blog

New Features Released – March-April 22

April Q2 Has new features coming (not April fool)

New Integrations:

Get me to the new amazing features!

New security Screen to capture what is most impacting across the board 

New Quantification screen and Exposure over time

NEW Features

New Integrations:
– Qualys Web
– Burp Suite Professional import 
New Features:

– Security Dashboard screen.Overall Risk dials
– Exposure over time
– Deployable assets and the biggest cybersecurity hitters
– Asset View Cloud
– Containers
– vuln by container
– Exposure Over Time chart in the dashboard.
– Ability to configure a different ticketing platform/project per Component.
– Ability to (de)select all scanner targets while creating Components.
– More Granual Quantification
– Improve scanner and workflow deletion warning popups (info and layout).
– Make the phone optional if MFA is disabled.
– Improve behaviour on long lists of workflow projects/reports.
– Bug Fixes and minor UX/UI Improvements
Since you are here why not subscribe to our amazing mailing list?it takes just one click 🙂 
Get me all the latest news
Did you know we have a book available on how to run application security programmes? 
get your free copy below 
Get the Application Security Compendium here
 

Francesco is an internationally renowned public speaker, with multiple interviews in high-profile publications (eg. Forbes), and an author of numerous books and articles, who utilises his platform to evangelize the importance of Cloud security and cutting-edge technologies on a global scale.

Discuss this blog with our community on Slack

Join our AppSec Phoenix community on Slack to discuss this blog and other news with our professional security team

From our Blog

Does CHAT GPT work on CISA KEV? we analyse the CISA KEV Dataset prioritize vulnerabilities, but does it work with application security? In this analysis, we explore the KEV, EPSS, and APPSEC analysis
Francesco Cipollone
In today’s digital age, the protection of applications is essential to safeguard sensitive data and prevent cyberattacks. One effective way to enhance the security of applications is by implementing application security orchestration and correlation (ASOC). This approach integrates various security tools and processes to provide a more comprehensive and efficient security framework.
Francesco Cipollone
Does CHAT GPT work on CISA KEV? we analyse the CISA KEV Dataset prioritize vulnerabilities, but does it work with application security? In this analysis, we explore the KEV, EPSS, and APPSEC analysis
Francesco Cipollone
In today’s digital age, the protection of applications is essential to safeguard sensitive data and prevent cyberattacks. One effective way to enhance the security of applications is by implementing application security orchestration and correlation (ASOC). This approach integrates various security tools and processes to provide a more comprehensive and efficient security framework.
Francesco Cipollone

Join our Mailing list!

Get all the latest news, exclusive deals, and feature updates.

x Logo: ShieldPRO
This Site Is Protected By
ShieldPRO