Phoenix Security – June Major Relase Release 3.28

Phoenix Security proudly unveils a powerful suite of new features and enhancements designed to supercharge Application Security Posture Management (ASPM) and vulnerability management across code and cloud environments. These updates mark a significant evolution in how engineering and security teams detect, prioritize, and remediate vulnerabilities with surgical precision.

With a user-driven approach and a relentless focus on unifying AppSec and CloudSec visibility, this release delivers robust improvements that empower organizations to stay ahead of modern threats while streamlining compliance and development workflows.

Previous Features



🔍 What’s New in Phoenix Security Application Security Posture Management (ASPM)

🌐 Unified Dashboards with Deep Context

The new beta dashboard offers a fully refreshed interface to view and manage your security landscape. It now includes:

  • AppSec, CloudSec, or Unified Views: Toggle between code, cloud, or both to gain actionable context across your software supply chain.
  • Timeframe Selection: Focus on specific periods for trend analysis and SLA tracking.
  • Interactive Metrics: Drill into Findings by Severity, Status, SLA compliance, and attack surface filters to prioritize what truly matters.

New Preview: Container Lineage Graph

Track container relationships across environments with lineage visualizations—paving the way for runtime-aware ASPM, together with contextual deduplication this feature has enabled our major clients to sca vulnerabilities noise up to 82% and container throttling unified to lineage enabled the reduction of 98% of noise version of container and 78% of non active containers in our ad-tech client.

Banking ClientAD Tech Client

Summary of all the features introduced in this update

  • Component Multi-Deployments
  • New Suggested Deployment Model
  • Enhanced Exception Management
  • Enhanced Exception Engine Filtering Capabilities
  • A New Garbage Collector added for Missing Targets
  • New Matching Conditions for Findings Filters
  • New Severity Distribution Bars in Vulnerability Table

🔗 Expanded ASPM Integrations

Integrate seamlessly with new and improved security tools, enhancing data ingestion and unifying your ASPM strategy:

  • Fortify SSC
  • Aikido Security
  • Orca Security
  • Semgrep (SCA & SAST)
  • Arnica enhancements

Get in control of your Application Security posture and Vulnerability management


New Dashboard

This release introduces a revamped version of our key dashboards: main, security and team.

After extensive consultation with our users, we are pleased to introduce an enhanced dashboard layout and functionality. This update includes numerous changes and improvements, but we’ll highlight some of the key ones here.

New Dashbaord and Improved filtering


The newly redesigned Phoenix Security dashboard delivers a powerful, user-centric interface that transforms how security and engineering teams manage their application security posture. With its beta release, the dashboard introduces a seamless code-to-cloud view, enabling users to toggle between AppSec (code), OpSec (cloud), or a unified perspective across both domains. Enhanced with global scope and dynamic timeframe selectors, the dashboard offers deep visibility into security metrics such as Findings by Severity, Findings by Status, and SLA compliance. Interactive charts and filters allow teams to drill down by attack surface, making it easier than ever to prioritize vulnerabilities that truly matter. Combined with real-time SLA tracking and actionable visual insights, the new dashboard sets a new standard in ASPM dashboards, aligning perfectly with modern vulnerability management needs.

The all-new Findings per Status chart redefines your vulnerability management process, now allowing you to track new, open, and closed tickets using findings counts based on attack surface.   

Global Scope and Time-frame Switches

Users get a more focused and uniform experience by being able to select the time frame to focus on and whether they can see data just for their Appsec (Code), OpSec (Cloud) or both.

Detailed SLA Status

The introduction of SLA metrics into the dashboard now makes prioritisation of vulnerabilities as clear and efficient as ever. Track SLA based on compliance status, even categorised by severity level, to prioritise vulnerabilities that matter most. The users can now switch between the remediation SLA and the discovery time SLA  

New Suggested Deployment Model

Leverage intelligent insights to automate deployment mapping:

  • Get AI-driven recommendations based on file/container similarities and naming conventions.
  • Use a dual table + graph interface to visualize and confirm the suggested architecture.

In tandem with the introduction of Component Multi-deployments, this release of the Phoenix platform provides users with a powerful tool to identify and create deployment relationships. The Suggested Deployment table and graph streamlines the process by offering deployment suggestions based on different criteria, while facilitating the confirmation of those suggestions in bulk or with detailed precision. 

Use the system architecture diagram to analyse the suggested deployments of services at an application or component level, depending on your preference. Customise your approach to component deployment using suggestions based on: build file to container similarities, build asset name and container asset names similarity, as well as component to service name. 

The dual table/graph display provides a mix of visual and detailed information about the context of the suggested deployments, making the review and decision-making process easier than ever. 

