Phoenix Security Features – December 2023

The Cloud Security and AppSec teams at Phoenix Security are pleased to bring you another set of new Phoenix Security features and improvements for vulnerability management across application and cloud security engines. This release is full of key additions and progress across multiple areas of the platform.

We are sure that you’ll find these quite interesting!

  • Application Security Posture Management
    • Teams Dashboard
    • Filter Assets and Vulnerabilities by Team
    • Link Teams to Components and Services
    • Triage Findings by Deployment Environment
    • Improved Threat Intelligence with Ransomware Alerts
  • Asset and Vulnerability Management
    • New “Delta” Import Strategy
    • Auto-populate “location” for CSV Imports
    • Easy Triage of Duplicate Findings
    • Improved Tagging Capabilities
    • Set Criticality for Components and Services
    • Manual Closing of Vulnerabilities
  • Integrations
    • Support for Custom Fields in ADO Tickets
    • Improved Asset Aggregation for Qualys Infra
    • Expanded Phoenix REST API
  • Other Improvements
    • Remember User Choices
    • Additional Filtering in the Navigation Graph
    • Table Column Resizing
    • Improve the Risk Breakdown column
    • Remove Limits for Multi-selection in Lists

Application Security Posture Management

Teams Dashboard

With Phoenix, it has always been easy to track the progress of individual teams with our Team dashboards. Now, you can have an overall view of your teams’ performance using the aggregated Teams dashboard.

What is Risk Magnitude? Why Risk Magnitude?

  • The risk magnitude is an aggregate value that measures the vulnerability risk score in the context where the vulnerability manifests and is based on the current state of the probability of exploitation.
  • The Relative risk magnitude is a fairer scoring that takes into account the number of applications and assets that a team maintains,

Here, you can see at a glance which teams carry the highest (or lowest) risk magnitude, which ones have more open vulnerabilities, or which have had the best performance regarding vulnerabilities or risk reduction.

Filter Assets and Vulnerabilities by Team

As part of our team tracking improvements, we have added team filtering capabilities to our Findings and Asset screens. This allows users not only to use those filters directly on the lists, but it enables quick linking to the team’s vulns and assets directly from the team’s dashboards.

Link Teams to Components and Services

Continuing with the team-related improvements, we are increasing the granularity of teams’ association to Applications and Environments.

Users can now link teams directly to Components (Apps) and Services (Envs) by selecting them directly or dynamically through tags.

To provide a complete picture of a team’s scope, the edit team screen now displays all Applications, Environments, Components and Services, regardless of how they are linked to the team.

Get in control of your Application Security posture and Vulnerability management

Triage Findings by Deployment Environment

Phoenix aims to provide users with a clear picture of what is running, especially for vulnerable software and applications. Our Deployed Applications concept underpins this feature.

We have now made the triaging of deployed applications even more powerful by providing a means to quickly select the findings that affect applications deployed in a particular environment directly from the list of findings. Users can also refine their selection by choosing specific applications and/or teams to focus on.

Improved Threat Intelligence with Ransomware Alerts

The number of organizations that became victims of ransomware attacks surged 143% between the first quarter of 2022 and first quarter of this year, as attackers increasingly leveraged zero-day vulnerabilities and one-day flaws to break into target networks – Dark Reading Report

We are continuously bringing additional threat intelligence information to the platform and making sure it’s available to our users where they need it the most.

This time, we add ransomware alert tags to vulnerabilities and assets whenever there is evidence of using the vulnerability in ransomware activities from the various vulnerabilities.

Asset and Vulnerability Management

New “Delta” Import Strategy

Up until now, one of the key premises of assessment import functionality was the uploading of “full” reports, i.e. reports that always include the full list of vulnerabilities found in the scope of the assessment (list of assets) at a given time. This allowed users to get the latest report from a given tool or testing exercise, upload it, and let the platform figure out “what has changed” between this and the previous report.

