Sample View
Compliance Dashboard
This is what your environment looks like after onboarding — a live, unified view of drift, findings, PSIRT exposure, and framework coverage across every managed device.
Overall Score
Live92/100
Target ≥ 95 · +3 pts from last month
151
Devices Scanned
45
Open Findings
4
Active PSIRTs
8
High Severity
14
Medium Severity
23
Low Severity
Compliance Score Trend — rolling 10 months
Framework Coverage
CIS Benchmarks
82%
Pass
Pass 82
Fail 18
SOC 2 Controls
88%
Pass
Pass 88
Fail 12
NIST 800-53 Families
76%
Pass
Pass 76
Fail 24
Open Findings
45 total · Sorted by severity
High
8
- SNMPv2 community string on 3 IOS-XE devices
- Telnet enabled — FTD firewall cluster
- Management plane unrestricted on 2 FortiGates
- SSH v1 fallback permitted — Meraki MX
Medium
14
- NTP not configured on 6 access-layer switches
- Syslog missing on 4 FortiSwitch devices
- Weak password policy — local accounts on 3 PAN-OS
- Login banner absent — 5 WLC access points
Low
23
- CDP enabled on WAN-facing interfaces (7)
- HTTP redirect not configured on 8 management interfaces
- Hostname format non-standard — 5 switches
- Unused interfaces not shut — 12 devices
Active PSIRT Advisories
Auto-mapped from Cisco, Fortinet, and Palo Alto advisory feeds to affected device inventory.
| CVE / Advisory | Severity | Platform | Devices Affected | Status |
|---|---|---|---|---|
| CVE-2024-20399 | Critical | Cisco IOS-XE | 14 devices | In Progress |
| FG-IR-24-015 | High | FortiGate SSL-VPN | 6 devices | Open |
| CVE-2024-3400 | Critical | Palo Alto PAN-OS | 3 devices | Patched |
| CVE-2023-20198 | Critical | Cisco IOS-XE Web UI | 9 devices | Patched |
| FG-IR-23-097 | Medium | FortiSwitch | 11 devices | In Progress |
Device Coverage by Platform
Cisco IOS-XE
67
Meraki MX/MR
42
Fortinet
24
Palo Alto PAN-OS
18
Want a report like this for your environment?
Book a free 30-minute discovery call — we'll map your current exposure and show you what onboarding looks like.