Dashboards

IBM® Quantum Safe Explorer provides various dashboards to help you track, analyze, and act on the collected data.

Applying filters

Apply the following filters to get the report on the dashboard.

  • Scan ID: The network snapshot ID signifies the incremental loading of network scan data. As new scans are ingested, Scan ID value increases sequentially.
  • Provision ID: The application provision ID represents the incremental loading of new application provisioning data. This ID value increases sequentially with each new provisioning event.
  • QSE ID: The Quantum Safe Explorer ID signifies the snapshot ID for IBM Quantum Safe Explorer data. This ID increases sequentially with the loading of new data.
  • Start Date: Specify the date from which you want to start filtering the reports.
  • End Date: Specify the date until which you want to filter the reports.
Note: The dashboard filters primarily operates on snapshot data. When a snapshot is included within the selected filter range, all policies associated with that snapshot are displayed on the dashboard, regardless of whether those policies were created within the filter range. This is because the filter criteria are applied on snapshot data, not on the metadata of associated policies.

For charts, click Save image icon or Download CSV icon on each chart to download the data displayed on the dashboard.

For a tabular list, click Page to download the data displayed not the current page and click All download all ch data. The downloaded file is in CSV format.

Quantum safe - summary

The summary dashboard is the primary dashboard that brings together visibility, policy compliance and cryptographic inventories from the network and applications. When you log in to IBM Quantum Safe Explorer for the first time, you land on the Quantum Safe - Summary dashboard.

The Quantum Safe - Summary dashboard provides a comprehensive, high-level overview of your organization's cryptographic security across network and application layers. It combines essential information on cipher strength distribution, protocol usage, library presence, endpoint coverage, and policy compliance. By consolidating these insights, the dashboard allows security teams and stakeholders to assess your organization's readiness for quantum-safe standards, identify cryptographic vulnerabilities, and ensure adherence to established cryptographic policies and compliance requirements.

Table 1. Summary dashboard details
Section title Data visualization type Description
Cipher Strength Donut Chart Displays distribution of cipher suites based on strength categories: High, Medium, and Low.
Protocol Version Donut Chart Shows the different TLS protocol versions that are identified across the environment.
Cryptographic Libraries Donut Chart Lists instances of cryptographic libraries that are found in the systems.
Endpoints Numeric Card Indicates the total number of network endpoints scanned
Cryptographic Protocols Numeric Card Summarizes the number of unique cryptographic protocols observed.
Cryptographic Posture Bar chart(Monthly Trend) Tracks the evolution of cryptographic posture over time, helping visualize cryptographic compliance
Violation Aggregation Score Tabular list Provides an aggregation of violation score at the domain key level based on identified cryptographic policy compliance. Useful for identifying high-risk areas by domain key grouping
Cryptographic Inventory – Applications Tabular list Provides a detailed view of cryptographic configurations at the application level, including application metadata, endpoint URLs, host-port combinations, and geographic location data. This tabular report enables visibility into the cryptographic footprint of application services
Cryptographic Inventory – Endpoints Tabular list Provides a comprehensive inventory of cryptographic configurations at the endpoint level, detailing the protocols, cipher suites, and their respective strengths used by each host-port pair. This enables effective evaluation of endpoint-specific cryptographic exposure.

Quantum safe - application

This dashboard displays a summary of scanned applications.

It displays a concise summary of provisioned applications and their associated cryptographic exposure. It also gathers metadata, including host, port, region, and application-specific endpoints, to help users comprehend the usage and location of cryptographic assets within various application environments.

Table 2. Quantum Safe – Applications details
Section title Data visualization type Description
Cryptographic Inventory – Applications Tabular List Displays detailed information at the application level, including host, port, application name, endpoint URLs, and geographic attributes such as region, city, state/province, and country. It provides a comprehensive view of details that are associated with each application.

Quantum Safe - certificate algorithm

This dashboard displays certificate signature algorithms that are used by scanned network locations.

The Quantum Safe – Certificate Algorithm dashboard offers an in-depth view of the certificate signature algorithms that are employed across scanned network locations. This dashboard allows users to evaluate the cryptographic resilience of endpoints by analyzing certificate configurations and their adherence to quantum-safe standards.

Table 3. Quantum Safe – Certificate Algorithm details
Section title Data visualization type Description
Certificate Signature Algorithm Donut Chart Displays the number of unique endpoints by using distinct certificate signature algorithms. Helps identify usage patterns across the network
Certificate Signature Algorithm Detail – Endpoint Tabular List Displays detailed certificate information for each scanned endpoint, including cryptographic algorithm type, signature method, certificate version, validity period, and associated host, port, domain, and country—enabling in-depth analysis of cryptographic configurations at the network edge.

Quantum safe - cryptographic inventory for networks

This dashboard displays the cryptographic inventory of scanned network locations.

The Quantum Safe – Cryptographic Inventory for Networks dashboard offers a thorough overview of cryptographic protocols and cipher suites that are employed across scanned network locations. This dashboard is intended to assist users in identifying weak, outdated, or non-quantum-safe configurations within transport-layer encryption mechanisms.

Table 4. Quantum Safe – Cryptographic Inventory for Networks details
Section title Data visualization type Description
Cryptographic Inventory – Networks Tabular List Displays a comprehensive inventory of cryptographic settings for scanned network endpoints, detailing protocol type and version, cipher suite characteristics, encryption strength, and geographical details.

Quantum safe - policy compliance

This dashboard displays network-specific policy violations.

The Quantum Safe – Policy Compliance dashboard offers a detailed perspective on policy violations that are identified across scanned network endpoints and provisioned application environments. This dashboard empowers teams to track outdated protocols, weak ciphers, and other noncompliant cryptographic practices that can risks in the context of post-quantum security readiness.

Table 5. Quantum Safe – Policy Compliance details
Section title Data visualization type Description
Policy Compliance Tabular List Displays a detailed list of cryptographic policy violations that are detected during scans and applications, reported at the domain key level—covering both network and application contexts. Each row highlights the violated policy, its severity, description, detection timestamp, and associated host or port information. Other context such as country classification, policy alert email, and integration references enables traceability and supports effective remediation. This view is critical for enforcing cryptographic standards and advancing quantum-safe readiness across the environment.