Find links to guides for commonly-used security tools so you can upload your data to our Coverage Tool
To get accurate analysis of your control gaps, you’ll need to upload data extracts from at least two of your security tools. This can include either your asset manager, EDR tool, or vulnerability scanner.
You need to please ensure that your data extracts are in .csv format, and at a minimum include fields for:
While the Coverage Tool only needs IP address and timestamp, you’ll get more accurate analysis if you provide additional device information – such as MAC address and operating system.
To help with this, we’ve linked to official user guides from relevant security tools that are commonly used by our customers.