CyTech AQUILA - Vulnerability Assessment and Management (Module)
Overview:
In AQUILA, the Vulnerability Assessment and Management (VAM) module is designed to help organizations identify, analyze, prioritize, and remediate security weaknesses across their IT infrastructure.
Key Features:
- Dashboard - Provides an overview of the organization’s risk posture, showing vulnerability scores, scan status, severity levels, affected asset types, top CVEs, and most vulnerable assets.
- Scan - It shows you all currently running scans with percentage to completion and number of severities.
Step 1: Log in to CyTech – AQUILA. https://usdc.cytechint.io/
Step 2: In the left side panel, you can see the list of six (6) domains, kindly choose and click the Risk Management (Domain) -> Vulnerability Assessment and Management (Module) -> DashboardDetection (Sub Module)
"Dashboard (Sub-module)" - Vulnerability Assessment and Management (Module)
The Vulnerability Assessment & Management Dashboard in AQUILA provides a centralized view of all detected vulnerabilities. It shows the overall risk score, trends, severity distribution, and affected assets. Users can monitor scans, identify top vulnerabilities (CVEs), and track the most at-risk assets, enabling quicker prioritization and remediation.
Uses of Dashboard Sections (1–7)
- Total
OverallVulnerabilitiesVulnerability-ScoreDisplays the
organization’s current security posture on a gauge meter.Helps quickly see if the environment is atminimal, moderate, or high risk.
Overall Vulnerability Score – TrendShows how the vulnerability score changes over time.Useful for monitoring whether risks are being reduced after remediation.
Scan Summary (Running, Completed, Assets Scanned)Provides the status of vulnerability scans:Running scans in progressCompleted scans finished
vulnerabilitiesTotaltotal number ofassetsdetectedscannedacross
- Severity
basedLet'sBreakdownusers-trackShowsscanningtheactivitydistributionatofavulnerabilitiesglance.on
- Needs
Attention Vulnerabilities
Listsby-Severity- critical
- or
Breaks downhigh-severity vulnerabilitiesintothatcategories:require immediate review or action. - Mitigated in Progress - List of the Vulnerabilities and Endpoints that are currently on process of mitigation.
- Mitigated - List of the Vulnerabilities that are mitigated
- or
Endpoints
The client can also access the list of their endpoints and how many vulnerabilities are affected; this section can be found below the Detection.
- Exposure Distribution -Shows the number of endpoints based on their current exposure level (Critical, High, Medium,
Low, InformationalLow). - Top
Helps3prioritizeVulnerableremediation based on severity levels.
-VulnerabilitiesEndpoints byAssetExposureTypeOrganizes vulnerabilities according toDisplays theassetthreescanned:Web AssetsNetwork Assets (coming soon)Mobile Assets (coming soon)
Useful for identifying which type of asset is most at risk.
Top CVEs DetectedLists the most criticalCommon Vulnerabilities and Exposures (CVEs)identified.Includes CVE ID, severity, CVSS score, reference, and number of affected assets.Helps focus attention on widely known and exploitable vulnerabilities.
Top Vulnerable Assets
detected critical and high vulnerabilities, broken down by severity level.Highlights assetsendpoints with the highest number ofvulnerabilities.- Top
immediate action. Prioritizes Critical and High severity.Shows5assetVulnerabilitiesname,NeedingaverageAttentionseverity,-averageListsCVSStherating,vulnerabilities that impact the most endpoints andtotalrequirevulnerabilities. - Endpoint
of vulnerabilities.Helpslistsecurity-teamsListprioritizeofwhichthesystemsEndpointsneedandurgent#attention.
"Scan (Sub-module)" - Vulnerability Assessment and Management (Module)
The Running Scans page in AQUILA shows all ongoing vulnerability scans with progress and severity details. From here, users can search scans, launch new ones, and toggle to view completed scans. The client can also view their scan result by pressing the view button.
Search Bar or Search this Board " - is simply a filter/search tool for the scan list displayed in the main panel.
" New Scan " - The New Scan lets users choose the type of scan (Quick, Website, Network, or Mobile) depending on the asset being tested, each tailored to identify vulnerabilities and provide security insights.
Vulnerability Reports - Vulnerability Assessment and Management (Module)
In this section, the client can view, manage and generate report by pressing "Generate Report" button
After pressing "Generate Report" and filling up the required information it will generate a report summary on the endpoints that are affected by the vulnerability and their CVE's that are related to the vulnerabilities. The client can also press "Download Report" to generate a pdf form of the report.
If you need further assistance, kindly contact support@cytechint.com for prompt assistance and guidance.









