Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

Efficient Access to Results: Simplifying Test and Scan Data Review

The Results interface on the Platform revolutionizes how you access and interact with test and scanning results. This feature eliminates the cumbersome process of sifting through PDFs, offering a streamlined and user-friendly approach to viewing, searching, and managing your cybersecurity data.

Navigating the Results Interface:

  1. Multiple Viewing Options:

    • By Phase: Explore results segmented by different tests or scans, referred to as ‘phases’.

    • By Issue: Review vulnerabilities identified through your testing and scanning activities.

    • By Asset: Examine results related to specific hardware or software, identifiable by IP address, device name, URL, etc.

  2. Interactive Features:

    • Search Capability: Easily locate specific results using the search function.

    • Comments and Feedback: Directly add comments for your tester and

...

    • engage in collaborative issue resolution.

    • Mark as Remediated: Quickly update the status of issues, marking them as remediated with just a few clicks.

You can view results in three different ways: by Phase, Issue, or Asset.

Click on the links below to learn more.

...

Issues: these are vulnerabilities identified by your tests and scanning activities.

...

Learn More About Each View:

  • Phases/Scans: Understand how projects are broken down and the specific results for each phase.

  • Issues: Get detailed insights into each identified vulnerability and its implications.

  • Assets: Focus on the results pertaining to each tested or scanned asset for targeted analysis.

Streamline Your Cybersecurity Analysis

With the Results interface on the Platform, you gain a powerful tool for efficiently managing and analysing test and scan data. This intuitive interface enables quick access, thorough review, and effective management of cybersecurity results, enhancing your ability to respond to and remediate vulnerabilities.