This is a very powerful and practical approach, but it didn’t cover all the use cases.

With the “delta” import, we are now able to support those use cases where the user has a subset of vulnerabilities that they know exist in certain assets (e.g. repository, website, etc.), but they don’t have a full report of a particular set of assets (assessment scope).

The delta import will create new or update existing vulnerabilities, but it will not try to detect which vulnerabilities have been resolved and, hence, have disappeared from the report.

This feature will also be added to the delta import in the API Vulnerability import. Refer to the Integration or API integration lists for the full list.

Auto-populate “location” for CSV Imports

If a “location” is not provided as part of a CSV import file, the platform will calculate one based on the other data available for each finding.

Easy Triage of Duplicate Findings

Vulnerability triaging has been improved by allowing users to see which findings are potential duplicates easily. This can be done in the findings list and the details page.

Working with duplicates is now even easier using the Duplicate Status filter on the vulnerability list page.

Get in control of your Application Security posture and Vulnerability management

Improved Tagging Capabilities

Tagging is a key feature that allows users to easily mark and keep track of findings, assets and other entities in the Phoenix platform. In many scenarios, those tags come from the vulnerability and assets sources, but sometimes users need or prefer to tag elements directly in Phoenix.

We have expanded our tagging capabilities by allowing users to tag assets directly.

Phoenix Security, vulnerability, Vulnerability management

Furthermore, tagging across findings and assets can now be done in bulk, which makes this feature even more useful for manual tagging.

This can be done even for a whole group of findings.

Set Criticality for Components and Services

One of the main strengths of the Phoenix platform is that it provides context to each vulnerability, adapting the impact that each one has in the risk pasture to the scope affected by it. One of the key elements of contextualisation is the application or environment criticality level, i.e., how critical the app/environment is to the organisation’s business.

With this release, we have added an extra level of granularity to our criticality configuration, and now users can define specific criticality levels for each Component and Service, overriding that of their parent Application or Environment.

Manual Closing of Vulnerabilities

The Phoenix platform can automatically manage the status of individual findings by analysing each report (from scanners or imported) and calculating the changes compared with previous reports. This means that users can connect Phoenix to their scanners and let the platform do the heavy lifting or track individual vulnerabilities.

However, there are situations where the user knows that a finding is not present anymore, but the vulnerability source might not provide the correct update for it (e.g., a previous import without an update). For these cases, users can now manually request the closure of individual findings, with a built-in approval flow to ensure that the right roles vet these changes.

Integrations

Support for Custom Fields in ADO Tickets

Continuing with our work to make using ticketing platforms as seamless as possible, users can now populate the custom fields in Azure DevOps tickets that they have defined for their ticket type. This is particularly useful when those fields are mandatory, but it can help teams support their internal workflows when creating tickets from Phoenix. This functionality is available on request.

Improved Asset Aggregation for Qualys Infra

The Qualys scanner has multiple modes of asset aggregation, depending on the setting chosen by the user. In the least aggregated mode, assets can be reported multiple times if they have more than one “tracking method”. In these situations, each asset/method combination is reported separately, with its asset ID and details.

Phoenix supports these scenarios by identifying when the same asset has multiple entries in the Qualys report and merging its vulnerabilities to create a single asset and set of findings in the platform.

Expanded Phoenix REST API

We are continuously expanding the entities and operations available through our REST API. Please get in touch with us for further details or if you have a use case that you’d like to see supported.

Other Improvements

Remember User Choices

We are enhancing how the platform remembers which options the user has selected on each screen. This means that users don’t have to re-enter their selections like sorting columns, list sizes, or filters every time they navigate back to a particular screen.

In this release, we started with the Vulnerability list screens, which is one of the most frequently used parts of the interface and has many options!

Additional Filtering in the Navigation Graph

We have made the Navigation Graph even more useful by allowing users to filter the visible/highlighted nodes using the legend. This, combined with the name search at the top, provides a great tool to bring out the node(s) of particular interest at any time.

