Security threat management is a big field for enterprise dashboard-style user interface presentation. Here we take a look at a management dashboard from a security portal thats takes a true “At-a-glance” approach to the most significant threat possibilities facing an enterprise’s computer networks. Many of the dashboard’s “portlets” are graphically based. The text-based ones all contain drill-down links to the relevant details. Security threat metrics include: incident and exposure trends, top monitored security events, incident to event ratios, top targeted hosts, top vulnerable applications, top scan exposures, security intelligence trends (reports of threats in the wild), etc.
Homework: It’s easier to defend the fortress from outsiders and much harder to contains threats from within. Take a look at Enemy at the Water Cooler: Real-Life Stories of Insider Threats and Enterprise Security Management Countermeasures.
So who is the Dashboard Spy? No one really knows, but his growing collection of enterprise dashboard screenshots has captured the imagination of the executive dashboarding community. From excel dashboards and custom-built business scorecards, to xcelsius and flex-based visualizations, the dashboard screenshots at dashboardspy.com serve both as nuggets of inspiration and warnings of what not to do on an enterprise dashboard. These hits and misses will enlighten and entertain. Technology-neutral, and always business-driven, the Dashboard Spy website is the place to go to learn about the latest enterprise dashboard packages. Check out the Dashboard Spy’s latest recommended book, Information Dashboard Design: The Effective Visual Communication of Data.