Knowing what kind of vulnerabilities an organization faces requires a deep understanding of existing threats. Identifying these threats can be complicated, as network logs collect vast amounts of event data on a daily basis. The Log Correlation Engine (LCE) greatly simplifies the process of threat identification and can identify vulnerabilities present in an organization’s network by analyzing the log data. The Event Vulnerability Indicators Dashboard contains a series of components that provide an easy way to view vulnerabilities detected by LCE.