Welcome BitDam Dashboard
I need to confess – I love data, and I love how data can be turned into insights. Coming from a data analytics and visualization background, I find it super important to make data accessible to my customers. That’s why we’ve spent the last few weeks on creating a new dashboard that analyzes raw data from our system and provides users with actionable insights.
So… I’d like to share with you the highlights of BitDam’s new dashboard:
This is mainly for the IT manager. Here you get a high-level view of BitDam’s system performance and its real-time status in a quick glance. No more digging and inspecting for every small issue. The Overview Page allows you to easily understand the number of scanned emails, malicious files found, the distribution over time and split between file types.
Why do you need this page? Within a few seconds, you can understand the system status, make sure there are no delays and confirm that BitDam works as expected. You can also recognize trends or become aware of hot threats. On the day-to-day you can give it a quick look and move on. If an email is being delayed in the pipeline, you can easily release it. And if your organization is under attack, be assure that you’ll see it right away in the Overview Page.
As a SOC expert, you’ll receive a real-time alert any time that BitDam detects malicious content. But as a SOC expert, you also want to know more when there are malicious emails going around your organization. That’s why we created this page. Here you can check what exactly is going on. In this page you’ll quickly see who’s the sender, who was supposed to receive the malicious email and how many of those emails are out there.
How do you use it? Start with a high-level view of all blocked, clean and released emails ordered by priority. Then drill down easily to further investigate specific email. You can verify that it’s not a False Positive, download the malicious file, extract Indicators of Compromise (IOCs), pinpoint affected mailboxes and more.
At some situation you might want to look at files rather than emails. That’s why we created the Files Page. Here you can perform a variety of actions on files (similar to the ones you’d do in the Emails Page) in order to learn more about the specific attack.
How do you use it? Typically, you will start by having a look at the list of malicious files. From here, you can further investigate specific files, drilling down to how they were delivered and what made BitDam flag them as malicious.
You can also upload files manually for scan on this page. In case you find a suspicious file, or want to compare BitDam’s detection to another solution, you can do it easily from here. You’ll get the scan result with indications on what’s wrong with the file, within a few seconds.