The Assets list is where all your assets are displayed, after they are ingested from the various sources, de-duplicated and enriched. There are 4 types of assets in Vulcan, displayed in 4 different tab:

  • Hosts – Infrastructure, physical or virtual machines
  • Code projects – SCA and SAST codebases
  • Websites – DAST scans
  • Images – Image and container scans

 

Hosts

KPIs

At the top of the Hosts page 4 summarizing KPIs are shown:

  • Sources breakdown
  • Scan coverage
  • Vulnerability breakdown by criticality
  • Hosts per OS

Table

The hosts are displayed in a table with the following fields:

  • Name – The host’s name as ingested from the source scanner
  • OS
  • IP
  • Sources – The host’s source platform or scanner
  • Last seen – Last time one of the host’s sources reported on it
  • Vulnerabilities – Total number of vulnerabilities affecting the host
  • Top risk – Criticality of the top riskiest vulnerability affecting the host
  • Tags

 

In addition to free text search, the following parameters are filterable in the Vulnerability list:

  • OS and version
  • IP
  • Sources
  • Tags

 

Code Projects

Table

The Code Projects are displayed in a table with the following fields:

  • Project – The Code Projects’s name as ingested from the source scanner
  • Languages – The coding languages present in the Code Project
  • Sources – The Code Project’s source platform or scanner
  • Last seen – Last time one of the Code Project’s sources reported on it
  • Vulnerabilities – Total number of vulnerabilities affecting the Code Project
  • Top risk – Criticality of the top riskiest vulnerability affecting the Code Project
  • Tags

 

In addition to the free text search, the following parameters are filterable in the Vulnerability list:

  • Sources
  • Tags

 

Websites

Table

The Websites displayed in a table with the following fields:

  • Site name – The Website’s name as ingested from the source scanner
  • Address – The Website’s address
  • Sources – The Website’s source platform or scanner
  • Last seen – Last time one of the Website’s sources reported on it
  • Vulnerabilities – Total number of vulnerabilities affecting the Website
  • Top risk – Criticality of the top riskiest vulnerability affecting the Website
  • Tags

 

In addition to free text search, the following parameters are filterable in the Vulnerability list:

  • Sources
  • Tags

 

Images

Table

The Images are displayed in a table with the following fields:

  • Images – The Image's name as ingested from the source scanner
  • Type – The Image type
  • Path – The Image's path
  • Sources – The Image's source platform or scanner
  • Last seen – Last time one of the Imagae's sources reported on it
  • Vulnerabilities – Total number of vulnerabilities affecting the Image
  • Top risk – Criticality of the top riskiest vulnerability affecting the Image
  • Tags

 

In addition to the free text search, the following parameters are filterable in the Vulnerability list:

  • Sources
  • Tags
Did this answer your question?