How AdTech company Slashed Container Vulnerabilities by 78% maintaining efficient team performance

Maximizing DevSecOps Efficiency with Contextual ASPM from Phoenix Security

IAS & Phoenix Security

Our client is a global leader in media measurement and digital ad optimization, sought to streamline vulnerability management across its complex code-to-cloud infrastructure. With engineering resources tightly allocated and containers sprawling across pipelines and cloud environments, they needed a smarter way to reduce noise, prioritize threats, and drive remediation — without adding security headcount.

The Phoenix Security platform helped sift through the clutter. By leveraging code-to-cloud contextual deduplication, intelligent team mapping, and pipeline-aware container lineage, our clients eliminated redundant vulnerabilities and aligned security data with engineering workflows.

Key Achievement from the client's Team

Our client collaborated with Phoenix Security to enhance its DevSecOps capabilities and drive precision in vulnerability management across cloud-native environments. By implementing Phoenix Security’s platform, they were able to unify application security insights from source to runtime, streamline code-to-cloud security workflows, and execute cloud misconfiguration remediation with confidence. This partnership underscores how intelligent and automated ASPM capability can elevate engineering productivity, while also tightening security controls. Through this collaboration, AdTech client achieved substantial gains in application security performance and vulnerability reduction, including:

Reduction in Active Container Vulnerabilities

0 %

Slashed container vulnerability false positive driving clarity and focus across engineering teams.

Saved in Developer Time

0 K+

Hours saved in developer time by optimization of vulnerability data
and prioritization workflows.

Decrease in SCA-to-Container Vuln Noise

0 %

Reduced false positives duplicated code and container issues unlocking a clear path from source to runtime.

Challenges

Phoenix Security & IAS Challenge
Phoenix Security & IAS Solution

Phoenix Security’s Solution

1. Contextual Deduplication (Code2Cloud):

Phoenix Security’s ASPM platform implemented a 78% reduction in container vulnerabilities by filtering out inactive and non-critical issues via container throttling. 

2. Precision in SCA-to-Container Correlation:

By mapping SCA vulnerabilities directly to container images, Phoenix achieved an 82.4% reduction in SCA-related container issues. This tight linkage between source code and running containers helped our clients stop wasting time on theoretical risks that never made it to runtime.

3. Automated Team Inheritance and Lineage Tracking:

Application-to-team assignment was automated using container lineage tagging, ensuring the right teams were accountable without manual intervention. This enabled faster triage and improved SLA compliance for vulnerability remediation.

4. Container Lineage Awareness:

By analyzing container deployment history and image usage across environments, Phoenix filtered out 78% of vulnerabilities tied to stale containers. Teams focused only on assets actively deployed in production — reducing noise and eliminating unnecessary remediation cycles.

Impact

This client exemplifies how application security can evolve beyond traditional vulnerability overload. With Phoenix Security, they operationalized ASPM, transforming a sprawling security backlog into actionable, team-owned intelligence. This case shows what’s possible when DevSecOps teams stop chasing noise and start acting on what matters.

1. Reduced Vulnerability Noise

Over 20K redundant container vulnerabilities eliminated from engineering dashboards.

2. Enhanced DevSecOps Efficiency

Engineering focus narrowed to high-risk, runtime-relevant issues with clear ownership.

3. Faster Time-to-Remediation

Streamlined prioritization and automated ownership accelerated critical patch timelines.

See more cases

Code 2 Cloud

Bazaarvoice

By integrating Phoenix Security into Backstage, a leading developer portal, the organization unified visibility into application security across all teams. Developers could now access vulnerability insights, remediation actions, and risk scores directly within their daily workflows. This seamless integration reduced context switching, improved developer efficiency, and accelerated secure development practices.

Control

Clear.Bank

Seamlessly integrate container security into your existing workflows with native integrations, ensuring continuous protection across your DevOps pipeline. Automate vulnerability management, policy enforcement, and real-time threat detection within your containerized environments. Enhance security without disrupting development speed, leveraging deep integration with your cloud and orchestration tools.

CISO View

CAPCO

A leading enterprise leveraged CISO View to gain real-time insights into their security landscape, enabling proactive risk management. By integrating container security and native security tools, the organization streamlined threat detection and compliance monitoring across cloud and on-prem environments. This enhanced visibility allowed the CISO to make data-driven decisions, reducing vulnerabilities and improving overall security resilience.

Industry Recognition

One Platform.

Company-Wide Benefits

"Contextualized and unified references with application architecture."

Comprehensive coverage and real-time threat detection. It helps manage compliance requirements and can integrate with other tools especially feeding SIEM. Certain tasks such as vulnerability scanning and patch management can be automated through scheduling. Depending on use case its checks on ACT risks and API deploy are valuable to check for errors or patterns.

Reviewer: Global Compliance Program Manager
Industry: IT Services
Deployment Architecture: Cloud (SaaS or PaaS or IaaS)

"Effortless Customization Reduces User Workload, But Costs Unclear”

It has a simple and intuitive UI. Excellent, user-friendly interface with lots of customization options makes it fruitful to use and helps achieve our specific security requirements easily.

Reviewer: Global Compliance Program Manager
Industry: IT Services
Deployment Architecture: Cloud (SaaS or PaaS or IaaS)

"Phoenix is a User Friendly Product That Provides A Wide Range of Powerful Functionality."

The product is easy to use It has a lot of functionality, which is also easy to navigate between The functionality within the platform is powerful and connects up to give a platform that can improve risk management at every level.

