Vulnerability Scan Compare
The Vulnerability Scan Compare feature enables users to track and analyze vulnerability mitigation progress by comparing scan results over time for a specific target.
- User Manual
- Agents
- The Cyber Risk Assessment Process
- API Documents
- General Questions and Troubleshooting
- The Cyber Risk Assessment Process (Video Tutorials)
- Sales and Prospecting Articles
- CYRISMA Partner Portal Access
- Glossary
- CYRISMA Change Log
- Support Ticket SLA
- Onboarding Framework
- PSA Integrations
- Billing Questions
- Self Onboarding Guide
Table of Contents
Steps to Compare Vulnerability Scans
Select Scan Type:
- Choose the scan type that matches the target you wish to compare. Options include:
- Internal Authenticated
- Internal Unauthenticated / External - IP Addresses
- External - Web Application URLs

Select Target:
- From the "Select Target" dropdown, choose the specific device or IP that has prior vulnerability scan records.

Report Selection:
- Report 1: Choose the date and scan name of the initial scan report you wish to use as a baseline. Ensure this is a completed scan with a valid date.
- Report 2: Select the date and scan name of the more recent scan you want to compare. This will serve as the current snapshot of the target’s vulnerabilities.

Compare Scans:
- Once both reports are selected, click Compare. The system will display a comparative summary, including:
- Target Information: Shows basic details like the device name and operating system.
- Total Vulnerabilities: Highlights the number of vulnerabilities detected in each scan.
- Vulnerabilities Breakdown Compare: A bar chart showing the comparison by severity (e.g., Critical, High, Medium, Low) for each scan.

Vulnerabilities Still Outstanding Table:
- Below the comparison chart, view a detailed table listing vulnerabilities that remain unresolved across scans.
- Each row includes:
- CVE Number: Linked to a detailed description.
- Title and Description: Outlines the vulnerability details.
- Risk Level: Displays severity levels (e.g., Critical, High).
- Reference Links: Provides external resources for further information.
Export to CSV:
- Use the Export As CSV option to download the vulnerabilities still outstanding data, allowing for offline review and record-keeping.
Best Practices for Comparison
- Track Vulnerabilities Over Time: Use this feature to monitor the efficacy of mitigation measures by observing changes in vulnerability counts and severity between scans.
- Leverage External Resources: Use the reference links to gather more information and remediation strategies for each CVE.
The Vulnerability Scan Compare feature helps visualize and quantify improvements in security posture, providing valuable insights for ongoing vulnerability management efforts.