Reports
Export compliance data for audit evidence and reporting
Supply Chain CVE Exposure
5-hop traversal from Vulnerability through transitive dependencies to System.
Transitive Risk
Vulnerabilities hiding at dependency depth >= 3.
Internet-Reachable Vulnerabilities
Critical/High vulnerabilities on internet-reachable components.
Asset Risk Scores
Systems ranked by weighted vulnerability severity.
Over-Deployment
Entitlements where usage exceeds purchased licenses.
Shelfware Detection
Purchased licenses with zero usage — wasted spend.
Expiring Licenses
Licenses expiring within 90 days that need renewal.