Join our Mailing list!
Get all the latest news, exclusive deals, and feature updates.
Accelerating DevSecOps and Code-to-Cloud Security with Phoenix Security
Bazaarvoice, a global leader in user-generated content solutions, faced the daunting challenge of managing container security at scale without drowning developers in alert fatigue. With hundreds of container images spinning up and down across development environments, the signal-to-noise ratio in vulnerability reporting had reached unsustainable levels.
The Phoenix Security ASPM platform provided the strategic clarity they needed — transforming raw data into actionable risk intelligence across their software supply chain.
Bazaarvoice partnered with Phoenix Security to strengthen their DevSecOps pipeline with intelligent vulnerability management and scalable application security. Leveraging Phoenix’s ASPM platform, Bazaarvoice streamlined code-to-cloud security operations, reclaimed critical developer hours, and achieved targeted cloud misconfiguration remediation. This collaboration showcases how modern, automated application security programs can reduce risk exposure while enabling engineering velocity. By integrating Phoenix Security, Bazaarvoice realized measurable improvements across key DevSecOps metrics:
From 190K to 9K — cutting through noise and focusing only on exploitable, active issues.
Equivalent to 180K+ hours of remediation time reclaimed for core engineering team work.
Full team inheritance from Backstage enabled accurate ownership and immediate action.
From CEO Down Phoenix Security is committed to excellence and serving the customer not just during the sales cycle but throughout the year.
– CISO, Bazaarvoice
Container-based development introduced powerful flexibility, but also opened the door to sprawling misconfiguration, legacy image exposure, and a flood of low-priority findings. Bazaarvoice needed to answer one fundamental question: How do we throttle the noise and focus only on what’s actively running and truly exploitable?
I’ve seen many solutions to handle vulnerabilities over the years. Phoenix Security is the only one that truly grasps the complexity of modern vulnerability management, considering both code and cloud vulnerabilities.
– Nate Sanders, Head of Vulnerability Management, Bazaarvoice
By integrating Phoenix Security, Bazaarvoice implemented aggressive container throttling — a feature that slashed vulnerability volume by identifying only those impacting active containers.
By filtering out inactive containers, Bazaarvoice cut flagged vulnerabilities from 190K to just 9K — without sacrificing coverage.
Translating to over 180K hours of avoided remediation based on industry-standard vulnerability resolution costs.
Phoenix traced 32K+ rules from Backstage to applications and teams, eliminating manual triage and accelerating remediation.
This level of contextualization transformed container security from a bulk alert system into a surgical tool — enabling teams to act only on real risk, not theoretical vulnerabilities.
In just one month, the team achieved zero critical vulnerabilities and a 40% reduction in high-risk issues by applying Phoenix Security’s recommendations.
– Nick, Security Engineering lead, Bazaarvoice
Real-time visibility into which vulnerabilities map to live infrastructure eliminated guesswork and reclaimed developer bandwidth.
Tied vulnerabilities to application ownership, enabling DevSecOps teams to prioritize and resolve with precision.
Legacy images and inactive workloads no longer polluted the risk signal, restoring trust in the vulnerability data.
Bazaarvoice achieved a new equilibrium in vulnerability management — one that scaled security operations without scaling headcount.
A global tech company implemented a scalable Security Champion program to embed security ownership across development teams. By training champions and integrating security into daily workflows, the organization fostered a proactive security culture. This approach significantly improved vulnerability response times and strengthened collaboration between engineering and security at scale.
Seamlessly integrate container security into your existing workflows with native integrations, ensuring continuous protection across your DevOps pipeline. Automate vulnerability management, policy enforcement, and real-time threat detection within your containerized environments. Enhance security without disrupting development speed, leveraging deep integration with your cloud and orchestration tools.
A leading enterprise leveraged CISO View to gain real-time insights into their security landscape, enabling proactive risk management. By integrating container security and native security tools, the organization streamlined threat detection and compliance monitoring across cloud and on-prem environments. This enhanced visibility allowed the CISO to make data-driven decisions, reducing vulnerabilities and improving overall security resilience.
Comprehensive coverage and real-time threat detection. It helps manage compliance requirements and can integrate with other tools especially feeding SIEM. Certain tasks such as vulnerability scanning and patch management can be automated through scheduling. Depending on use case its checks on ACT risks and API deploy are valuable to check for errors or patterns.
Reviewer: Global Compliance Program Manager
Industry: IT Services
Deployment Architecture: Cloud (SaaS or PaaS or IaaS)
It has a simple and intuitive UI. Excellent, user-friendly interface with lots of customization options makes it fruitful to use and helps achieve our specific security requirements easily.
