Skip to main content

Hyver Features Overview

Explore the core features of Hyver that help you assess and reduce cyber risk across your organization.

Updated over 5 months ago

Overview

This article gives you a quick introduction to the main features you'll work with in Hyver — from tracking vulnerabilities to generating mitigation plans and maturity reports. These tools help you visualize your exposure, prioritize actions, and make informed decisions to improve your cybersecurity posture.

If you're just getting started, check out the Getting Started with Hyver article first.


Key Features in Hyver

Risk Dashboard

The Risk Dashboard gives you a real-time overview of your organization’s cyber risk. Once you're fully set up, it displays key metrics like exposure, maturity, and Cost of Breach (CoB), helping you track performance and trends over time.

See more: [Risk Dashboard]


Findings Dashboard

This dashboard gives a clear picture of your security posture, showing open vs. resolved findings and progress across domains. It’s especially useful for internal reporting and justifying remediation budgets.

See more: [Findings Dashboard]


Mitigation Graph

This graph visually maps all possible attack routes to your critical business assets. Each connection (edge) on the graph represents a finding, showing how attackers could potentially move through your environment.

See more: [Mitigation Graph]


Maturity

Hyver calculates your cybersecurity maturity using a structured framework (based on NIST CSF), your team’s input, and actual findings. It helps you measure how well your processes, tools, and policies are performing — and where to improve.

See more: [Maturity Assessment]


Cost of Breach

Hyver uses business data to calculate the potential financial impact of a breach — your Cost of Breach. This includes both direct and indirect consequences and helps you weigh remediation costs vs. risk exposure.

See more: [Cost of Breach]


Plans

Mitigation plans help you organize and prioritize which findings to fix — and in what order. Each plan includes the affected remediation assets, estimated effort, and expected impact.

See more: [Mitigation Planning]


Findings

Findings are validated security issues or vulnerabilities in your environment. You can import them manually, sync via integrations, or let Hyver detect them automatically.

See more: [Findings]

Industry Insights

Hyver highlights trending findings across its customer base so you can compare your posture. Unsure about a finding? You can flag it as Potential to trigger a deeper internal check. These insights also show how common each issue is among peer organizations.


Assets

Assets are the systems and components in your network — like servers, routers, and IPs — that Hyver monitors. The platform supports Asset Discovery, often assisted by CYE, to catalog and evaluate these items.

See more: [Asset Discovery], [Viewing Assets]

Business Assets

These are the high-value entities you want to protect, such as customer data, intellectual property, or critical systems. Hyver uses these to anchor its risk modeling and prioritization.

See more: [Business Assets]


Engagements

An engagement is a scoped assessment — for example, scanning your cloud environment or running an Asset Discovery. CYE or your team can initiate these, and they serve as containers for findings and risk analysis.

Important notes

  • Some engagements (like Asset Discovery) can only be activated by CYE.

  • Your dashboards will remain empty until assets, findings, and threat sources are configured.

  • Findings marked as "Potential" do not affect risk scores until validated, but can be tracked.

See more: [Engagements in Hyver]


Reports

Generate reports to communicate progress, highlight risk areas, and share insights with stakeholders. Hyver reports include key metrics like exposure trends, maturity scores, and remediation updates.

See more: [Reports]


Integrations

Hyver connects with systems like Jira, ServiceNow, and other tools to ingest findings, sync assets, and streamline workflows.

See more: [Integrations]


Threat Sources

Define the internal and external actors that could pose a threat — such as external attackers or malicious insiders. These threat sources appear in your Mitigation Graph, helping Hyver model realistic attack scenarios.

See more: [Defining Threat Sources]


Multi-Company Dashboard

Built for large organizations, this dashboard consolidates risk and maturity scores from multiple subsidiaries. It's a central hub for board members and security leaders to track performance at a glance.

See more: [Multi-Company Dashboard]


Wrap-up / Next Steps

Whether you're browsing your first dashboard or generating board-ready reports, Hyver gives you the tools to manage cyber risk with confidence. Use this overview to decide where to dig deeper next — you don’t need to cover everything at once.

Did this answer your question?