When we launched CyberSight in March, the goal was clear: close the visibility gap between what DNS logs show and what users actually do. Activity logs, full URL tracking, application usage, device state—the data security teams need but haven't had from their DNS provider.
With a strong foundation of user behavior data in place, we can now help our customers take visibility to the next level and empower them to make sense of this data faster than ever. Today we're delivering two new CyberSight capabilities: Threat Trends and Timeline.
Activity logs give you depth but when you're managing hundreds of users, you need a way to surface what matters without scrolling through individual events. Threat Trends provides that elevated view.
Threat Trends aggregates threat intelligence across your environment to show:
CyberSight Threat Trends dashboard showing top threats and riskiest users
All of this data is exportable via CSV through the API, so if you're building QBR reports for clients or feeding data into your own workflows, you can pull in what you need.
Before Threat Trends, answering a question like "which threat categories are hitting us hardest this month?" meant manually filtering activity logs, user by user. Now you have a single view that surfaces the signal across your entire environment.
For MSPs, this is especially practical. You can pull up Threat Trends per-organization and immediately see which client environments have the highest concentration of observed threats without building custom reports or switching between tools.
If Threat Trends tells you where to look, Timeline tells you what happened.
Timeline provides an hour-by-hour, chronological reconstruction of user activity within any given time period. It's built to support you during active investigations when you already know something is wrong and need to understand the sequence of events.
It's designed to make patterns and anomalies visible at a glance by:
This is where CyberSight goes from a visibility tool to an investigation tool.
Consider the scenario we discussed in this article: A device starts a high-speed upload to cloud storage at 2:00 AM while the user is idle. CyberSight's activity logs already capture that event. But with the Timeline, you can now reconstruct everything that user's device was doing in the hours before and after—what applications were open, which websites were visited, when the machine was locked and unlocked, and whether the activity pattern looks like a compromised device or a legitimate process.
Understanding the context of what happened when an alert is triggered is critical for validating real threats. Timeline compresses what used to be a multi-tool, multi-day investigation into something you can walk through in a single view.
A few things worth reiterating since the launch:
Threat Trends and Timeline complete our initial suite of capabilities for CyberSight, all working together to give you a full picture from high-level trends down to granular event forensics.
But we're not stopping here. Scheduled reports, deeper integration between CyberSight data and the DNS query log, and expanded export capabilities are all in the pipeline. We'll share more as they ship.
If you're already a customer, Threat Trends and Timeline are live in your CyberSight dashboard today. Log in and explore.
If you're not yet using CyberSight, try it for free today.