Video: How to modify out-of-the-box dashboards

by

The purpose of the JupiterOne Dashboards is to have a centralized set of dashboards that can be used by your security team to view, edit, and share with all teams in your organization in a single, consolidated view.

Jayson Jensen looks at four, key out-of-the-box dashboards that will give you better visibility into your cyber assets. He walks through the dashboards in their default states, and then shows how to modify the dashboards for your particular use case.

Dashboards featured

  1. Vulnerability Reporting
  2. Applications at Risk
  3. User End Points
  4. Development Dashboard

Resources

 

Jayson Jensen
Jayson Jensen

I spent 4+ years doing technical consulting for enterprise clients in the automobile and tax preparation services industries. During this time I gained experience across product, business, and technical domains while performing the functions of a Software Developer, Business Architect, and Product Architect. As a Customer Success Engineer for JupiterOne, I support customers by helping them understand the value of being able to query and visualize the relationships across the security domain which includes cloud infrastructure, network security, endpoint management, identity and access management, vulnerability management, and more. I enjoy everything outdoors, from Spartan races, to scuba diving, to hiking.

Keep Reading

CNAPP Meets the Graph: Why Cloud-Native Security Needs Asset Context | JupiterOne
February 18, 2026
Blog
CNAPP Meets the Graph: Why Cloud-Native Security Needs Asset Context

JupiterOne's new integration with Upwind brings runtime CNAPP data into the asset graph

Bridge the Gap: How the JupiterOne Collector Brings On-Prem Visibility Into Your Security Graph | JupiterOne
February 11, 2026
Blog
Bridge the Gap: How the JupiterOne Collector Brings On-Prem Visibility Into Your Security Graph

Most security teams can see their cloud but not what's behind the firewall. Learn how the JupiterOne Collector bridges on-prem visibility into your security graph.

CAASM Vendor Change Risk: Why Security Teams Should Plan Ahead
January 22, 2026
Blog
Why Smart Security Teams Plan for CAASM Vendor Change

As acquisition activity continues across the security market, teams are reassessing their CAASM foundations- & future-proofing their visibility strategy.

15 Mar 2022
Blog
One line headline, one line headline

Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud eiut.

15 Mar 2022
Blog
One line headline, one line headline

Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud eiut.

15 Mar 2022
Blog
One line headline, one line headline

Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud eiut.