Video: How to modify out-of-the-box dashboards

circle
circle

The purpose of the JupiterOne Dashboards is to have a centralized set of dashboards that can be used by your security team to view, edit, and share with all teams in your organization in a single, consolidated view.

Jayson Jensen looks at four, key out-of-the-box dashboards that will give you better visibility into your cyber assets. He walks through the dashboards in their default states, and then shows how to modify the dashboards for your particular use case.

Dashboards featured

  1. Vulnerability Reporting
  2. Applications at Risk
  3. User End Points
  4. Development Dashboard

Resources

 

avatar

Posted By Jayson Jensen

I spent 4+ years doing technical consulting for enterprise clients in the automobile and tax preparation services industries. During this time I gained experience across product, business, and technical domains while performing the functions of a Software Developer, Business Architect, and Product Architect. As a Customer Success Engineer for JupiterOne, I support customers by helping them understand the value of being able to query and visualize the relationships across the security domain which includes cloud infrastructure, network security, endpoint management, identity and access management, vulnerability management, and more. I enjoy everything outdoors, from Spartan races, to scuba diving, to hiking.

To hear more from Jayson, get our newsletter. No spam, just the good stuff once or twice a month. Sign up below.

PREVIOUS ARTICLE

cyber-security 1

Ad Title Placeholder

Lorem ipsum dolor sit amet, consectetur adipiscing elit.