Dashboards
IBM® Quantum Safe Explorer provides various dashboards to help you track, analyze, and act on the collected data.
Applying filters
Apply the following filters to get the report on the dashboard.
- Scan ID: The network snapshot ID signifies the incremental loading of network scan data. As new scans are ingested, Scan ID value increases sequentially.
- Provision ID: The application provision ID represents the incremental loading of new application provisioning data. This ID value increases sequentially with each new provisioning event.
- QSE ID: The Quantum Safe Explorer ID signifies the snapshot ID for IBM Quantum Safe Explorer data. This ID increases sequentially with the loading of new data.
- Start Date: Specify the date from which you want to start filtering the reports.
- End Date: Specify the date until which you want to filter the reports.
For charts, click Save image icon or Download CSV icon on each chart to download the data displayed on the dashboard.
For a tabular list, click Page to download the data displayed not the current page and click All download all ch data. The downloaded file is in CSV format.
Quantum safe - summary
The summary dashboard is the primary dashboard that brings together visibility, policy compliance and cryptographic inventories from the network and applications. When you log in to IBM Quantum Safe Explorer for the first time, you land on the Quantum Safe - Summary dashboard.
The Quantum Safe - Summary dashboard provides a comprehensive, high-level overview of your organization's cryptographic security across network and application layers. It combines essential information on cipher strength distribution, protocol usage, library presence, endpoint coverage, and policy compliance. By consolidating these insights, the dashboard allows security teams and stakeholders to assess your organization's readiness for quantum-safe standards, identify cryptographic vulnerabilities, and ensure adherence to established cryptographic policies and compliance requirements.
| Section title | Data visualization type | Description |
|---|---|---|
| Cipher Strength | Donut Chart | Displays distribution of cipher suites based on strength categories: High, Medium, and Low. |
| Protocol Version | Donut Chart | Shows the different TLS protocol versions that are identified across the environment. |
| Cryptographic Libraries | Donut Chart | Lists instances of cryptographic libraries that are found in the systems. |
| Endpoints | Numeric Card | Indicates the total number of network endpoints scanned |
| Cryptographic Protocols | Numeric Card | Summarizes the number of unique cryptographic protocols observed. |
| Cryptographic Posture | Bar chart(Monthly Trend) | Tracks the evolution of cryptographic posture over time, helping visualize cryptographic compliance |
| Violation Aggregation Score | Tabular list | Provides an aggregation of violation score at the domain key level based on identified cryptographic policy compliance. Useful for identifying high-risk areas by domain key grouping |
| Cryptographic Inventory – Applications | Tabular list | Provides a detailed view of cryptographic configurations at the application level, including application metadata, endpoint URLs, host-port combinations, and geographic location data. This tabular report enables visibility into the cryptographic footprint of application services |
| Cryptographic Inventory – Endpoints | Tabular list | Provides a comprehensive inventory of cryptographic configurations at the endpoint level, detailing the protocols, cipher suites, and their respective strengths used by each host-port pair. This enables effective evaluation of endpoint-specific cryptographic exposure. |
Quantum safe - application
This dashboard displays a summary of scanned applications.
It displays a concise summary of provisioned applications and their associated cryptographic exposure. It also gathers metadata, including host, port, region, and application-specific endpoints, to help users comprehend the usage and location of cryptographic assets within various application environments.
| Section title | Data visualization type | Description |
|---|---|---|
| Cryptographic Inventory – Applications | Tabular List | Displays detailed information at the application level, including host, port, application name, endpoint URLs, and geographic attributes such as region, city, state/province, and country. It provides a comprehensive view of details that are associated with each application. |
Quantum Safe - certificate algorithm
This dashboard displays certificate signature algorithms that are used by scanned network locations.
The Quantum Safe – Certificate Algorithm dashboard offers an in-depth view of the certificate signature algorithms that are employed across scanned network locations. This dashboard allows users to evaluate the cryptographic resilience of endpoints by analyzing certificate configurations and their adherence to quantum-safe standards.
| Section title | Data visualization type | Description |
|---|---|---|
| Certificate Signature Algorithm | Donut Chart | Displays the number of unique endpoints by using distinct certificate signature algorithms. Helps identify usage patterns across the network |
| Certificate Signature Algorithm Detail – Endpoint | Tabular List | Displays detailed certificate information for each scanned endpoint, including cryptographic algorithm type, signature method, certificate version, validity period, and associated host, port, domain, and country—enabling in-depth analysis of cryptographic configurations at the network edge. |
Quantum safe - cryptographic inventory for networks
This dashboard displays the cryptographic inventory of scanned network locations.
The Quantum Safe – Cryptographic Inventory for Networks dashboard offers a thorough overview of cryptographic protocols and cipher suites that are employed across scanned network locations. This dashboard is intended to assist users in identifying weak, outdated, or non-quantum-safe configurations within transport-layer encryption mechanisms.
| Section title | Data visualization type | Description |
|---|---|---|
| Cryptographic Inventory – Networks | Tabular List | Displays a comprehensive inventory of cryptographic settings for scanned network endpoints, detailing protocol type and version, cipher suite characteristics, encryption strength, and geographical details. |
Quantum safe - policy compliance
This dashboard displays network-specific policy violations.
The Quantum Safe – Policy Compliance dashboard offers a detailed perspective on policy violations that are identified across scanned network endpoints and provisioned application environments. This dashboard empowers teams to track outdated protocols, weak ciphers, and other noncompliant cryptographic practices that can risks in the context of post-quantum security readiness.
| Section title | Data visualization type | Description |
|---|---|---|
| Policy Compliance | Tabular List | Displays a detailed list of cryptographic policy violations that are detected during scans and applications, reported at the domain key level—covering both network and application contexts. Each row highlights the violated policy, its severity, description, detection timestamp, and associated host or port information. Other context such as country classification, policy alert email, and integration references enables traceability and supports effective remediation. This view is critical for enforcing cryptographic standards and advancing quantum-safe readiness across the environment. |