Skip to main content

Overview: Portfolio Analyzer

The basics of the Portfolio Analyzer to quickly orient you on how to pinpoint issues in your book.

Updated over 3 weeks ago

Interactive Guide: Overview: Portfolio Analyzer

1. From the Home screen, select the Pre-Claim Intervention tile.

2. Or select Portfolio Analyzer from the sidebar menu.

3. Or use the Quick Task tile to navigate directly to Portfolio Analysis.

4. The top section of the Portfolio analyzer shows aggregated statistics, highlights, and tools to help you pinpoint potentially harmful attack pathways.

5.

BreachRisk™ Score is the standardized "hacker's perspective" of risk from BreachBits®. A lower number is better.

This tile shows the average BreachRisk™ Score of all entities being monitored.

6.

This portfolio is monitoring 43 companies.

(If you have The Cyber Questionnaire Validator, entities are automatically placed in this monitoring group while they are in the Your Book stage.)

7. The attack surface synopsis shows the total attack surface size of all entities.

8. This pie chart shows a distribution of threat level from the hacker's perspective.

9. Click Portfolio Highlights to quickly see entities with key notable data highlights.

10. The risk chart shows a single dot representing each entity.

11. The position and color of each dot indicates the likelihood and impact according to BreachRisk™ a.i. realistic hacker analysis.

12. Select an entity on the scatter plot to drill down into its breach likelihood and impact and other factors.

13.

Hackers can achieve a breach in one of four categories of attack:

  1. Vulnerability (CVE)

  2. Misconfiguration

  3. Credential-based attack

  4. Social engineering (e.g. email)

14. Attack Surface does not directly contribute to BreachRisk™ Score, but it can be important context that hackers use when planning attacks.

15. Select Details to view the hacker's full report in a new tab.

16. Use Close to exit the detailed company view and return to the main dashboard.

17. Sort by BreachRisk™ Score to analyze companies from highest to lowest risk from the hacker's perspective.

18.

BreachRisk™ Score is based on the most critical, practical attack pathways (Threat Vectors).

This column counts the number of Threat Vectors. More Threat Vectors does NOT mean higher risk.

19. High Risk Threat Vectors counts the number of attack pathways categorized as High Risk.

20. Count of Vulnerability (CVE)-based Threat Vectors

21. Count of misconfiguration Threat Vectors.

22. Count of credential-based Threat Vectors

23. Count of dark web notable mentions.


Did this answer your question?