Overlooking threat vectors in an organization can be disastrous, and network infrastructure such as routers and switches often escape the purview of vulnerability scans. Scanning network infrastructure devices is important; however, most of the useful information collected from these devices is gained through log collection. This dashboard provides a centralized view of vulnerability and log data collected on Cisco devices such as routers, switches, and firewalls.