Security Visibility Visualizations

Interactive visualizations to understand security coverage and detection capabilities

Threat Visibility Heatmap
Visualize coverage effectiveness by log source and threat category

Coverage Legend

Strong Coverage
Moderate Coverage
Limited Coverage
Log SourceInitial AccessExecutionPersistencePrivilege EscalationDefensive EvasionCredential AccessDiscoveryLateral MovementCollectionCommand ControlExfiltrationImpact
Network Devices
3
1
1
1
2
1
2
3
1
3
3
2
Endpoint Security
2
3
3
3
3
3
3
2
3
2
2
3
Identity & Access
2
1
2
3
2
3
2
2
1
1
1
1
Cloud Infrastructure
2
2
2
3
2
2
2
1
2
1
2
2
Email Security
3
2
1
1
2
2
1
1
1
2
2
1
Packet Inspection
2
2
1
1
2
2
2
2
1
3
3
1
Operating System
2
3
3
3
3
3
3
2
2
1
1
3
Application Logs
2
2
2
2
2
3
2
1
3
1
2
2
SaaS Applications
2
1
2
2
1
2
2
1
3
1
3
2
DNS Infrastructure
1
1
1
1
1
1
2
1
1
3
2
1

This heatmap visualizes the effectiveness of different log sources in providing visibility into various threat categories based on the MITRE ATT&CK framework.