later use or export to another systemThese sound reasonable; right? Well in reviewing the tool sets from my competitors I have found very few, if any, that actually allow detailed customizable reporting let alone to the granularity we just outlined. So how do most people get the reports they need? If the vendor publishes the database schema or the user is amicable to writing scripts, then using third party tools, and some labor, is the only way to extract the information you need. If you are new to Unified Vulnerability Management or do not want to build your own custom reports from scratch, you should consider Retina CS and Retina Insight. Retina Insight contains a feature called the “Pivot Grid” that allows you to build custom historical reports based on almost every piece of data collected by the solution. In fact, it allows you to build reports and charts exactly the way you want them in order to meet virtually any business requirement. Consider the sample screenshot below: Key systems have been filtered (and masked in the sample) in the database using a simple UI filter and a step chart created summarizing the total number of vulnerabilities compared to which are zero days (1 for True) and which are published and patchable (0 for Zero Day False). Essentially, the user has created a custom chart far beyond a standard VA plot to highlight which critical systems have zero day threats and how they compare to the total number of published and patchable vulnerabilities per system. If this was a sensitive environment housing (PHI, PAN, etc.) information I would be thinking in the back of my mind about Advanced Persistent Threats since many of the vulnerabilities (and a few distributed zero day vulnerabilities) are systems that are critical to my business and how I can mitigate both types promptly regardless of patch availability. Customizable reporting can be performed just the way you like it within eEye solutions. For more information on Retina Insight, please click here. eEye has taken years of experience and recommendations from our clients and built a Unified Vulnerability Management solution that can meet your customized reporting and vulnerability assessment needs. Now is the time to look at eEye.
Morey J. Haber, Chief Security Advisor
Morey J. Haber is the Chief Security Advisor at BeyondTrust. As the Chief Security Advisor, Morey is the lead identity and technical evangelist at BeyondTrust. He has more than 25 years of IT industry experience and has authored four books: Privileged Attack Vectors, Asset Attack Vectors, Identity Attack Vectors, and Cloud Attack Vectors. Morey has previously served as BeyondTrust’s Chief Security Officer, Chief Technology, and Vice President of Product Management during his nearly 12 year tenure. In 2020, Morey was elected to the Identity Defined Security Alliance (IDSA) Executive Advisory Board, assisting the corporate community with identity security best practices. He originally joined BeyondTrust in 2012 as a part of the acquisition of eEye Digital Security, where he served as a Product Owner and Solutions Engineer, since 2004. Prior to eEye, he was Beta Development Manager for Computer Associates, Inc. He began his career as Reliability and Maintainability Engineer for a government contractor building flight and training simulators. Morey earned a Bachelor of Science degree in Electrical Engineering from the State University of New York at Stony Brook.