Understand the Key Components of Chart View
| Limited Availability: To access DSPM Data Explorer, contact Skyhigh Support. |
On the Data Explorer page, the Chart View provides an overview of critical system data, which aims to convey four key data vectors:
- Risky Objects. Provides the names of the riskiest objects found within the organization.
- Services. Provides details of the services where the risky objects are located.
- Classifications. Provides the details of the classified category of sensitive data associated with risky objects.
- Users. Provides the details of the users who interacted with the risky objects.
To learn more about the Data Explorer page, see About Data Explorer.
Top 10 Risky Objects
This section offers a critical analysis of objects within the system that pose a potential security risk. By default, it prominently displays the top 10 riskiest objects, recognizing these as primary focal points for system security and administrative attention. The selection of these top 10 objects is based on an object risk score assessment from service risk, user, and triggered classifications. This assessment evaluates various factors, including the sensitivity of the content and the severity of the DLP policy match. It also takes into account contextual elements such as user and Cloud Service Provider (CSP) risk, exposure levels, and the potential impact on system integrity and data confidentiality.
This curated view aims to provide immediate insights into potential threats and vulnerabilities, enabling quick identification and remediation of high-priority issues. This focused approach helps administrators rapidly grasp pressing risks, facilitating proactive security management and informed decision-making.
Click any object name link in the Top 10 Risky Objects section to view the Object Detail Card.

Services Table
The top 20 services are determined by evaluating key metrics such as data volume, object risk distribution, and object allocation to service. This analysis is crucial for identifying areas that require heightened security. Data volume reveals services handling significant amounts of sensitive information. Object Risk distribution helps pinpoint potential vulnerabilities associated with various data types. Total Data and Object Distribution provides insight into data separation between CASB and Web applications, as well as the total data presented by high-risk services.
This comprehensive information is essential for recognizing applications that may be more susceptible to security breaches or data leaks.

The Services table provides the following information:
- Service. The name of the service.
- Object Risk. The risk distribution of the object in the service. For more details on Object Risk, see Understand the Data Risk Calculations.
- Users. The number of users associated with this service.
- Total Data. The total volume of the data discovered in the service. The data count will vary based on the selected filter.
- Object Distribution. The number of objects distributed between CASB and Web applications.
Click any service to view the detailed information of the selected service. For details, see Services Detail Card.
Classifications Table
The Classification section monitors and displays the top 20 data classifications triggered when sensitive information is edited or moved. It provides valuable insights into how the sensitive data is utilized, featuring a risk distribution matrix that highlights the risk distribution of objects in that particular classification. Additionally, it shows the volume of data within each classification, offering a quantitative measure to help organizations assess their sensitive data exposure. It also identifies the specific services utilizing sensitive data, enabling targeted security measures and closer monitoring of these services for potential risks.
Overall, the Classification section provides a comprehensive overview of sensitive data management, facilitating better risk assessment and informed decision-making.

The Classifications table provides the following information:
- Classification. The name of the classification.
- Object Risk. The risk distribution of the object in the classification. For more details on Object Risk, see Understand the Data Risk Calculations.
- Services. The name of the service where the classification is used.
- Total Data. The total volume of the data discovered in the classification. The data count will vary based on the selected filter.
- Object Distribution. The number of objects distributed between CASB and Web applications.
Click any classification to view the detailed information of the selected classification. For details, see Classifications Detail Card.
Users Table
This section focuses on the top 20 users who have interacted with sensitive information. For each user, it delivers crucial insights into the risk distribution matrix, which highlights the risk levels associated with the objects edited or moved by the user. Data volume provides a quantitative measure of the sensitive data exposed, helping to assess overall data exposure. It also identifies the service where the sensitive data is stored.
This comprehensive view allows for highly targeted analysis and more effective decision-making regarding user management.
The Users table provides the following information:
- User. The name of the user.
- Object Risk. The risk distribution of the object for the user. For more details on Object Risk, see Understand the Data Risk Calculations.
- Services. The name of the service(s) accessible to the user.
- Total Data. The total volume of data accessible to the user. The data count will vary based on the selected filter.
Click any user to view the detailed information of the selected user. For details, see Users Detail Card.