Reviewer: Global Compliance Program Manager
Industry: IT Services
Deployment Architecture: Cloud (SaaS or PaaS or IaaS)
The product is easy to use It has a lot of functionality, which is also easy to navigate between The functionality within the platform is powerful and connects up to give a platform that can improve risk management at every level.
Reviewer: Global Compliance Program Manager
Industry: IT Services
Deployment Architecture: Cloud (SaaS or PaaS or IaaS)
The Phoenix team is quick to respond and always willing to help. They have implemented custom features and listened to our feedback. The product is progressing so quickly for a startup and I love having input into what we need next. What makes them unique is that they have done our job so understand the pain AppSecOPS teams go through.
Reviewer: Principal Security Engineer
Industry: Banking
Deployment Architecture: Cloud (SaaS or PaaS or IaaS)
Comprehensive coverage and real-time threat detection. It helps manage compliance requirements and can integrate with other tools especially feeding SIEM. Certain tasks such as vulnerability scanning and patch management can be automated through scheduling. Depending on use case its checks on ACT risks and API deploy are valuable to check for errors or patterns.
Reviewer: Global Compliance Program Manager
Industry: IT Services
Deployment Architecture: Cloud (SaaS or PaaS or IaaS)
The product is easy to use It has a lot of functionality, which is also easy to navigate between The functionality within the platform is powerful and connects up to give a platform that can improve risk management at every level.
Reviewer: Global Compliance Program Manager
Industry: IT Services
Deployment Architecture: Cloud (SaaS or PaaS or IaaS)
Derek Fisher – Head of product security at a global fintech. Speaker, instructor, and author in application security.
Derek is an award winning author of a children’s book series in cybersecurity as well as the author of “The Application Security Handbook.” He is a university instructor at Temple University where he teaches software development security to undergraduate and graduate students. He is a speaker on topics in the cybersecurity space and has led teams, large and small, at organizations in the healthcare and financial industries. He has built and matured information security teams as well as implemented organizational information security strategies to reduce the organizations risk.
Derek got his start in the hardware engineering space where he learned about designing circuits and building assemblies for commercial and military applications. He later pursued a computer science degree in order to advance a career in software development. This is where Derek was introduced to cybersecurity and soon caught the bug. He found a mentor to help him grow in cybersecurity and then pursued a graduate degree in the subject.
Since then Derek has worked in the product security space as an architect and leader. He has led teams to deliver more secure software in organizations from multiple industries. His focus has been to raise the security awareness of the engineering organization while maintaining a practice of secure code development, delivery, and operations.
In his role, Jeevan handles a range of tasks, from architecting security solutions to collaborating with Engineering Leadership to address security vulnerabilities at scale and embed security into the fabric of the organization.
Jeevan Singh is the Director of Security Engineering at Rippling, with a background spanning various Engineering and Security leadership roles over the course of his career. He’s dedicated to the integration of security practices into software development, working to create a security-aware culture within organizations and imparting security best practices to the team.
In his role, Jeevan handles a range of tasks, from architecting security solutions to collaborating with Engineering Leadership to address security vulnerabilities at scale and embed security into the fabric of the organization.
James Berthoty has over ten years of experience across product and security domains. He founded Latio Tech to help companies find the right security tools for their needs without vendor bias.
Chris Romeo is a leading voice and thinker in application security, threat modeling, and security champions and the CEO of Devici and General Partner at Kerr Ventures. Chris hosts the award-winning “Application Security Podcast,” “The Security Table,” and “The Threat Modeling Podcast” and is a highly rated industry speaker and trainer, featured at the RSA Conference, the AppSec Village @ DefCon, OWASP Global AppSec, ISC2 Security Congress, InfoSec World and All Day DevOps. Chris founded Security Journey, a security education company, leading to an exit in 2022. Chris was the Chief Security Advocate at Cisco, spreading security knowledge through education and champion programs. Chris has twenty-six years of security experience, holding positions across the gamut, including application security, security engineering, incident response, and various Executive roles. Chris holds the CISSP and CSSLP certifications.
Jim Manico is the founder of Manicode Security, where he trains software developers on secure coding and security engineering. Jim is also the founder of Brakeman Security, Inc. and an investor/advisor for Signal Sciences. He is the author of Iron-Clad Java: Building Secure Web Applications (McGraw-Hill), a frequent speaker on secure software practices, and a member of the JavaOne Rockstar speaker community. Jim is also a volunteer for and former board member of the OWASP foundation.
Get all the latest news, exclusive deals, and feature updates.