Beyond Security Blog
Update sign and icon on a computer keyboard 3D illustration.

beSECURE Updates 10: New Features & Improvements in 2020

In beSECURE 10, we added new features including live, customizable dashboards and integrations with third-party data to improve efficiency and convenience.

Our goal is to make our products as intuitive as possible while offering the most comprehensive detection and response  solutions on the market. Last year, with beSECURE 10, we outdid ourselves by adding dozens of new powerful features including live, customizable dashboards, IT and OT assets management, credentials storage and new post scan integrations to increase security and reduce your mean time to respond (MTTR).

Welcome to our very first blog featuring quarterly product updates — where we will share new features, exciting improvements and what’s to come down the product pipeline. Since this is our first blog specifically tailored to a product release, we thought we’d catch you up on what happened last year. Please SUBSCRIBE to our blog and newsletter to be the first to receive the news about beSECURE 11 (COMING SOON) as well as other product updates, upcoming events and the latest cybersecurity news.

Beyond Security blog featured image cybersecurity isometric vector

Live, customizable dashboards

Looking for real-time threat intelligence? You’re in the right place. We’ve moved beyond static dashboards and on to live, up-to-the-minute dashboards — with data pulled from the latest vulnerability scans and ongoing monitoring of your networks and assets (both agent-based and agentless). 

Additionally, you can now create customized dashboards, widgets, asset groups, scan reports and more.

Frequently used charts and scorecards 

Risk Distribution – for viewing the percentage of high, medium and low-risk vulnerabilities.

Quarterly/Monthly Trend – for viewing vulnerability trends over time

Bubble Graph – for viewing vulnerabilities according to CVSS score and affected hosts

Assets Trend – for viewing how many assets were tagged due to specified criteria

Beyond Security blog featured image cybersecurity isometric vector

You can build personalized dashboard views after filtering data from a list of available options chosen to provide meaningful insights into risks affecting your business. Once you’ve finished building your dashboard, you can save your filters for future use — and manage everything from a single console.

Available dashboard filters


  • Quick Add
  • Organization
  • Scan
  • Asset Group


  • Affected Hosts vs Vulnerabilities
  • Lowest Score Host(s)
  • Most Frequent Vulnerabilities
  • Most Frequent Vulnerability Type
  • Most Vulnerable Host(s)
  • Organization Monthly Trend
  • Organization Quarterly Trend
  • Persistent / New / Remediated Vulnerabilities
  • Risk Distribution


  • Preset Dashboard
  • Major Vulnerabilities
  • Major Categories
  • Categories
  • High / Medium Count
  • Host Information
  • Score


  • Company
  • Organizational groups and departments such as MSP clients

Video: beSECURE 10 – demo on demand

[ Learn about automated detection and network access control. | Get a 30-day free trial. Contact one of our experienced Solution Engineers to find out how. ]

Beyond Security

Beyond Security is a global leader in automated vulnerability assessment and compliance solutions – enabling businesses and governments to accurately assess and manage security weaknesses in their networks, applications, industrial systems and networked software at a fraction of the cost of human-based penetration testing.

Contact Us

Want to learn more? Fill out the form below and we'll be in touch shortly.

Marketing by
By clicking Submit, I agree to the use of my personal data in accordance with the Beyond Security Privacy Policy. Beyond Security will not sell, trade, lease, or rent your personal data to third parties.