Phoenix Security new ASPM Contextual Reachability Analysis and Deduplication for Enhanced Vulnerability Management

Reachability analysis, Phoenix Security, Contextual Deduplication

Phoenix Security is proud to unveil its latest headline feature, Runtime Reachability Analysis and Contextual Deduplication, which sets a new standard in Application Security Posture Management (ASPM). These features offer a powerful way for security teams to correlate vulnerabilities from code to runtime, significantly reducing noise and enabling smarter, more focused vulnerability prioritization.

For more research and details on the reachability analysis

What is Contextual Runtime Reachability analysis, and what are the benefits for you?

With Phoenix Security’s advanced reachability analysis, users can filter out irrelevant vulnerabilities by focusing on what is exploitable in both code and running containers. By leveraging contextual deduplication, Phoenix helps security teams declutter their vulnerability landscape, reducing runtime noise by up to 90% and with full vulnerability deduplication across code and cloud environments by 95%. These innovations ensure that your team only focuses on the vulnerabilities that truly matter—those in use and exploitable.


How does this ASPM feature help reduce vulnerabilities by 90%

Security teams today face an overwhelming amount of vulnerability data, much of which is not directly relevant to their actual risk exposure. Phoenix Security addresses this challenge by focusing on reachability analysis—the ability to determine whether a vulnerability is actually exploitable in a given environment.

Phoenix goes beyond basic vulnerability scanning by introducing two critical layers of analysis:

  • Static Reachability Analysis: This determines whether vulnerable libraries are loaded in the code, when they are not actually in use (require access to build file and code repo) SBOM management.
  • Runtime Reachability Analysis: Assesses whether applications running in containers or other environments are actively using these vulnerable libraries, ensuring vulnerabilities are prioritized based on real risk exposure.
  • Container Version Trottling and Running traceability: Deduplicate contextually and pair up this feature with contextual deduplication at runtime

In tandem with contextual deduplication, Phoenix ensures that vulnerabilities are deduplicated across both the codebase and the runtime environment, providing clear insights into which vulnerabilities truly matter. This approach eliminates unnecessary noise, drastically improving prioritization efforts.

Contextual risk-based approach with Reachability analysis in ASPM

Risk, ASPM, Phoenix Security, Reachability analysis, Contextual Deduplication, application security


Phoenix Security’s 4-Dimensional Risk Quantification for Application Security Posture Management (ASPM) goes beyond traditional CVSS or EPSS-based metrics, providing a more comprehensive, contextualized view of vulnerabilities. By integrating Business Criticality, Network Reachability (determining if the container is accessible externally), Static Reachability (checking whether libraries are loaded in the code), and Contextual Reachability (confirming if libraries are active in running containers), organizations gain a clearer understanding of real-world exposure. Combined with advanced threat intelligence and deduplication, Phoenix ensures vulnerabilities are prioritized based on true risk, reducing noise and enabling more effective risk-based remediation.

Risk, ASPM, Phoenix Security, Reachability analysis, Contextual Deduplication, application security

The Runtime Reachability Analysis highlighted Phoenix’s contextual Exposure, Asset Externability factor, and Impact Factor.

What is reachability analysis, and how does Phoenix Security help

Reachability analysis is a method used to determine whether a vulnerability in code or a library is actually exploitable in a given environment. It helps security teams prioritize vulnerabilities by analyzing whether vulnerable code is actively used in the codebase or deployed applications. By identifying which vulnerabilities are “reachable” and can potentially be exploited, reachability analysis provides a more focused and effective way to address real-world risks. It reduces the noise from non-critical issues and enables smarter vulnerability management across code, containers, and runtime environments.

Key Features

Code-to-Runtime Vulnerability Correlation in Phoenix ASPM

ASPM, Phoenix Security, Reachability analysis, Contextual Deduplication
Runtime Recheability analysis graph highlighting the correlation from code to runtime

• Phoenix Security’s reachability analysis allows for a direct correlation between runtime vulnerabilities and the underlying code. This ensures that security teams can link vulnerabilities identified in the code to those actively impacting their running applications, leading to better prioritization and remediation strategies.

• Real-time insights into which vulnerabilities are actively used or reachable in running environments, allowing for highly focused remediation efforts.

AI-Based ASPM for Prioritization through Reachability and Runtime Deduplication

EPSS, Contextual Deduplication, Runtime Reachability Analysis

Contextual Deduplication intelligently removes duplicate vulnerabilities from the security stack, ensuring that vulnerabilities are not counted multiple times across code, containers, and cloud environments.

