Case study

Precision Over Noise: How Bazaarvoice Cut Container Vulnerabilities by 94%

Accelerating DevSecOps and Code-to-Cloud Security with Phoenix Security

Bazaarvoice, a global leader in user-generated content solutions, faced the daunting challenge of managing container security at scale without drowning developers in alert fatigue. With hundreds of container images spinning up and down across development environments, the signal-to-noise ratio in vulnerability reporting had reached unsustainable levels.

The Phoenix Security ASPM platform provided the strategic clarity they needed — transforming raw data into actionable risk intelligence across their software supply chain.

Bazaar Voice achievement leveraging Phoenix Security

Bazaarvoice partnered with Phoenix Security to strengthen their DevSecOps pipeline with intelligent vulnerability management and scalable application security. Leveraging Phoenix’s ASPM platform, Bazaarvoice streamlined code-to-cloud security operations, reclaimed critical developer hours, and achieved targeted cloud misconfiguration remediation. This collaboration showcases how modern, automated application security programs can reduce risk exposure while enabling engineering velocity. By integrating Phoenix Security, Bazaarvoice realized measurable improvements across key DevSecOps metrics:

Reduction in Container Vulnerabilities

0 %

From 190K to 9K — cutting through noise and focusing only on exploitable, active issues.

Developer Time Saved

$ 0 M

Equivalent to 180K+ hours of remediation time reclaimed for core engineering team work.

Rules Automatically Mapped to Teams

0 K

Full team inheritance from Backstage enabled accurate ownership and immediate action.

From CEO Down Phoenix Security is committed to excellence and serving the customer not just during the sales cycle but throughout the year.

– CISO, Bazaarvoice

The Challenge

Alert Volume vs. Developer Focus

Container-based development introduced powerful flexibility, but also opened the door to sprawling misconfiguration, legacy image exposure, and a flood of low-priority findings. Bazaarvoice needed to answer one fundamental question: How do we throttle the noise and focus only on what’s actively running and truly exploitable?

Phoenix Security & Bazaarvoice Challenge

I’ve seen many solutions to handle vulnerabilities over the years. Phoenix Security is the only one that truly grasps the complexity of modern vulnerability management, considering both code and cloud vulnerabilities.

– Nate Sanders, Head of Vulnerability Management, Bazaarvoice

Phoenix Security & Bazaarvoice solution

The Solution

Context-Driven Container Image Throttling

By integrating Phoenix Security, Bazaarvoice implemented aggressive container throttling — a feature that slashed vulnerability volume by identifying only those impacting active containers.

1. 94% Reduction in Vulnerabilities:

By filtering out inactive containers, Bazaarvoice cut flagged vulnerabilities from 190K to just 9K — without sacrificing coverage.

2. $6.3M in Dev Time Saved

Translating to over 180K hours of avoided remediation based on industry-standard vulnerability resolution costs.

3. Automatic Team Inheritance:

Phoenix traced 32K+ rules from Backstage to applications and teams, eliminating manual triage and accelerating remediation.

This level of contextualization transformed container security from a bulk alert system into a surgical tool — enabling teams to act only on real risk, not theoretical vulnerabilities.

In just one month, the team achieved zero critical vulnerabilities and a 40% reduction in high-risk issues by applying Phoenix Security’s recommendations.

– Nick, Security Engineering lead, Bazaarvoice

Key Outcomes

From Cloud Misconfigurations to Intelligent Remediation

1. Code-to-Cloud Clarity:

Real-time visibility into which vulnerabilities map to live infrastructure eliminated guesswork and reclaimed developer bandwidth.

2. Application-Aware Security:

Tied vulnerabilities to application ownership, enabling DevSecOps teams to prioritize and resolve with precision.

3. Noise Reduction at Scale:

Legacy images and inactive workloads no longer polluted the risk signal, restoring trust in the vulnerability data.

Bazaarvoice achieved a new equilibrium in vulnerability management — one that scaled security operations without scaling headcount.

See more cases

Security Champion

IAS

A global tech company implemented a scalable Security Champion program to embed security ownership across development teams. By training champions and integrating security into daily workflows, the organization fostered a proactive security culture. This approach significantly improved vulnerability response times and strengthened collaboration between engineering and security at scale.

Control

Clear.Bank

Seamlessly integrate container security into your existing workflows with native integrations, ensuring continuous protection across your DevOps pipeline. Automate vulnerability management, policy enforcement, and real-time threat detection within your containerized environments. Enhance security without disrupting development speed, leveraging deep integration with your cloud and orchestration tools.

CISO View

CAPCO

A leading enterprise leveraged CISO View to gain real-time insights into their security landscape, enabling proactive risk management. By integrating container security and native security tools, the organization streamlined threat detection and compliance monitoring across cloud and on-prem environments. This enhanced visibility allowed the CISO to make data-driven decisions, reducing vulnerabilities and improving overall security resilience.

Industry Recognition

One Platform.

Company-Wide Benefits

"Contextualized and unified references with application architecture."

Comprehensive coverage and real-time threat detection. It helps manage compliance requirements and can integrate with other tools especially feeding SIEM. Certain tasks such as vulnerability scanning and patch management can be automated through scheduling. Depending on use case its checks on ACT risks and API deploy are valuable to check for errors or patterns.

Reviewer: Global Compliance Program Manager
Industry: IT Services
Deployment Architecture: Cloud (SaaS or PaaS or IaaS)

"Effortless Customization Reduces User Workload, But Costs Unclear”

It has a simple and intuitive UI. Excellent, user-friendly interface with lots of customization options makes it fruitful to use and helps achieve our specific security requirements easily.

