The Scan Summary page provides a high-level overview of the security posture of the entire scanned application. It lists key findings allowing you to assess risks at a glance.
The Scan Info section displays essential details about the scan, including Server IP, Scan Time, Scan Type(authenticated or unauthenticated), Tech Stack and other details.
This section helps in understanding the scan’s scope and technical context.
A breakdown of all discovered resources, categorized into:
This provides quick insights into the coverage of the scan and which areas of the application were fully explored.
Two key visual representations help in understanding risk distribution:
These graphs make it easier to pinpoint high-risk areas and determine where immediate attention is required.
This section evaluates how the application aligns with security standards and regulations. It lists major compliance frameworks (e.g., GDPR, HIPAA, ISO27001-A, OWASP, PCI-DSS) and shows how many issues violate each compliance category.
By reviewing this, teams can at a glance see compliance gaps in their application.
A visual score representing SSL/TLS security, analyzing aspects such as Certificate score, Protocol Support, Key Exchange and Cipher Strength.
The Scan Summary consolidates all findings in one place, making it easy to assess an application’s security posture. By reviewing scan details, vulnerabilities, compliance gaps, and SSL health, security teams can quickly understand the security posture of application.
Security teams often struggle to convey technical findings to non-technical stakeholders. The Executive Summary bridges this gap by translating complex security insights into a clear, high-level overview that C-level executives, managers, and decision-makers can quickly understand.
This report provides a 1-2 page concise summary of the application’s security posture, avoiding deep technical details while highlighting key risks, gaps, and recommended actions. It enables leadership to make informed security decisions without needing to sift through detailed scan reports.
The Executive Summary begins with a high-level security overview, providing a general risk assessment along with a breakdown of vulnerabilities categorized by severity—Critical, High, Medium, and Low.
Beyond just listing vulnerabilities, the report quickly goes over all critical findings and gives simple high level understanding and the reason for the vulnerability. This summary is particularly valuable for executives because it saves time by eliminating the need to sift through lengthy technical reports. It helps leadership understand the direct consequences of security risks on operations and customer trust. By offering clear insights on where to invest security resources, it enables strategic decision-making, ensuring that security efforts align with business priorities. Most importantly, it bridges the gap between technical and business perspectives, allowing security teams to communicate risks effectively and ensuring leadership understands the importance of proactive security measures.