• By combining reachability analysis with runtime deduplication, Phoenix further filters out vulnerabilities that do not pose a true risk, allowing security teams to focus on what is exploitable and needs immediate action.

Upcoming Link Code to cloud

with AI Runtime Reachability Analysis we were able to discover and correlate which repository’s build file and artefact are built-in containers and leveraging those insights we were also able to create a correlation of code 2 cloud. In Q1 2025 we are looking to also add automatic deployment suggestion and expansion of the link between an application and the containers where this application is deployed

Traceability code and cloud with Runtime Reachability Analysis
Code to Cloud suggestions – which repository runs where

Reachability Analysis for Smarter Risk Management

Static Reachability Analysis identifies vulnerable libraries included in the code but not necessarily used.

Runtime Reachability Analysis refines this by focusing on vulnerabilities actively used in the deployed environment, such as those being exploited in running containers or applications. This multi-layered approach allows for much more precise vulnerability prioritization.

Runtime Reachability Analysis

Why Prioritization through Reachability Matters

The sheer volume of vulnerabilities detected in modern applications often overwhelms security teams, leading to delays in remediation and inefficient resource use. With Phoenix Security, teams can leverage reachability analysis to filter vulnerabilities by those that are actually exploitable in a specific environment, helping to reduce risk with more targeted actions.

While traditional methods rely on broad CVSS scores or EPSS to gauge risk, reachability analysis adds critical context—Is this vulnerability being used in my environment? By focusing on actual usage, Phoenix ensures that vulnerabilities are prioritized based on their impact in the real world, not just theoretical exposure.

Runtime Reachability Analysis example phoenix security ASPM

Contextual Deduplication: Cleaning Up the Noise

In addition to reachability analysis, Phoenix Security’s contextual deduplication removes duplicate vulnerabilities across the entire pipeline, from code to running containers, ensuring that security teams don’t waste time on irrelevant vulnerabilities. This is particularly effective when applied to cloud and container environments, where duplicates can often clutter the vulnerability landscape.

An example of this effect is when building several versions of the container images and having indication of where those vulnerabilities need to be fixed :

Runtime Reachability Analysis

By leveraging both contextual deduplication and runtime deduplication, Phoenix Security enables security teams to focus their efforts on vulnerabilities that are both real and immediately exploitable in their environment. This reduces overall vulnerability noise by up to 90% in runtime environments, and with full deduplication, by 95%.

Container Version Throttling

Container Image Version Control:

Maintain clean and efficient control over different versions of your container images. Ensure that each deployed image is the most secure, stable, and optimized version while avoiding unnecessary deployment of outdated or vulnerable containers. The throttling system ensures that only authorized versions of your container images are deployed, keeping your infrastructure lean and secure.

Traceable Container Deployments:

Gain full traceability of deployed containers with precise tracking of when, where, and how often an image has been deployed. This allows you to verify which specific container image is currently running in your environment, offering a complete history of its deployment across your infrastructure. This visibility ensures better governance and compliance, whether you’re managing microservices, CI/CD pipelines, or large-scale production environments.

By leveraging container throttling and image version tracing, Phoenix Security enables security teams to focus on real and immediately exploitable vulnerabilities in their environment. This reduces overall vulnerability noise by up to 91% in runtime environments. The contextual deduplication, together with the image version runtime monitoring, enables Phoenix clients to reduce 50-80% the number of vulnerabilities in Static and SCA analysis and up to 91% for container running.

Real-World Risk-Based Prioritization with Phoenix Security

Phoenix Security’s risk-based vulnerability management approach combines the best reachability analysis, runtime deduplication, and contextual insights to empower security teams with a complete picture of their threat landscape. By correlating vulnerabilities from code to runtime, Phoenix ensures that only the vulnerabilities that matter are prioritized, allowing teams to remediate more effectively and reduce risk faster.

Why Choose Phoenix Security for Reachability and Contextual Deduplication?

Phoenix Security delivers a comprehensive, unified platform for simplifying vulnerability management across code, containers, and cloud environments. With reachability analysis and contextual deduplication, Phoenix allows teams to focus on the real-world threats that impact their specific environments, making vulnerability management faster, more accurate, and more effective.

Up to 90% noise reduction in container runtime environments through reachability analysis.

• 95% vulnerability reduction through contextual and runtime deduplication.

• Direct code-to-runtime correlation to prioritize actively exploitable vulnerabilities in your environment.