Reviewer: Global Compliance Program Manager
Industry: IT Services
Deployment Architecture: Cloud (SaaS or PaaS or IaaS)

"Phoenix is a User Friendly Product That Provides A Wide Range of Powerful Functionality."

The product is easy to use It has a lot of functionality, which is also easy to navigate between The functionality within the platform is powerful and connects up to give a platform that can improve risk management at every level.

Reviewer: Global Compliance Program Manager
Industry: IT Services
Deployment Architecture: Cloud (SaaS or PaaS or IaaS)

"Essential product for security teams - AppSec and CSPM in a single view.”

The Phoenix team is quick to respond and always willing to help. They have implemented custom features and listened to our feedback. The product is progressing so quickly for a startup and I love having input into what we need next. What makes them unique is that they have done our job so understand the pain AppSecOPS teams go through.

Reviewer: Principal Security Engineer
Industry: Banking
Deployment Architecture: Cloud (SaaS or PaaS or IaaS)

"Contextualized and unified references with application architecture."

Comprehensive coverage and real-time threat detection. It helps manage compliance requirements and can integrate with other tools especially feeding SIEM. Certain tasks such as vulnerability scanning and patch management can be automated through scheduling. Depending on use case its checks on ACT risks and API deploy are valuable to check for errors or patterns.

Reviewer: Global Compliance Program Manager
Industry: IT Services
Deployment Architecture: Cloud (SaaS or PaaS or IaaS)

"Phoenix is a User Friendly Product That Provides A Wide Range of Powerful Functionality."

The product is easy to use It has a lot of functionality, which is also easy to navigate between The functionality within the platform is powerful and connects up to give a platform that can improve risk management at every level.

Reviewer: Global Compliance Program Manager
Industry: IT Services
Deployment Architecture: Cloud (SaaS or PaaS or IaaS)

Resources

Listen to the latest Phoenix Security  podcast

Listen to the latest AppSec Phoenix podcast

Get Started with AppSec Phoenix

News

Read the latest AppSec Phoenix news

Blog

Read the latest Blogs

Events

Discover our events

Talks

Explore the talks

Whitepapers

Discover Whitepapers

News

Read the latest News

Videos

Discover video resources

Get in control

More than 1000 Users and 350 Organizations trust us

Dashboard
Derek

Derek Fisher

Head of product security at a global fintech

Derek Fisher – Head of product security at a global fintech. Speaker, instructor, and author in application security.

Derek is an award winning author of a children’s book series in cybersecurity as well as the author of “The Application Security Handbook.” He is a university instructor at Temple University where he teaches software development security to undergraduate and graduate students. He is a speaker on topics in the cybersecurity space and has led teams, large and small, at organizations in the healthcare and financial industries. He has built and matured information security teams as well as implemented organizational information security strategies to reduce the organizations risk.

Derek got his start in the hardware engineering space where he learned about designing circuits and building assemblies for commercial and military applications. He later pursued a computer science degree in order to advance a career in software development. This is where Derek was introduced to cybersecurity and soon caught the bug. He found a mentor to help him grow in cybersecurity and then pursued a graduate degree in the subject.

Since then Derek has worked in the product security space as an architect and leader. He has led teams to deliver more secure software in organizations from multiple industries. His focus has been to raise the security awareness of the engineering organization while maintaining a practice of secure code development, delivery, and operations.

In his role, Jeevan handles a range of tasks, from architecting security solutions to collaborating with Engineering Leadership to address security vulnerabilities at scale and embed security into the fabric of the organization.

Jeevan Singh

Jeevan Singh

Founder of Manicode Security

Jeevan Singh is the Director of Security Engineering at Rippling, with a background spanning various Engineering and Security leadership roles over the course of his career. He’s dedicated to the integration of security practices into software development, working to create a security-aware culture within organizations and imparting security best practices to the team.
In his role, Jeevan handles a range of tasks, from architecting security solutions to collaborating with Engineering Leadership to address security vulnerabilities at scale and embed security into the fabric of the organization.

James

James Berthoty

Founder of Latio Tech

James Berthoty has over ten years of experience across product and security domains. He founded Latio Tech to help companies find the right security tools for their needs without vendor bias.

christophe

Christophe Parisel

Senior Cloud Security Architect

Senior Cloud Security Architect

Chris

Chris Romeo

Co-Founder
Security Journey

Chris Romeo is a leading voice and thinker in application security, threat modeling, and security champions and the CEO of Devici and General Partner at Kerr Ventures. Chris hosts the award-winning “Application Security Podcast,” “The Security Table,” and “The Threat Modeling Podcast” and is a highly rated industry speaker and trainer, featured at the RSA Conference, the AppSec Village @ DefCon, OWASP Global AppSec, ISC2 Security Congress, InfoSec World and All Day DevOps. Chris founded Security Journey, a security education company, leading to an exit in 2022. Chris was the Chief Security Advocate at Cisco, spreading security knowledge through education and champion programs. Chris has twenty-six years of security experience, holding positions across the gamut, including application security, security engineering, incident response, and various Executive roles. Chris holds the CISSP and CSSLP certifications.

jim

Jim Manico

Founder of Manicode Security

Jim Manico is the founder of Manicode Security, where he trains software developers on secure coding and security engineering. Jim is also the founder of Brakeman Security, Inc. and an investor/advisor for Signal Sciences. He is the author of Iron-Clad Java: Building Secure Web Applications (McGraw-Hill), a frequent speaker on secure software practices, and a member of the JavaOne Rockstar speaker community. Jim is also a volunteer for and former board member of the OWASP foundation.

Join our Mailing list!

Get all the latest news, exclusive deals, and feature updates.

The IKIGAI concept
x  Powerful Protection for WordPress, from Shield Security
This Site Is Protected By
ShieldPRO