Phoenix Security – August Release – 3.29

Phoenix Security New Features Release 3.29

Phoenix Security introduces a series of targeted updates to enhance Application Security Posture Management (ASPM) and vulnerability management directly within the platform. These changes give users greater control over dashboard content, deeper visibility into findings, and more flexible ways to measure and track remediation performance.

The release adds configurable dashboard customisation, expanded findings visualisations, enhanced SLA metric controls, and new cross-dashboard performance charts—features designed to let teams filter, prioritise, and act on security data with minimal friction. Each update is built to reduce noise, surface the most relevant risks, and speed up the path from detection to closure.

Previous Features


What’s New in Phoenix Security Application Security Posture Management (ASPM)

New dashboard features and customizations

New dashboard features offer enhanced customization and prioritization to view and manage your security landscape. It now includes:

  • Custom Dashboards: Use the custom dashboards toggle to select which features are displayed across only your dashboard or all organisation users’ dashboards.
  • Top 10 Apps and Services: New tables displaying top 10 highest criticality Applications and Services.
  • Findings Status Timeline and MTTR charts: Track remediation efforts by the number of fixes and my the mean time to resolution.
  • SLA switch: Switch global view of SLA dashboards metrics between time from scanner picking the finding up to resolution or based on ticket creation to ticket closure.

Additional features

  • New Notification area
  • Top 10 Libs (Team dashboard)
  • Best changes/lowest frequency change teams (Security Dashboard)
  • Lifecycle management (GC) for Imported Assets and Findings
  • Filters saved for Campaigns summary

Get in control of your Application Security posture and Vulnerability management

New Executive Dashboard features

This release introduces new features to our key dashboards: main, security and team.

Dashboard customization


We’ve just rolled out a powerful new Dashboard Customization feature, giving every user the ability to tailor their dashboard views across ExecutiveSecurity, and Team dashboards. With a simple toggle interface, users can control which charts are visible on their personal dashboards—everything from “Risk Level” to “Findings Breakdown” and “Exposure Cost”—making it easy to focus only on what matters most.

Admins now also have access to a Global Switch for each chart, allowing them to disable specific widgets across the entire organisation’s dashboard. This is especially useful for enforcing consistency across different roles or streamlining views for executive reporting. Meanwhile, individual users can still use the Visible toggle to personalise their own experience without affecting others.

Whether you’re an executive interested in high-level risk metrics or an analyst digging into SLA compliance and vulnerability trends, this feature makes dashboards cleaner, more relevant, and easier to use.

Top 10 Apps and Services

The Top 10 Vulnerable Applications and Top 10 Vulnerable Services charts are built to surface the highest criticality applications and services within your organisation. By ranking based on risk level, these widgets allow executives to quickly identify which applications and services demand the most attention, whether due to volume, criticality, or concentration of high-impact vulnerabilities.

Each entry provides a full severity breakdown across critical to negligible levels, helping users understand not just how many issues exist, but how serious they are.

For users who want to dig deeper, each application or service also includes a shortcut menu, allowing quick access to related vulnerabilities, findings, and asset types. While optional, these links help streamline deeper investigation without breaking focus, making it easier to take action straight from the overview.

Findings Status Timeline and MTTR charts

The Findings per Status chart has been expanded with two powerful new views, Timeline and MTTR Cumulative, enhancing visibility into how findings evolve over time and how long they take to resolve. These additions complement the original Daily View by offering a broader context for trend analysis and performance measurement.

The Timeline view visualises the accumulation of findings across statuses: open, in progress, and fixed. This gives teams the ability to observe how their remediation efforts track over weeks and months. It helps identify periods of increased activity, stagnation, or sudden resolution spikes, making it easier to correlate progress with operational events.

Meanwhile, the MTTR Cumulative view focuses on long-term efficiency, surfacing trends in Mean Time to Resolution (MTTR) and Time to Open (MTTO). This view supports strategic planning by helping teams understand how ageing findings impact their overall metrics and where improvements in fix velocity could have the greatest impact. Together, these new views turn findings data into an actionable narrative.

