Overview
This article shows how to use Hyver to plan and prioritize your mitigation efforts. You’ll learn how to focus on the most critical vulnerabilities and use the Mitigation Planner to understand how fixing specific findings can disrupt attack routes and reduce your organization’s cyber risk.
How Mitigation Planning Works
Hyver’s mitigation planning is built around two key ideas:
Strategically reducing risk by fixing the most impactful findings.
Optimizing effort by targeting fixes that disconnect multiple attack routes.
Optimization Algorithm and Route Analysis
Hyver’s mitigation optimization algorithm analyzes all attack paths and identifies the route segments (edges) that, if fixed, will disconnect the greatest number of attack routes.
It takes into account:
Finding severity
Probability of exploitation
Time to fix
Cost and resource requirements
This allows you to plan remediation that delivers the maximum risk reduction with minimum effort.
Visual Cues in the Graph
In the mitigation graph, attack routes are shown as edges between positions. The most critical edges are:
Highlighted with a turquoise solid line and arrow
Marked as Critical to Block or high probability
Represent the vulnerabilities that should be prioritized first
These are the edges where mitigation will make the most immediate and measurable impact.
Using the Mitigation Planner
The Mitigation Planner tool lets you:
Mark specific findings on the graph
Visualize how fixing them affects connected attack routes
See which edges (routes) will be disrupted as a result
This helps you test remediation scenarios and make informed decisions before launching your plan.
Wrap-up / Next Steps
Effective mitigation is about working smarter, not just harder. Hyver helps you pinpoint which vulnerabilities to fix first by combining attack path modeling with business impact and effort analysis. It’s a data-driven way to reduce risk, fast.
Next, try using the Mitigation Planner to simulate changes and track their effects.