Component Multi-Deployments

This new release provides an increased level of granularity and flexibility when configuring your deployment relationships. This evolution relies on two key changes:

  1. Deployment relationships are now established between Components, rather than Applications, and Services. This provides more granularity when defining which parts of your code are deployed where.
  2. Each Component can be deployed onto multiple Services, which enables organisations to better reflect the reality of the relationships between code and runtime.

However, to maintain flexibility within deployment relationships, we have kept the option to deploy entire applications in one go. This will now deploy all components (present and future) inside that application to the selected services, with the relationships being between components and services. (See “Inherit from Application” switch in screenshot above.)

When looking at the Deployed Applications graph, the new Multi-deployments switch allows you to view cross-relationships between Components and services (indicated by Blue arrows) in a simplified or detailed manner.

Enhanced Exception Management

The risk exception management flow allows engineers and security specialists to request the removal of an existing exception. This complements the ability to modify an existing exception by requesting a new request that would overwrite the previous one.

The deletion of risk exceptions is, obviously, managed through an approval flow in order to ensure that only users with the right permissions can apply the removal. If the requesting user has the permissions to approve as well, then this option would be available right in the request form.

Enhanced Exception Engine filtering capabilities

Creating Exceptions couldn’t be more straightforward. With our newly introduced filtering capabilities, you’ll never have an issue filtering for a finding. We have introduced a series of asset attribute-based filtering options, e.g. NetBIOS, Hostname and IP, to ensure that exception rules can be defined for any finding.

New lifecycle management for missing Scanner Targets

Phoenix Security has released another way to keep ASPM clean and focused on relevant and up-to-date information. Automate the deletion of missing targets using custom-selected grace periods to keep Security teams focused on the vulnerabilities that matter most. This feature will automatically declutter obsolete missing targets, ensuring scanner targets are up to date and not displaying outdated vulnerabilities.

New matching conditions for Findings filters

At Phoenix Security, we never fail to introduce innovative ways to approach vulnerability management. Searching for a specific group of findings can be a long and tedious process, which is why we have made it as simple and efficient as possible. Use our new ALL/ANY matching conditions to filter findings based on your specific preferences. The “ALL” condition acts as an AND condition, meaning findings displayed will only be shown if all filtering options selected have been met. The “ANY” matching condition acts as an OR condition, meaning findings displayed will be shown if at least one of the filtering conditions has been met. 

New Severity distribution bars in Vulnerability table

The new severity distribution bar is your ultimate weapon for prioritising threats with laser focus. At a glance, it transforms complex vulnerability data into a clear, colour-coded bar highlighting critical, high, medium, low, and negligible risks. This streamlines your vulnerability management process by providing a clear colour-coded representation of the criticality of each vulnerability. Each numeric value within a criticality grouping represents a finding, giving you insight into the criticality of specific findings within a vulnerability.

Integrations

As usual with every Phoenix release, a new set of native API integrations the extensive list already available out of the box.

Fortify SSC Scanner Integration

A new addition to the WEB scanner line-up included in this release is Fortify SSC.

Customers using Fortify SSC as part of their security scanning would be able to integrate with their account using Phoenix’s native API-based integration.

Aikido Security Scanner Integration

with this release, customers using Aikido Security as part of their security scanning would be able to integrate with their account using Phoenix’s native API-based integration.

Orca Security Scanner Integration

A new addition to the Phoenix scanner integration line-up included in this release is Orca Security.

Customers using Orca as part of their security scanning would be able to integrate with their account using Phoenix’s native API-based integration.

Others Enhancements

License information for SBOM/Libraries

Keep up to date with legal and organisational policies with the new Licence column in the SBOM libraries table. Licence criticality is even indicated by colour-coded tiles, with a breakdown of the key information of the selected Licence and remediation actions recommended to be taken, such as switching to a better alternative. This transparency helps mitigate risks of unintentional license violations and supports informed decision-making when selecting or updating components.

Get in control of your Application Security posture and Vulnerability management

🔐 Why It Matters

This release solidifies Phoenix Security’s position as a leading ASPM platform by delivering:

  • Greater visibility across the application lifecycle
  • Smarter prioritization powered by real-time SLAs, lineage, and context
  • Cleaner vulnerability management with automated lifecycle control
  • Deeper integrations with industry-standard tools and scanners

Organizations embracing Phoenix Security can now align their security operations more tightly with engineering workflows, transforming vulnerability management from reactive to predictive.


Alfonso brings experience running international teams for multi-million dollar, technologically advanced projects for Telefónica, IBM and Vodafone. Alfonso joins with two decades of experience working for tech leaders, including at Dell EMC, Yahoo! and Intershop.

Discuss this blog with our community on Slack

Join our AppSec Phoenix community on Slack to discuss this blog and other news with our professional security team

From our Blog

We don’t need more tools. We need a new way of thinking. Application Security Posture Management (ASPM) promises the world, but most teams crumble under tool sprawl, silos, and endless ticket queues. That’s why I built IronClad™ — a brutally simple, brutally effective operating model that fuses ASPM with decentralized ownership and ruthless clarity. This isn’t theory. It’s how security teams can actually win: small empowered squads, zero ambiguity, and mission-first remediation. If you’re tired of drowning in dashboards and ready to rethink how your teams build, secure, and scale, this is the blueprint. 👉 Read how ASPM + IronClad™ flips the script on vulnerability management.
Phil Moroni
As cyber threats become increasingly sophisticated, the need for a more proactive and comprehensive approach to vulnerability management is undeniable. A threat-centric methodology, when combined with advanced tools like Agentic AI and Application Security Posture Management (ASPM), offers organizations the ability to predict and mitigate vulnerabilities before they are exploited by threat actors. This article delves into how leveraging threat intelligence, exposure and reachability analysis, and contextual risk assessments can help organizations stay ahead of cyber threats, specifically focusing on high-risk vulnerabilities like remote code execution (RCE) and memory corruption. Through case studies like Citrix ADC and MOVEit Transfer, the article highlights the growing trend of zero-day exploits and emphasizes the importance of a proactive, data-driven security strategy. In a world where vulnerabilities are constantly targeted, adopting a threat-centric approach is not just a best practice—it’s essential to ensuring long-term security. For startups, the focus is clear—establish visibility and ensure core security practices are in place. Application Security Posture Management (ASPM) tools provide a straightforward, automated approach to detecting vulnerabilities and enforcing policies. These solutions help reduce risk quickly without overburdening small security teams. Mature organizations, on the other hand, are tackling a different set of problems. With the sheer number of vulnerabilities and an increasingly complicated threat landscape, enterprises need to fine-tune their approach. The goal shifts toward intelligent remediation, leveraging real-time threat intelligence and advanced risk prioritization. ASPM tools at this stage do more than just detect vulnerabilities—they provide context, enable proactive decision-making, and streamline the entire remediation process. The emergence of AI-assisted code generation has further complicated security in both environments. These tools, while speeding up development, are often responsible for introducing new vulnerabilities into applications at a faster pace than traditional methods. The challenge is clear: AI-generated code can hide flaws that are difficult to catch in the rush of innovation. Both startups and enterprises need to adjust their security posture to account for these new risks. ASPM platforms, like Phoenix Security, provide automated scanning of code before it hits production, ensuring that flaws don’t make it past the first line of defense. Meanwhile, organizations are also grappling with the backlog crisis in the National Vulnerability Database (NVD). A staggering number of CVEs remain unprocessed, leaving many businesses with limited data on which to base their patching decisions. While these delays leave companies vulnerable, Phoenix Security steps in by cross-referencing CVE data with known exploits and live threat intelligence, helping organizations stay ahead despite the lag in official vulnerability reporting. Whether just starting their security program or managing a complex infrastructure, organizations need a toolset that adapts with them. Phoenix Security enables businesses of any size to prioritize vulnerabilities based on actual risk, not just theoretical impact, helping security teams navigate the evolving threat landscape with speed and accuracy.
Francesco Cipollone
The journey of securing an organization’s application landscape varies dramatically, depending on where a company stands in its maturity. Early-stage startups with small security teams face challenges not only with vulnerabilities but also with scaling their security processes in line with their growth. On the flip side, established enterprises struggle with managing complex environments, prioritizing remediation, and dealing with vast amounts of vulnerabilities while staying ahead of sophisticated threats. For startups, the focus is clear—establish visibility and ensure core security practices are in place. Application Security Posture Management (ASPM) tools provide a straightforward, automated approach to detecting vulnerabilities and enforcing policies. These solutions help reduce risk quickly without overburdening small security teams. Mature organizations, on the other hand, are tackling a different set of problems. With the sheer number of vulnerabilities and an increasingly complicated threat landscape, enterprises need to fine-tune their approach. The goal shifts toward intelligent remediation, leveraging real-time threat intelligence and advanced risk prioritization. ASPM tools at this stage do more than just detect vulnerabilities—they provide context, enable proactive decision-making, and streamline the entire remediation process. The emergence of AI-assisted code generation has further complicated security in both environments. These tools, while speeding up development, are often responsible for introducing new vulnerabilities into applications at a faster pace than traditional methods. The challenge is clear: AI-generated code can hide flaws that are difficult to catch in the rush of innovation. Both startups and enterprises need to adjust their security posture to account for these new risks. ASPM platforms, like Phoenix Security, provide automated scanning of code before it hits production, ensuring that flaws don’t make it past the first line of defense. Meanwhile, organizations are also grappling with the backlog crisis in the National Vulnerability Database (NVD). A staggering number of CVEs remain unprocessed, leaving many businesses with limited data on which to base their patching decisions. While these delays leave companies vulnerable, Phoenix Security steps in by cross-referencing CVE data with known exploits and live threat intelligence, helping organizations stay ahead despite the lag in official vulnerability reporting. Whether just starting their security program or managing a complex infrastructure, organizations need a toolset that adapts with them. Phoenix Security enables businesses of any size to prioritize vulnerabilities based on actual risk, not just theoretical impact, helping security teams navigate the evolving threat landscape with speed and accuracy.
Francesco Cipollone
The cybersecurity world is reeling as MITRE’s funding for the CVE and NVD systems expires, disrupting the backbone of global vulnerability management. As traditional sources like the National Vulnerability Database collapse under funding cuts and submission backlogs, security teams face delays, incomplete data, and loss of automation in remediation pipelines. This isn’t just a data problem—it’s a structural crisis for application security and vulnerability correlation. In this landscape of uncertainty, Phoenix Security’s ASPM platform steps up with a code-to-cloud correlation engine that doesn’t depend on outdated data workflows. By connecting code-level insights (including tools like Semgrep) to runtime and cloud environments, Phoenix enables faster, context-aware vulnerability remediation—even as NVD and CVE pipelines deteriorate. This article dives into the implications of the CVE shutdown and how Phoenix Security is helping security and development teams transition to a resilient, correlation-first approach to cybersecurity.
Francesco Cipollone
Learn how to predict ransomware risks and vulnerability exploitation using a threat-centric approach. Explore data-driven insights, verified exploit trends, and methods for assessing the likelihood of attacks with key references to CISA KEV, EPSS, and Phoenix Security’s 4D Risk Formula.
Francesco Cipollone
Remote Code Execution flaws continue to undermine Kubernetes ingress integrity. IngressNightmare (CVE-2025-1097, CVE-2025-1098, CVE-2025-24514, CVE-2025-1974) showcases severe threat vectors in NGINX-based proxies, leading to cluster-wide exposure. ASPM, robust remediation tactics, and strong application security solutions—like Phoenix Security—mitigate these vulnerabilities before ransomware groups exploit them.
Francesco Cipollone
Derek

