The Assets list is where all your assets are displayed, after they are ingested from the various sources, de-duplicated and enriched. There are 4 types of assets in Vulcan, displayed in 4 different tab:

  • Hosts – Infrastructure, physical or virtual machines

  • Code projects – SCA and SAST codebases

  • Websites – DAST scans

  • Images – Image and container scans

 

Hosts

KPIs

At the top of the Hosts page 4 summarizing KPIs are shown:

  • Sources breakdown

  • Scan coverage

  • Vulnerability breakdown by criticality

  • Hosts per OS

Table

The hosts are displayed in a table with the following fields:

  • Name – The host’s name as ingested from the source scanner

  • OS

  • IP

  • Sources – The host’s source platform or scanner

  • Last seen – Last time one of the host’s sources reported on it

  • Vulnerabilities – Total number of vulnerabilities affecting the host

  • Top risk – Criticality of the top riskiest vulnerability affecting the host

  • Tags

 

In addition to free text search, the following parameters are filterable in the Vulnerability list:

  • OS and version

  • IP

  • Sources

  • Tags

 

Code Projects

Table

The Code Projects are displayed in a table with the following fields:

  • Project – The Code Projects’s name as ingested from the source scanner

  • Languages – The coding languages present in the Code Project

  • Sources – The Code Project’s source platform or scanner

  • Last seen – Last time one of the Code Project’s sources reported on it

  • Vulnerabilities – Total number of vulnerabilities affecting the Code Project

  • Top risk – Criticality of the top riskiest vulnerability affecting the Code Project

  • Tags

 

In addition to the free text search, the following parameters are filterable in the Vulnerability list:

  • Sources

  • Tags

 

Websites

Table

The Websites displayed in a table with the following fields:

  • Site name – The Website’s name as ingested from the source scanner

  • Address – The Website’s address

  • Sources – The Website’s source platform or scanner

  • Last seen – Last time one of the Website’s sources reported on it

  • Vulnerabilities – Total number of vulnerabilities affecting the Website

  • Top risk – Criticality of the top riskiest vulnerability affecting the Website

  • Tags

 

In addition to free text search, the following parameters are filterable in the Vulnerability list:

  • Sources

  • Tags

 

Images

Table

The Images are displayed in a table with the following fields:

  • Images – The Image's name as ingested from the source scanner

  • Type – The Image type

  • Path – The Image's path

  • Sources – The Image's source platform or scanner

  • Last seen – Last time one of the Imagae's sources reported on it

  • Vulnerabilities – Total number of vulnerabilities affecting the Image

  • Top risk – Criticality of the top riskiest vulnerability affecting the Image

  • Tags

 

In addition to the free text search, the following parameters are filterable in the Vulnerability list:

  • Sources

  • Tags

Did this answer your question?