Latest Dynatrace
Organizations use multiple security products and tools that generate security findings in various data formats. Accessing the data in a siloed approach makes the life of security analysts hard, as they must spend a lot of manual effort generating a combined security posture picture.
In this context
Dynatrace allows you to ingest security findings from your security tools and map them to the Dynatrace semantic conventions, which makes events from different tools uniformly accessible with DQL.
Our dashboard sample lets you quickly view and analyze security findings across products and tools. It can also be a good foundation for tailoring further visual customization to meet your organization's posture analysis and reporting requirements.
Security analysts and managers responsible for analyzing and reporting the organization's security posture.
Your organization uses multiple container image registries, such as
A custom third-party product with custom findings mapping
A custom third-party product is any product for which Dynatrace doesn't provide an out-of-the-box integration. For details on the integration options, see Security events ingest.
You want
With our solution, you can
Visualize your ingested container findings and get an answer to questions like:
Prioritize your ingested container findings based on
Perform more granular queries and analysis of security findings.
Download our sample dashboard from GitHub.
For other security findings beyond container vulnerabilities, download this sample dashboard instead.
Open Dashboards, select Upload, then select the downloaded file.
Example result:
Open Notebooks or Security Investigator to query ingested data, using the data format in Semantic Dictionary.
For a better understanding of how to build your queries, see DQL query examples for ingested events.
Example analysis in Notebooks:
Example analysis in Security Investigator: