Use Cases
- Protected: Overview of Use Cases
- Full Inventory of Assets and Users
- Full Inventory of Assets for Providers
- Assets with End-of-Life Operating Systems
- AWS Security Groups
- Azure Lift and Shift
- Binding Operational Directives
- Certificates About to Expire or Already Expired
- Cloud Resources and Cost
- How Secure Are Your Assets?
- Identity and Access Management
- Lucidum and Cyber Insurance Requirements
- Protected: Lucidum Normalization
- Microsoft Defender Missing
- Microsoft Sentinel Missing
- Sending Lucidum Data to Microsoft Sentinel
- Unencrypted Storage
- Zero-Day Vulnerabilities
- Zero-Day Vulnerabilities and CVEs
- Zombie Users and Improper Offboardings
- Cybersecurity Regulations for the Kingdom of Saudi Arabia