kate-gibson

718 Docs

Zscaler Deception

Last Updated: June 29, 2024

Zscaler Deception (formerly Smokescreen IllusionBLACK) is a deception-based threat detection platform delivered as part of the Zscaler Zero Trust Exchange. Zscaler Deception uses decoys/honeypots to detect advanced in-network threats that have bypassed existing defenses. Zscaler Deception detects compromised users, stops lateral movement, and defends against human-operated ransomware, hands-on keyboard threats, supply chain attacks, and malicious...

SecurityScorecard

Last Updated: June 29, 2024

SecurityScorecard provides instant cyber risk ratings of vendors and supply chains. SecurityScorecard enables self-monitoring, third-party risk management, board reporting, and cyber insurance underwriting. Parameters URL (required): The URL of the SecurityScorecard API, for example, https://api.securityscorecard.io. API Token (required): SecurityScorecard API token. Verify SSL (optional, default is false): Verify the SSL certificate or not. API Documentation https://securityscorecard.readme.io/reference/introduction

CyCognito

Last Updated: June 28, 2024

The CyCognito platform is an attack surface management solution that automatically discovers your organization’s structure and internet-exposed assets, performs continuous, active security testing of all exposed assets, and then provides prescriptive and intelligent remediation guidance. Configuring the Connector for CyCognito To configure Lucidum to ingest data from CyCognito: Log in to Lucidum. In the left...

Citrix Endpoint Management

Last Updated: June 28, 2024

Citrix Endpoint Management (formerly XenMobile) is a Unified Endpoint Management (UEM) solution. Citrix Endpoint Management offers a single, uniform, over-the-air management interface for mobile, laptops, PCs, and other devices like wearables and IoT endpoints. Configuring the Connector for Citrix Endpoint Management To configure Lucidum to ingest data from Citrix Endpoint Management: Log in to Lucidum....

Cyware

Last Updated: June 28, 2024

Cyware is a threat intelligence platform that collects and analyzes threat data from various sources to identify and prevent threats to an organization’s network. Cyware provides real-time insights and actionable information about emerging cyber threats, vulnerabilities, and malicious activities and fosters active security collaboration through bidirectional threat intelligence sharing. Parameters URL (required): The URL of the...

Managing a Dashboard

Last Updated: November 5, 2025

This chapter describes the actions you can perform on a dashboard. Permissions Channels control your permissions. If a dashboard is in a channel where you have read-only privileges, you will have read-only privileges for the member dashboards. If a dashboard is in a channel where you have read-write privileges, you will have read-write privileges for...

Exporting and Importing a Dashboard

Last Updated: November 4, 2025

This chapter describes how to export and import dashboards. You can export dashboards to a JSON file or a PDF file. You can import dashboards using a JSON file. Exporting a Dashboard To export a dashboard to JSON or PDF: Log in to your Lucidum system. In the left menu, click Dashboards. In the Channel...

Creating a Dashboard

Last Updated: November 6, 2025

Ways to Create a Dashboard There are three ways to create a dashboard: You can create a new dashboard from scratch You can import a JSON file from another Lucidum system. You can also copy a dashboard and then edit the copy. This chapter describes all these options. Creating a New Dashboard To create a...