Phoenix Security, vulnerability, Vulnerability management

Table Column Resizing

Now, most of the lists in the user interface allow users to resize the columns to display more of their content.

Even though any information that doesn’t fit in the column is normally available as a mouse-over tooltip, sometimes it makes sense to expand a certain column to see the whole content across multiple items.

Improve the Risk Breakdown column.

Our users have spoken, and, as always, we have listened.

The Risk Breakdown column displays a breakdown of vulnerabilities by their risk level for whatever element is displayed in each row. This is quite useful and provides a visual indication of the proportion of vulnerabilities of each risk level.

However, we have been getting feedback that seeing the actual count of vulnerabilities directly on the column is more important than the relative proportion. Now, this column displays a numerical breakdown of vulnerabilities by risk level.

Phoenix Security, vulnerability, Vulnerability management

Remove Limits for Multi-selection in Lists

So far, most of our “select all” options in item lists had a limit on the number of items that would be selected. This was mostly to prevent situations where the user selects too many items inadvertently and triggers an action on all of them.

It’s become clear that this can be too limiting in some scenarios, so we are removing those limits, starting with the Vulnerabilities screen and the Security > Risk Exceptions page.

Phoenix Security, vulnerability, Vulnerability management

Get in control of your Application Security posture and Vulnerability management

Alfonso brings experience running international teams for multi-million dollar, technologically advanced projects for Telefónica, IBM and Vodafone. Alfonso joins with two decades of experience working for tech leaders, including at Dell EMC, Yahoo! and Intershop.

Discuss this blog with our community on Slack

Join our AppSec Phoenix community on Slack to discuss this blog and other news with our professional security team

