Generic selectors
Exact matches only
Search in title
Search in content
post
page
How can we help?
Print

Network Risk Assessment

supported products bannerNetwork risk assessment provides the Networking Team and Audit Team with capabilities that allows users to:

  • Assess correctness of network segmentation
  • Identify risky network connectivity paths
  • Understand exposure of vulnerable assets

 

Network Segmentation Accuracy

NP-View be used to verify the accuracy of your network segmentation.

The connectivity matrix can be used to verify open ports between devices.

connectivity matrix

Inbound and outbound connections can be verified for each network using the highlight paths function.

 

Identifying Risky Connectivity Paths

Using industry best practices, Network Perception automatically identifies potential risks related to network configurations. Using the Network PerceptionĀ  Connectivity Path analysis, the user can review each of the highlighted risks and make a judgment on action.

organization table

 

Exposure of Vulnerable Assets – Vulnerability Analytics

NP-View provides your security team with a single pane of glass for reviewing network vulnerability exposure. With the addition of scanner data or data from a vulnerability data service, vulnerabilities can be tracked across your network.

In NP-View vulnerabilities are displayed in a few places.

 

Topology Display of Vulnerabilities

When scanned data has been added to a workspace, and a topology view is built that also includes that scan data, nodes on the topology of that view will be marked with a shield indicating the presence of vulnerabilities. These shields can be toggled on and off using the topology settings menu.

 

Device Panel Display of Vulnerabilities

Firewalls, Gateways, and Hosts may contain vulnerability and service information imported from scans. Clicking on any of these nodes in a View that contains vulnerability information, will display it in the info panel that opens over the main menu.

 

Previous Architecture Review
Next Continuous Configuration Monitoring
Table of Contents