BeyondTrust

Security in Context: The BeyondTrust Blog

Welcome to Security in Context

Bringing you news and commentary on solutions and strategies for protecting critical IT infrastructure in the context of your business.

The Value of a Dashboard

Posted December 16, 2010    Morey Haber

I have been intrigued by the number of different paradigms used to make up an enterprise solution management console dashboard. Some are more tabular in nature like a SIM and others graphical with little text and fully animated with icons and avatars. When I first started working with enterprise solutions in the mid 1990’s, I worked for Computer Associates on an enterprise framework call Unicenter TNG. The solution used a graphical dashboard based on Business Process Views which where color coded icons used to represent the health and status of business related IT assets. As the framework grew, network maps became a part of the dashboards and color coding and statistics of critical links where present everywhere. Soon, the dashboard became too cluttered to provide valuable information and redesigning it became a regular occurrence for many customers. Some clients even dabbled in a 3D version of the TNG interface that looked like a first person shooter game drilling all the way down to the memory, disk, and CPU of a host.

Today, I am still not certain why anyone would even do that outside of some really cool looking eye candy. Below are a few traits that have stood out to me from the best enterprise dashboards I have seen in my career:

  • Data should be in a summary format and allow drill down to details.
  • Too much data up front just clutters the interface and makes it look and feel more like a report than a dashboard.
  • Eye candy is good for any dashboard as long as it is relevant; too many graphics generally serve no functional purpose.
  • Filtering the data by users, scopes, times and dates is critical to reveal trends and exceptions.
  • Management dashboards by exception always work well, but having the ability to see everything is just as important.

Using these concepts (and many more), eEye has designed Retina CS to expose relevant information at a glance and make reports, errors, and critical findings only a single mouse click away. The value of the dashboard is to ultimately reveal critical status information at a quick glance.  With that in mind, I have posted a few of eEye’s Management Console Dashboards throughout the last six years for a small walk down memory lane. With the recent release of Retina CS 2.0.1, seeing how eEye is meeting current business challenges and providing unique value in our dashboards, will help our customers meet their business requirements with ease.

eEye Retina CS 2.0 Circa 2010:

eEye REM Security Management Console 3.x Circa 2005:

eEye Digital Security. REM Security Management Console 2.x Circa 2004:

Tags:
, , , ,

Leave a Reply

Additional articles

6

A Quick Look at MS14-068

Posted November 20, 2014    BeyondTrust Research Team

Microsoft recently released an out of band patch for Kerberos.  Taking a look at the Microsoft security bulletin, it seems like there is some kind of issue with Kerberos signatures related to tickets. Further information is available in the Microsoft SRD Blogpost So it looks like there is an issue with PAC signatures.  But what…

Tags:
, , , ,
Password Game Show

Managing Shared Accounts for Privileged Users: 5 Best Practices for Achieving Control and Accountability

Posted November 20, 2014    Scott Lang

How do organizations ensure accountability of shared privileged accounts to meet compliance and security requirements without impacting administrator productivity? Consider these five best practices…

Tags:
, , , , , ,
Triggering MS14-066

Triggering MS14-066

Posted November 17, 2014    BeyondTrust Research Team

Microsoft addressed CVE-2014-6321 this Patch Tuesday, which has been hyped as the next Heartbleed.  This vulnerability (actually at least 2 vulnerabilities) promises remote code execution in applications that use the SChannel Security Service Provider, such as Microsoft Internet Information Services (IIS). The details have been scarce.  Lets fix that. Looking at the bindiff of schannel.dll, we see a…

Tags:
, , , , ,