Phoenix Security (Appsec Phoenix) is an Application security Posture Managment with Contextual Risk based vulnerability management (RBVM) and Unified Vulnerability management (Code to cloud). We want to change the way the applications security team communicate with businesses and engineers reducing burnout and promoting a risk-based approach to application security. The innovative Application Security Posture Management (ASPM) platform with Cyber risk quantification easily connect to all scanners, cloud, and containers to create an actionable, unified inventory of all application and cloud estate, mapping owners, stakeholder and the security posture with Contextual risk With Phoenix Security product team can help developers and engineers identify the vulnerability that matters most based on where they are deployed. Drive application security by risk, don't be slave to just the SLA.
Do You Manage Peer Insights at Phoenix Security?
Access Vendor Portal to update and manage your profile.
I really like the way Phoenix enriches and organizes vulnerability data so it's easier to understand what matters. The dashboards are clean and easy to use, and the platform makes it simple to see which issues need attention first. The Phoenix team has also been very responsive and focused on helping us get value quickly.
The proactive threat identification on this platform is great and I do not find that there are that many false positives like there are with some other platforms. The automation allows for rapid threat response which is good. So is the pre-defined actions that ensure responses are consistent and reliable. Lastly, I appreciate the APIs that allow us to tailor the security to specific requirements.
automated asset attribution intelligent noise reduction ai-powered remediation copilot
There really isn't much to dislike, but there are a few areas that required extra effort. First, the initial setup and deployment are fairly complex, especially when getting all the data sources aligned and mapped to our resources. Second, not all integrations are available out of the box, which can add time when onboarding new systems. Third, some configuration steps require more hands-on work than expected. That said, the Phoenix team has been extremely responsive, and they built the integrations we needed in a very short amount of time, which helped minimize the impact of these challenges. My experience has truly been a white-glove service.
The main 'cons' of this platform for us are the high cost and also the complexity in the set up. While this helps us, it does require a number of resources and level of understanding that comes at a cost as well. Thirdly, I wish there were more detailed visuals for analytics, from a UI perspective.
As an early stage platform, there's occasionally a learning curve when customizing certain advanced features to match our specific workflows. However, the team has been incredibly responsive to feedback The initial onboarding process required some coordination across multiple teams to ensure proper integration with our existing security stack. While this is typucal for enterprise security tools, clearer documentation upfront would have been helpful Some of our developers initially needed time to adapt to the new workflow, particularly around understanding how Phoenix's prioritization differs from traditional vulnerability scanners. more buil-in training material would ease the transition.