SLA switch

The new Global SLA Statistics Source Toggle gives you greater flexibility in how SLA metrics are calculated and displayed across your dashboards. With this control, you can choose between two distinct SLA measurement approaches, ensuring the data aligns with your team’s priorities and operational processes.

One option is Finding-Based SLA, which measures SLA performance based on how long each finding has been open, ideal for focusing on the age of unresolved issues and their compliance status over time. The alternative is Ticket-Based SLA, which tracks SLA from the moment a ticket is opened to when it’s closed, perfect for monitoring end-to-end resolution workflows and operational efficiency.

By switching between these modes, you can adapt SLA reporting to match your organisation’s specific needs, whether that’s driving faster remediation of findings or streamlining ticket management performance.

Team and Security Dashboard additions

Best Changes and Lowest change frequency charts

The Best Changes and Lowest Change Frequency charts, originally launched on the Teams Dashboard, are now available on the Security Dashboard, giving security leaders direct visibility into team performance without switching contexts.

These charts enable leaders to assess performance in two ways: by risk magnitude, which measures the overall impact of fixes on reducing risk, and by number of fixes, which tracks productivity based on the total closed tickets per team. This dual view not only provides a balanced perspective on both the quality and quantity of remediation work but also helps identify high-impact teams, spot stagnation where change frequency is low, and uncover bottlenecks or ownership gaps before SLAs slip.

Security leaders can use these insights to allocate resources where they’ll deliver the greatest risk reduction, provide targeted coaching to underperforming teams, set fair benchmarks and quarterly targets, and communicate clear progress to executives and boards. It also creates an opportunity to celebrate and recognise teams consistently delivering impactful changes, reinforcing the right remediation behaviours across the organisation.

Top 10 Libraries/Dependencies

The Top 10 Libraries/Dependencies chart, previously exclusive to the Security Dashboard, is now available on the Teams Dashboard, bringing powerful dependency-level insights directly to the teams responsible for remediation. This feature highlights the libraries and dependencies contributing the highest risk, factoring in both the number and severity of findings, as well as the number of findings linked to these applications.

By exposing these insights at the team level, security teams can identify high-risk dependencies early, prioritise library upgrades or patches, and reduce systemic vulnerabilities tied to widely used dependencies. The inclusion of severity breakdowns ensures teams can focus on the most impactful fixes first, rather than being overwhelmed by volume alone.

This addition empowers teams to take direct ownership of dependency risks, speeding up response times, improving collaboration with security leads, and ensuring that fixes are aligned with overall risk reduction priorities.

Other Enhancements

Lifecycle management for Imported Assets and Findings

You can now set custom grace periods for the automatic closure of findings or assets that are not re-imported within a defined number of days. This allows you to fine-tune visibility rules so that only relevant, up-to-date items remain on your dashboards.

Grace periods can be configured per asset grouping, giving you the flexibility to align closure timelines with your organisation’s operational priorities. For example, you might set a longer grace period for container assets, which may be imported manually on a less frequent schedule, while assigning a shorter grace period for cloud assets that are regularly updated through API imports.

This feature supports both manual and API-based imports, enabling you to tailor closure policies to your specific workflows, whether that’s high-frequency automated ingestion or occasional, targeted manual updates. The result is a cleaner, more relevant set of findings and assets that better reflect your true security posture.

Filters saved for Campaigns summary

The Campaigns summary now remembers selected filters to ensure that you have streamlined access to the Campaigns that matter most to you.

New Notifications area

The new Notifications Area centralises all your important updates in one place, making it easier to stay on top of what matters most. Notifications are organised into three categories, AlertsWarnings, and Info, so you can quickly filter and focus on the updates that are most relevant to you.

Alerts highlight critical issues that require immediate attention, while Warnings flag potential risks or conditions that may need action soon. Info keeps you informed about non-urgent updates, such as new feature releases, enhancements, or general system announcements.

With filtering options and an unread-first view, the Notifications Area ensures you won’t miss essential updates while still being able to browse less urgent information.


Ready to Slash the Noise?