From our Blog

Phoenix Security introduces container lineage and throttling, connecting build files to runtime containers and disabling inactive images—cutting through the noise of SCA vulnerabilities and reducing false positives by up to 98%.
Francesco Cipollone
Phoenix Security has integrated Orca Security to enhance vulnerability management across runtime environments and cloud infrastructure. This agentless expansion brings cloud misconfiguration remediation, real-time risk intelligence, and full code-to-cloud security visibility into the ASPM platform, empowering DevSecOps teams to prioritize and resolve high-impact application security issues across AWS, Azure, and GCP.
Alfonso Eusebio
Phoenix Security has integrated Semgrep to enhance code-to-cloud security coverage, bringing high-performance static analysis and Software Composition Analysis (SCA) into its Application Security Posture Management platform. This integration empowers DevSecOps teams with faster triage, contextual vulnerability management, and precise prioritization across cloud-native environments including AWS, Azure, and GCP.
Alfonso Eusebio
The team at Phoenix Security pleased to bring you another set of new application security (ASPM) features and improvements for vulnerability management across application and cloud security engines. This release builds on top of previous releases with key additions and progress across multiple areas of the platform. Application Security Posture Management (ASPM) Enhancements • New Weighted Asset Risk Formula – Refined risk aggregation for tailored vulnerability management. • Auto-Approval of Risk Exceptions – Accelerate mitigation by automating security approvals. • Enhanced Risk Explorer & Business Unit Insights – Monitor and analyze risk exposure by business units for better prioritization. Vulnerability & Asset Management • Link Findings to Existing Tickets – Seamless GitHub, ServiceNow, and Azure DevOps integration. • Multi-Finding Ticketing for ADO – Group multiple vulnerabilities in a single ticket for better workflow management. • Filter by Business Unit, CWE, Ownership, and Deployment Environment – Target vulnerabilities with precision using advanced filtering. Cyber Threat Intelligence & Security Enhancements • Cyber Threat Intelligence Premium – Access 128,000+ exploits for better exploitability and fixability metrics. • SBOM, Container SBOM & Open Source Artifact Analysis – Conduct deep security analysis with reachability insights. • Enhanced Lacework Container Management – Fetch and analyze running container details for better security reporting. • REST API Enhancements – Use asset tags for automated deployments and streamline security processes. Other Key Updates • CVE & CWE Columns Added – Compare vulnerabilities more effectively. • Custom Status Management for Findings – Personalize security workflows with custom status configurations. • Impact & Risk Explorer Side Panel – Gain heatmap-based insights into vulnerability distribution and team risk impact. 🚀 Stay ahead of vulnerabilities, optimize risk assessment, and enhance security efficiency with Phoenix Security’s latest features! 🚀
Alfonso Eusebio
We don’t need more tools. We need a new way of thinking. Application Security Posture Management (ASPM) promises the world, but most teams crumble under tool sprawl, silos, and endless ticket queues. That’s why I built IronClad™ — a brutally simple, brutally effective operating model that fuses ASPM with decentralized ownership and ruthless clarity. This isn’t theory. It’s how security teams can actually win: small empowered squads, zero ambiguity, and mission-first remediation. If you’re tired of drowning in dashboards and ready to rethink how your teams build, secure, and scale, this is the blueprint. 👉 Read how ASPM + IronClad™ flips the script on vulnerability management.
Phil Moroni
As cyber threats become increasingly sophisticated, the need for a more proactive and comprehensive approach to vulnerability management is undeniable. A threat-centric methodology, when combined with advanced tools like Agentic AI and Application Security Posture Management (ASPM), offers organizations the ability to predict and mitigate vulnerabilities before they are exploited by threat actors. This article delves into how leveraging threat intelligence, exposure and reachability analysis, and contextual risk assessments can help organizations stay ahead of cyber threats, specifically focusing on high-risk vulnerabilities like remote code execution (RCE) and memory corruption. Through case studies like Citrix ADC and MOVEit Transfer, the article highlights the growing trend of zero-day exploits and emphasizes the importance of a proactive, data-driven security strategy. In a world where vulnerabilities are constantly targeted, adopting a threat-centric approach is not just a best practice—it’s essential to ensuring long-term security. For startups, the focus is clear—establish visibility and ensure core security practices are in place. Application Security Posture Management (ASPM) tools provide a straightforward, automated approach to detecting vulnerabilities and enforcing policies. These solutions help reduce risk quickly without overburdening small security teams. Mature organizations, on the other hand, are tackling a different set of problems. With the sheer number of vulnerabilities and an increasingly complicated threat landscape, enterprises need to fine-tune their approach. The goal shifts toward intelligent remediation, leveraging real-time threat intelligence and advanced risk prioritization. ASPM tools at this stage do more than just detect vulnerabilities—they provide context, enable proactive decision-making, and streamline the entire remediation process. The emergence of AI-assisted code generation has further complicated security in both environments. These tools, while speeding up development, are often responsible for introducing new vulnerabilities into applications at a faster pace than traditional methods. The challenge is clear: AI-generated code can hide flaws that are difficult to catch in the rush of innovation. Both startups and enterprises need to adjust their security posture to account for these new risks. ASPM platforms, like Phoenix Security, provide automated scanning of code before it hits production, ensuring that flaws don’t make it past the first line of defense. Meanwhile, organizations are also grappling with the backlog crisis in the National Vulnerability Database (NVD). A staggering number of CVEs remain unprocessed, leaving many businesses with limited data on which to base their patching decisions. While these delays leave companies vulnerable, Phoenix Security steps in by cross-referencing CVE data with known exploits and live threat intelligence, helping organizations stay ahead despite the lag in official vulnerability reporting. Whether just starting their security program or managing a complex infrastructure, organizations need a toolset that adapts with them. Phoenix Security enables businesses of any size to prioritize vulnerabilities based on actual risk, not just theoretical impact, helping security teams navigate the evolving threat landscape with speed and accuracy.
Francesco Cipollone
x  Powerful Protection for WordPress, from Shield Security
This Site Is Protected By
ShieldPRO