The Executive Dashboard
The Executive Dashboard provides reports and metrics with persistence of vulnerabilities and correlation with other applications and projects. This dashboard provides not just average remediation time, but many other analytics and trends to monitor and report the overall security health for a complete application security footprint. To access this tab:
-
From the main Sentinel menu, select Summary.
-
From the tabs displayed, select the Dashboard tab.
-
From the dropdown list highlighted above, choose Executive.
-
Select which asset type that you want to see analytics displayed for: Sites or Applications.
It should be noted that API asset analytics are currently incorporated into analytics in Sites. -
From the dropdown highlighted, select whether you want to display All Assets, or only a specific asset group.
-
Optionally you can export the dashboards to PDF or CSV files.
Overview of Executive Dashboard

Field No. | Field Name | Description | ||
---|---|---|---|---|
1 |
Total and Open Vulnerabilities |
This summarizes vulnerabilities currently open and closed over the lifetime of the asset. The following is displayed:
|
||
2 |
Vulnerability Trends |
The Trend - Vulnerabilities table displays your closed vulnerabilities, new vulnerabilities, and total open vulnerabilities month by month. This will illustrate your improvement over time and will show up to twelve (12) months of data.
EXAMPLE: In the table above, the month of March shows:
Below the Trend - Vulnerabilities table, you will see the Trend - Open Vulnerabilities line chart, which breaks out open vulnerabilties by severity. Also you will see the Trend - Remediation bar chart showing vulnerabilities opened against vulnerabilities closed. |
||
3 |
Site Status (If the Applications option is selected at the top of the screen, this will be named Application Status) |
Asset status will show the total count for your assets (either sites or applications). For site assets (as displayed in the image above), you will see a summary of how many sites are within each service plan (BE, SE, or PE) and how many still need to have credentials or scan schedules set. In the example above, 17 sites need credentials, and 13 require schedules.)
For application assets (see image below), you will see the applications requiring repository configuration, the total needing a schedule set and also the total that have completed their initial scan. ![]() |
||
4 |
Vulnerability Statistics |
Vulnerability Statistics show the average age of vulnerabilities by severity and the time it has been taking to remediate them. (The average time to fix is the average of date closed minus date opened and only includes vulnerabilities that have a closed date.)
|
||
5 |
Most Common Vulnerabilities |
This displays your most common vulnerability classes, sorted by the number of open vulnerabilities in that class. |
||
6 |
Most Vulnerable Assets |
This displays your most vulnerable assets (either Sites or Applications). These are the assets with the greatest number of urgent or critical vulnerabilities, sorted by number size. |