With Phoenix Security, you can rest assured that your ASPM strategy is not just about finding vulnerabilities—it’s about finding the ones that matter.

Need assistance with reachability analysis or contextual deduplication? Contact our support team at support@phoenix.security.

Minimize the vulnerability risk and act on the vulnerabilities that matter most, combining ASPM, EPSS, and reachability analysis.

attack graph phoenix security
ASPM

Organizations often face an overwhelming volume of security alerts, including false positives and duplicate vulnerabilities, which can distract from real threats. Traditional tools may overwhelm engineers with lengthy, misaligned lists that fail to reflect business objectives or the risk tolerance of product owners.

Phoenix Security offers a transformative solution through its Actionable Application Security Posture Management (ASPM), powered by AI-based Contextual Quantitative analysis. This innovative approach correlates runtime data, combines it with EPSS and other threat intelligence, and applies the right risk to code and cloud, delivering a prioritized list of vulnerabilities.

Why do people talk about Phoenix Security ASPM?

Automated Triage: Phoenix streamlines the triage process using a customizable 4D risk formula, ensuring critical vulnerabilities are addressed promptly by the right teams.

Actionable Threat Intelligence: Phoenix provides real-time insights into vulnerabilities’ exploitability, leveraging EPS and combining runtime threat intelligence with application security data for precise risk mitigation.

Phoenix Security Reachability analysis

• Contextual Deduplication with reachability analysis: Utilizing canary token-based traceability for network reachability and static and dynamic runtime reachability, Phoenix accurately deduplicates and tracks vulnerabilities within application code and deployment environments, allowing teams to concentrate on genuine threats.

EPSS Phoenix Reachability analysis in ASPM, vulnerability management, application security
Phoenix Security Reachability analysis in containers with EPSS

By leveraging Phoenix Security, you not only unravel the potential threats but also take a significant stride in vulnerability management, ensuring your application security remains current and focuses on the key vulnerabilities.

Get a demo with your data, test Reachability Analysis and ASPM

Alfonso brings experience running international teams for multi-million dollar, technologically advanced projects for Telefónica, IBM and Vodafone. Alfonso joins with two decades of experience working for tech leaders, including at Dell EMC, Yahoo! and Intershop.

Discuss this blog with our community on Slack

Join our AppSec Phoenix community on Slack to discuss this blog and other news with our professional security team

From our Blog

Phoenix Security’s Application Security Posture Management (ASPM) introduces Reachability Analysis and Contextual Deduplication to revolutionize vulnerability management. These features help security teams prioritize risks by correlating vulnerabilities from code to runtime, focusing on what’s exploitable. With contextual deduplication, Phoenix reduces vulnerability noise by up to 95%, ensuring only real threats are addressed. Stay ahead with 4D Risk Quantification, combining business criticality, network, and runtime reachability for smarter, more effective security.- Associate assets with multiple Applications and Environments – Mapping of vulnerabilities to Installed Software – Find Assets/Vulns by Scanner – Detailed findings Location information Risk-based Posture Management – Risk and Risk Magnitude for Assets – Filter assets and vulnerabilities by source scanner Integrations – BurpSuite XML Import – Assessment Import API Other Improvements – Improved multi-selection in filters – New CVSS Score column in Vulnerabilities
Alfonso Eusebio
Enhance your vulnerability management with Application Security Posture Management (ASPM) and reachability analysis. Discover how ASPM helps prioritize exploitable vulnerabilities, reduce security noise, and improve risk management. Learn about advanced techniques like code and container reachability, contextual deduplication, and Phoenix Security’s cutting-edge solutions for smarter, more effective application security.
Francesco Cipollone
Our latest article explores how EPSS (Exploit Prediction Scoring System) and reachability analysis work together within Application Security Posture Management (ASPM) to optimize vulnerability prioritization. EPSS predicts exploit likelihood based on global threat data, while reachability analysis assesses if vulnerabilities are accessible in your specific environment. ASPM platforms like Phoenix Security integrate these insights, contextualizing vulnerabilities within the software stack to ensure that teams focus on actionable, relevant risks. By combining EPSS’s predictive power with reachability’s contextual focus, ASPM provides a holistic view, enabling security teams to prioritize vulnerabilities based on global trends, local relevance, and business impact. This approach is especially effective for high-risk vulnerabilities like Remote Code Execution (RCE), where EPSS highlights potential threats and reachability analysis confirms their presence in the application path. Phoenix Security’s 4D risk formula further refines prioritization, considering severity, reachability, threat intelligence, and deployment context. This dual-layered strategy empowers organizations to strengthen security posture, minimize noise, and act on the vulnerabilities that truly matter.- Mapping of vulnerabilities to Installed Software – Find Assets/Vulns by Scanner – Detailed findings Location information Risk-based Posture Management – Risk and Risk Magnitude for Assets – Filter assets and vulnerabilities by source scanner Integrations – BurpSuite XML Import – Assessment Import API Other Improvements – Improved multi-selection in filters – New CVSS Score column in Vulnerabilities
Francesco Cipollone
Phoenix Security ASPM Version 3.30.0 Release – Phoenix Security has partnered with Arnica to deliver expanded cloud and application security capabilities, enhancing the platform with Software Composition Analysis (SCA), credential scanning, secrets detection, and Static Application Security Testing (SAST). This powerful integration further strengthens Phoenix Security’s ASPM offering, enabling seamless risk-based prioritization and real-time vulnerability management across GCP, AWS, and Azure environments.
Alfonso Eusebio
Derek

