Dashboard
The hub dashboard gives you a high-level
view of your network activity over the past 30 days. If you’re using
the Prisma suite of products—Prisma Access, Prisma Cloud, and Prisma
SaaS—the hub dashboard is especially useful; it shows your users,
applications, and cloud resources at a glance.
The data you see depends on the apps and services you use. Most
widgets include a link that takes you directly to Explore or the associated app (such
as Prisma SaaS) where you can get more context and interact with
the data. The Summary and Industry Comparison widgets combine data
from a few different apps, so that you can quickly get a sense of
the state of your network security, and how your security posture
compares to your industry peers.
This widget: | relies on this app or service: | and shows these findings: |
---|---|---|
Summary |
| Overall network takeaways from different
apps:
|
Industry Comparison |
| Your SaaS security posture, as compared
to other companies in your industry:
|
SaaS | ||
App Overview | Prisma Access | The total number of apps in use on your
network, including your sanctioned SaaS apps, your unsanctioned
apps, and your non-SaaS apps. |
Apps with Poor Characteristics | Prisma Access | Your SaaS apps with unfavorable hosting characteristics. Click
a characteristic to see the top three applications with that characteristic. Toggle
between Count (to see the apps with the most users) and Usage (to
see the apps with the most traffic). |
SaaS Exposure Summary | Prisma SaaS | The number of asset violations and their
level of exposure (public, external, company, or internal). |
Exposure by Content Type | Prisma SaaS | The types of sensitive content that are
most exposed or at risk in your network. (Learn more about Prisma SaaS Predefined Data Patterns and how
they detect data risks and violations). |
Network | ||
Threats | Prisma Access | An overview of the threats in your network
shows the total numbers of malicious files, URLs, and domains your users
accessed. |
Apps Using Non-Standard Ports | Prisma Access | The riskiest applications (most likely to
be used as part of a cyberattack) that are running on non-standard
ports. Applications running on unusual ports can indicate
that an attacker is attempting to circumvent traditional port-based
protections. |
Cloud | ||
Summary (cloud section) | Prisma Cloud | The number of GCP, AWS, and Azure accounts,
as well as the number of workloads (Resources) you’re monitoring, by
provider. |
Alerts | Prisma Cloud | Prisma Cloud alerts from the last 30 days,
based on severity. Prisma Cloud continually monitors your
cloud environments to detect misconfigurations, advanced network threats,
stolen access keys or account compromise, and vulnerable hosts.
Alert severities are based on the policy violation that occurred,
the impact to business, and the anomalous behavior that took place. |
Compliance | Prisma Cloud | Your compliance posture at a glance. For
the compliance standards listed (for example, HIPPA), you can see
the number of resources that either adhere to or do not pass compliance.
Ideally, the number of resources passing compliance will increase
over time, and the number of failed resources will decrease. |
Most Popular
Recommended For You
Recommended Videos
Recommended videos not found.