Overview
The DeepTraQ dashboard is the central workspace for managing security scans, monitoring vulnerabilities, and tracking assets across your environment.
The platform is organized into modules that cover different parts of the attack surface, including web applications, cloud workloads, source code, and network infrastructure. Each module follows a consistent layout to ensure a familiar user experience across the platform.
From the dashboard, users can:
- Launch new security scans
- Monitor vulnerabilities across modules
- Access AI-powered security assistance
- Manage assets and environments
- Configure account and subscription settings
Navigation Structure
The primary navigation menu provides access to all major areas of the platform.
Vulnerability Management
The Vulnerability Management section contains scanning modules for different types of assets. All modules follow a similar interface and workflow to maintain consistency.
Available modules include:
- Cloud Workload
- Web Application
- CSPM (Cloud Security Posture Management)
- Code Scanning
- Network Perimeter
Each module allows you to:
- Create and manage scans
- Monitor scan progress
- Review vulnerability findings
- Track remediation efforts
Because the modules share a consistent interface, users can easily switch between scanning environments without learning a new workflow.
Creating New Scans
At the top-right corner of the dashboard, you will find the Create Scan button.
This button allows you to quickly launch new scans across any supported module.
Typical workflow:
- Click Create Scan
- Select the scan type
- Configure scan settings
- Launch the scan
This shortcut allows users to initiate scans without navigating through individual modules.
AI Agent
The AI Agent is an intelligent assistant designed to help analyze vulnerabilities and accelerate remediation workflows.
The AI Agent can assist with:
- Explaining vulnerability findings
- Providing remediation guidance
- Generating patch scripts
- Assisting with root cause analysis
- Answering security-related queries
This enables faster investigation and decision-making during vulnerability management.
Unified Findings
The Unified Findings view aggregates vulnerabilities discovered across all scanning modules into a single dashboard.
This allows security teams to review vulnerabilities from:
- Web applications
- Cloud workloads
- Source code repositories
- Network infrastructure
- Cloud resources
Unified Findings helps teams:
- Prioritize risks across environments
- Track vulnerabilities in one place
- Reduce context switching between modules
- Manage remediation centrally
Asset Inventory
The Asset Inventory provides a centralized view of all discovered IT assets across your organization.
This acts as a cybersecurity asset management dashboard, helping security teams understand their entire attack surface.
Assets that may appear in the inventory include:
- Web applications
- Cloud workloads and resources
- Network perimeter devices such as firewalls
- Code repositories
- Programming languages and libraries
- Open source dependencies
- Infrastructure components
By consolidating assets into a single inventory, DeepTraQ helps organizations maintain full visibility into their technology stack and associated security risks.
Viewing Vulnerability Results
After running a scan within any module, DeepTraQ provides a results interface for analyzing discovered vulnerabilities.
Most modules share a common set of result tabs, ensuring a consistent experience across:
- Web Application scans
- Cloud Workload scans
- CSPM scans
- Code scans
- Network Perimeter scans
Common Result Tabs
Summary
The Summary tab provides a high-level overview of the scan results.
Information typically includes:
- Total vulnerabilities detected
- Severity distribution
- Scan metadata such as execution time
- Overall risk posture of the scanned asset
This tab provides a quick snapshot of security exposure.
Vulnerabilities
The Vulnerabilities tab contains the full list of identified security issues.
Each vulnerability entry typically includes:
- Vulnerability name
- Severity level
- Affected asset or component
- Technical description
- Recommended remediation steps
This is the primary view used by security teams to investigate and prioritize issues.
History
The History tab tracks scan results over time.
This allows users to:
- Compare current and previous scans
- Track remediation progress
- Identify newly introduced vulnerabilities
Historical tracking helps teams monitor improvements in security posture.
AI Reports
The AI Reports tab provides AI-generated analysis of scan findings.
These reports convert technical vulnerability data into structured insights, such as:
- Risk summaries
- Impact explanations
- Remediation guidance
- Executive-level summaries
AI reports help both technical teams and leadership understand security risks quickly.
Module-Specific Views
Some scanning modules provide additional views that are specific to the type of asset being analyzed.
Examples include:
- Network Topology – Visual representation of discovered network infrastructure and connectivity
- Attack Path Analysis – Visualization of potential attack paths across vulnerable systems
- Cloud Resource Views – Detailed analysis of cloud resources and misconfigurations
These specialized views provide deeper context for complex environments and help security teams better understand potential attack surfaces.
Profile and Account Settings
Clicking the profile icon in the top-right corner opens a sliding panel that provides access to account and platform settings.
Available options include:
- My Account – Manage personal profile information
- IAM (Identity and Access Management) – Manage users, roles, and permissions
- MFA (Multi-Factor Authentication) – Configure additional authentication security
- Subscription Management – View or upgrade your subscription plan
- Invoices – Access billing records and payment history
These settings allow users and administrators to manage access control, security settings, and billing directly from the dashboard.