If you’re tired of chasing vulnerabilities that don’t matter—or worse, don’t even exist in runtime—Phoenix Security’s Container Lineage, Contextual Deduplication, and Throttling features are built to cut your backlog down to what’s real.

Not noise. Not theory. Actionable security.

📍 Want to dive deeper?

How Phoenix Security Can Help with Container Vulnerability Sprawl

attack graph phoenix security
ASPM

Application Security and Vulnerability Management teams are tired of alert fatigue. Engineers are buried in vulnerability lists that say everything is critical. And leadership? They want to know what actually matters.

Phoenix Security changes the game.


With our AI Second Application Security Posture Management (ASPM), powered by container lineage, contextual deduplication, and container throttling, we help organizations reduce container false positives up to 98% and remove up to 78% of false positives in container open source libraries, pointing the team to the right remediation

Why Container Lineage Matters:

Most platforms tell you there’s a problem. Phoenix Security tells you:

  • Where it lives (code, build, container, cloud)
  • Who owns it
  • If it’s running
  • If it’s exploitable
  • How to fix it

All of this is delivered in one dynamic, prioritized list, mapped to the real attack paths and business impact of your applications.


Here’s What You Get:

  • Contextual Intelligence from Code to Runtime: Understand which vulnerable components are actually deployed and reachable in production, not just listed in a manifest.
  • Noise Reduction with Automated Throttling: Disable inactive container alerts and slash duplicate findings by over 90%, letting your team focus on the vulnerabilities that matter.
  • 4D Risk Scoring That Maps to Real-World Threats: Built-in exploit intelligence, Probability of exploitation, EPSS, exposure level, and business impact baked into a customizable formula. No more CVSS-only pipelines.

Vulnerability overload isn’t a badge of diligence—it’s a liability.

Container lineage in Phoenix Security helps you shut down false positives, stop chasing ghosts, and start solving the right problems.

👉 Book a demo today

Or learn how Phoenix Security slashed millions in wasted dev time for fintech, retail, and adtech leaders.

Get in control of your Application Security posture and Vulnerability management

Rowan supports customers throughout their journey at Phoenix Security, ensuring smooth onboarding, responsive support, and lasting success. With a background in a Mathematics and Data Science degree, he combines analytical insight with clear communication to bridge technical solutions and customer needs. He first joined Phoenix Security as an intern, where he documented use cases and built knowledge base content — experience that laid the foundation for his current role driving customer satisfaction and success.

Discuss this blog with our community on Slack

Join our AppSec Phoenix community on Slack to discuss this blog and other news with our professional security team

From our Blog

The team at Phoenix Security pleased to bring you another set of new application security (ASPM) features and improvements for vulnerability management across application and cloud security engines. This release builds on top of previous releases with key additions and progress across multiple areas of the platform. Application Security Posture Management (ASPM) Enhancements • New Weighted Asset Risk Formula – Refined risk aggregation for tailored vulnerability management. • Auto-Approval of Risk Exceptions – Accelerate mitigation by automating security approvals. • Enhanced Risk Explorer & Business Unit Insights – Monitor and analyze risk exposure by business units for better prioritization. Vulnerability & Asset Management • Link Findings to Existing Tickets – Seamless GitHub, ServiceNow, and Azure DevOps integration. • Multi-Finding Ticketing for ADO – Group multiple vulnerabilities in a single ticket for better workflow management. • Filter by Business Unit, CWE, Ownership, and Deployment Environment – Target vulnerabilities with precision using advanced filtering. Cyber Threat Intelligence & Security Enhancements • Cyber Threat Intelligence Premium – Access 128,000+ exploits for better exploitability and fixability metrics. • SBOM, Container SBOM & Open Source Artifact Analysis – Conduct deep security analysis with reachability insights. • Enhanced Lacework Container Management – Fetch and analyze running container details for better security reporting. • REST API Enhancements – Use asset tags for automated deployments and streamline security processes. Other Key Updates • CVE & CWE Columns Added – Compare vulnerabilities more effectively. • Custom Status Management for Findings – Personalize security workflows with custom status configurations. • Impact & Risk Explorer Side Panel – Gain heatmap-based insights into vulnerability distribution and team risk impact. 🚀 Stay ahead of vulnerabilities, optimize risk assessment, and enhance security efficiency with Phoenix Security’s latest features! 🚀
Rowan Scott
DevSecOps isn’t one-size-fits-all—especially when it comes to metrics. Every team, every stakeholder, every layer of the application stack measures progress and risk differently. Phoenix Security bridges these gaps with a unified platform that connects attribution, remediation, and real-time risk insights across the code-to-cloud continuum, redefining the standard for Application Security beyond traditional ASPM.
Ksenia Mityushkina
Derek