Derek Fisher

Head of product security at a global fintech

Derek Fisher – Head of product security at a global fintech. Speaker, instructor, and author in application security.

Derek is an award winning author of a children’s book series in cybersecurity as well as the author of “The Application Security Handbook.” He is a university instructor at Temple University where he teaches software development security to undergraduate and graduate students. He is a speaker on topics in the cybersecurity space and has led teams, large and small, at organizations in the healthcare and financial industries. He has built and matured information security teams as well as implemented organizational information security strategies to reduce the organizations risk.

Derek got his start in the hardware engineering space where he learned about designing circuits and building assemblies for commercial and military applications. He later pursued a computer science degree in order to advance a career in software development. This is where Derek was introduced to cybersecurity and soon caught the bug. He found a mentor to help him grow in cybersecurity and then pursued a graduate degree in the subject.

Since then Derek has worked in the product security space as an architect and leader. He has led teams to deliver more secure software in organizations from multiple industries. His focus has been to raise the security awareness of the engineering organization while maintaining a practice of secure code development, delivery, and operations.

In his role, Jeevan handles a range of tasks, from architecting security solutions to collaborating with Engineering Leadership to address security vulnerabilities at scale and embed security into the fabric of the organization.

Jeevan Singh

Jeevan Singh

Founder of Manicode Security

Jeevan Singh is the Director of Security Engineering at Rippling, with a background spanning various Engineering and Security leadership roles over the course of his career. He’s dedicated to the integration of security practices into software development, working to create a security-aware culture within organizations and imparting security best practices to the team.
In his role, Jeevan handles a range of tasks, from architecting security solutions to collaborating with Engineering Leadership to address security vulnerabilities at scale and embed security into the fabric of the organization.

James

James Berthoty

Founder of Latio Tech

James Berthoty has over ten years of experience across product and security domains. He founded Latio Tech to help companies find the right security tools for their needs without vendor bias.

christophe

Christophe Parisel

Senior Cloud Security Architect

Senior Cloud Security Architect

Chris

Chris Romeo

Co-Founder
Security Journey

Chris Romeo is a leading voice and thinker in application security, threat modeling, and security champions and the CEO of Devici and General Partner at Kerr Ventures. Chris hosts the award-winning “Application Security Podcast,” “The Security Table,” and “The Threat Modeling Podcast” and is a highly rated industry speaker and trainer, featured at the RSA Conference, the AppSec Village @ DefCon, OWASP Global AppSec, ISC2 Security Congress, InfoSec World and All Day DevOps. Chris founded Security Journey, a security education company, leading to an exit in 2022. Chris was the Chief Security Advocate at Cisco, spreading security knowledge through education and champion programs. Chris has twenty-six years of security experience, holding positions across the gamut, including application security, security engineering, incident response, and various Executive roles. Chris holds the CISSP and CSSLP certifications.

jim

Jim Manico

Founder of Manicode Security

Jim Manico is the founder of Manicode Security, where he trains software developers on secure coding and security engineering. Jim is also the founder of Brakeman Security, Inc. and an investor/advisor for Signal Sciences. He is the author of Iron-Clad Java: Building Secure Web Applications (McGraw-Hill), a frequent speaker on secure software practices, and a member of the JavaOne Rockstar speaker community. Jim is also a volunteer for and former board member of the OWASP foundation.

Join our Mailing list!

Get all the latest news, exclusive deals, and feature updates.

The IKIGAI concept
x  Powerful Protection for WordPress, from Shield Security
This Site Is Protected By
ShieldPRO