Reviewer: Global Compliance Program Manager
Industry: IT Services
Deployment Architecture: Cloud (SaaS or PaaS or IaaS)

"Essential product for security teams - AppSec and CSPM in a single view.”

The Phoenix team is quick to respond and always willing to help. They have implemented custom features and listened to our feedback. The product is progressing so quickly for a startup and I love having input into what we need next. What makes them unique is that they have done our job so understand the pain AppSecOPS teams go through.

Reviewer: Principal Security Engineer
Industry: Banking
Deployment Architecture: Cloud (SaaS or PaaS or IaaS)

"Contextualized and unified references with application architecture."

Comprehensive coverage and real-time threat detection. It helps manage compliance requirements and can integrate with other tools especially feeding SIEM. Certain tasks such as vulnerability scanning and patch management can be automated through scheduling. Depending on use case its checks on ACT risks and API deploy are valuable to check for errors or patterns.

Reviewer: Global Compliance Program Manager
Industry: IT Services
Deployment Architecture: Cloud (SaaS or PaaS or IaaS)

"Phoenix is a User Friendly Product That Provides A Wide Range of Powerful Functionality."

The product is easy to use It has a lot of functionality, which is also easy to navigate between The functionality within the platform is powerful and connects up to give a platform that can improve risk management at every level.

Reviewer: Global Compliance Program Manager
Industry: IT Services
Deployment Architecture: Cloud (SaaS or PaaS or IaaS)

Resources

Listen to the latest Phoenix Security  podcast

Listen to the latest AppSec Phoenix podcast

Get Started with AppSec Phoenix

News

Read the latest AppSec Phoenix news

Blog

Read the latest Blogs

Events

Discover our events

Talks

Explore the talks

Whitepapers

Discover Whitepapers

News

Read the latest News

Videos

Discover video resources

Get in control

More than 1000 Users and 350 Organizations trust us

Dashboard
Derek

Derek Fisher

Head of product security at a global fintech

Derek Fisher – Head of product security at a global fintech. Speaker, instructor, and author in application security.

Derek is an award winning author of a children’s book series in cybersecurity as well as the author of “The Application Security Handbook.” He is a university instructor at Temple University where he teaches software development security to undergraduate and graduate students. He is a speaker on topics in the cybersecurity space and has led teams, large and small, at organizations in the healthcare and financial industries. He has built and matured information security teams as well as implemented organizational information security strategies to reduce the organizations risk.

Derek got his start in the hardware engineering space where he learned about designing circuits and building assemblies for commercial and military applications. He later pursued a computer science degree in order to advance a career in software development. This is where Derek was introduced to cybersecurity and soon caught the bug. He found a mentor to help him grow in cybersecurity and then pursued a graduate degree in the subject.

Since then Derek has worked in the product security space as an architect and leader. He has led teams to deliver more secure software in organizations from multiple industries. His focus has been to raise the security awareness of the engineering organization while maintaining a practice of secure code development, delivery, and operations.

In his role, Jeevan handles a range of tasks, from architecting security solutions to collaborating with Engineering Leadership to address security vulnerabilities at scale and embed security into the fabric of the organization.

Jeevan Singh

Jeevan Singh

Founder of Manicode Security

Jeevan Singh is the Director of Security Engineering at Rippling, with a background spanning various Engineering and Security leadership roles over the course of his career. He’s dedicated to the integration of security practices into software development, working to create a security-aware culture within organizations and imparting security best practices to the team.
In his role, Jeevan handles a range of tasks, from architecting security solutions to collaborating with Engineering Leadership to address security vulnerabilities at scale and embed security into the fabric of the organization.

James

James Berthoty

Founder of Latio Tech

James Berthoty has over ten years of experience across product and security domains. He founded Latio Tech to help companies find the right security tools for their needs without vendor bias.

christophe

Christophe Parisel

Senior Cloud Security Architect

Senior Cloud Security Architect

Chris

Chris Romeo

Co-Founder
Security Journey

Chris Romeo is a leading voice and thinker in application security, threat modeling, and security champions and the CEO of Devici and General Partner at Kerr Ventures. Chris hosts the award-winning “Application Security Podcast,” “The Security Table,” and “The Threat Modeling Podcast” and is a highly rated industry speaker and trainer, featured at the RSA Conference, the AppSec Village @ DefCon, OWASP Global AppSec, ISC2 Security Congress, InfoSec World and All Day DevOps. Chris founded Security Journey, a security education company, leading to an exit in 2022. Chris was the Chief Security Advocate at Cisco, spreading security knowledge through education and champion programs. Chris has twenty-six years of security experience, holding positions across the gamut, including application security, security engineering, incident response, and various Executive roles. Chris holds the CISSP and CSSLP certifications.

jim

Jim Manico

Founder of Manicode Security

Jim Manico is the founder of Manicode Security, where he trains software developers on secure coding and security engineering. Jim is also the founder of Brakeman Security, Inc. and an investor/advisor for Signal Sciences. He is the author of Iron-Clad Java: Building Secure Web Applications (McGraw-Hill), a frequent speaker on secure software practices, and a member of the JavaOne Rockstar speaker community. Jim is also a volunteer for and former board member of the OWASP foundation.

Join our Mailing list!

Get all the latest news, exclusive deals, and feature updates.

The IKIGAI concept
x  Powerful Protection for WordPress, from Shield Security
This Site Is Protected By
ShieldPRO