Derek Fisher

Head of product security at a global fintech

Derek Fisher – Head of product security at a global fintech. Speaker, instructor, and author in application security.

Derek is an award winning author of a children’s book series in cybersecurity as well as the author of “The Application Security Handbook.” He is a university instructor at Temple University where he teaches software development security to undergraduate and graduate students. He is a speaker on topics in the cybersecurity space and has led teams, large and small, at organizations in the healthcare and financial industries. He has built and matured information security teams as well as implemented organizational information security strategies to reduce the organizations risk.

Derek got his start in the hardware engineering space where he learned about designing circuits and building assemblies for commercial and military applications. He later pursued a computer science degree in order to advance a career in software development. This is where Derek was introduced to cybersecurity and soon caught the bug. He found a mentor to help him grow in cybersecurity and then pursued a graduate degree in the subject.

Since then Derek has worked in the product security space as an architect and leader. He has led teams to deliver more secure software in organizations from multiple industries. His focus has been to raise the security awareness of the engineering organization while maintaining a practice of secure code development, delivery, and operations.

In his role, Jeevan handles a range of tasks, from architecting security solutions to collaborating with Engineering Leadership to address security vulnerabilities at scale and embed security into the fabric of the organization.

Jeevan Singh

Jeevan Singh

Founder of Manicode Security

Jeevan Singh is the Director of Security Engineering at Rippling, with a background spanning various Engineering and Security leadership roles over the course of his career. He’s dedicated to the integration of security practices into software development, working to create a security-aware culture within organizations and imparting security best practices to the team.
In his role, Jeevan handles a range of tasks, from architecting security solutions to collaborating with Engineering Leadership to address security vulnerabilities at scale and embed security into the fabric of the organization.

James

James Berthoty

Founder of Latio Tech

James Berthoty has over ten years of experience across product and security domains. He founded Latio Tech to help companies find the right security tools for their needs without vendor bias.

christophe

Christophe Parisel

Senior Cloud Security Architect

Senior Cloud Security Architect

Chris

Chris Romeo

Co-Founder
Security Journey

Chris Romeo is a leading voice and thinker in application security, threat modeling, and security champions and the CEO of Devici and General Partner at Kerr Ventures. Chris hosts the award-winning “Application Security Podcast,” “The Security Table,” and “The Threat Modeling Podcast” and is a highly rated industry speaker and trainer, featured at the RSA Conference, the AppSec Village @ DefCon, OWASP Global AppSec, ISC2 Security Congress, InfoSec World and All Day DevOps. Chris founded Security Journey, a security education company, leading to an exit in 2022. Chris was the Chief Security Advocate at Cisco, spreading security knowledge through education and champion programs. Chris has twenty-six years of security experience, holding positions across the gamut, including application security, security engineering, incident response, and various Executive roles. Chris holds the CISSP and CSSLP certifications.

jim

Jim Manico

Founder of Manicode Security

Jim Manico is the founder of Manicode Security, where he trains software developers on secure coding and security engineering. Jim is also the founder of Brakeman Security, Inc. and an investor/advisor for Signal Sciences. He is the author of Iron-Clad Java: Building Secure Web Applications (McGraw-Hill), a frequent speaker on secure software practices, and a member of the JavaOne Rockstar speaker community. Jim is also a volunteer for and former board member of the OWASP foundation.

Join our Mailing list!

Get all the latest news, exclusive deals, and feature updates.

The IKIGAI concept
x  Powerful Protection for WordPress, from Shield Security
This Site Is Protected By
ShieldPRO