ThreatKey, a cloud-based security platform, excels at identifying and helping you mitigate security risks in your environment. The core of the ThreatKey platform is what we call "Findings." These are representations of the security risks that ThreatKey has identified in your environment. This guide will help you understand how to receive and interpret these findings.
How to receive findings
Upon identifying a security risk in your environment, ThreatKey generates a finding and sends it to your designated channel. This could be your email, a chat platform (like Slack or Microsoft Teams), a project management tool (like Jira), or any other destination that you have configured in your ThreatKey settings.
Understanding your findings
Each finding sent by ThreatKey provides comprehensive details about a security risk. The information generally includes:
- Summary: A brief description of the identified risk.
- Severity: The level of risk, usually categorised as Low, Medium, High, or Critical.
- Affected Resources: Details about which systems or data are at risk.
- Details: Additional information that supports the identified risk.
- Remediation Steps: Recommended actions to mitigate the risk.
If you have questions about receiving findings, or if you need help understanding the findings, don't hesitate to reach out to our support team at firstname.lastname@example.org or via our live chat. They're always ready to assist you.
Start leveraging ThreatKey's findings today to proactively enhance your environment's security.