Derek Fisher

Head of product security at a global fintech

Derek Fisher – Head of product security at a global fintech. Speaker, instructor, and author in application security.

Derek is an award winning author of a children’s book series in cybersecurity as well as the author of “The Application Security Handbook.” He is a university instructor at Temple University where he teaches software development security to undergraduate and graduate students. He is a speaker on topics in the cybersecurity space and has led teams, large and small, at organizations in the healthcare and financial industries. He has built and matured information security teams as well as implemented organizational information security strategies to reduce the organizations risk.

Derek got his start in the hardware engineering space where he learned about designing circuits and building assemblies for commercial and military applications. He later pursued a computer science degree in order to advance a career in software development. This is where Derek was introduced to cybersecurity and soon caught the bug. He found a mentor to help him grow in cybersecurity and then pursued a graduate degree in the subject.

Since then Derek has worked in the product security space as an architect and leader. He has led teams to deliver more secure software in organizations from multiple industries. His focus has been to raise the security awareness of the engineering organization while maintaining a practice of secure code development, delivery, and operations.

In his role, Jeevan handles a range of tasks, from architecting security solutions to collaborating with Engineering Leadership to address security vulnerabilities at scale and embed security into the fabric of the organization.

Jeevan Singh

Jeevan Singh

Founder of Manicode Security

Jeevan Singh is the Director of Security Engineering at Rippling, with a background spanning various Engineering and Security leadership roles over the course of his career. He’s dedicated to the integration of security practices into software development, working to create a security-aware culture within organizations and imparting security best practices to the team.
In his role, Jeevan handles a range of tasks, from architecting security solutions to collaborating with Engineering Leadership to address security vulnerabilities at scale and embed security into the fabric of the organization.

James

James Berthoty

Founder of Latio Tech

James Berthoty has over ten years of experience across product and security domains. He founded Latio Tech to help companies find the right security tools for their needs without vendor bias.

christophe

Christophe Parisel

Senior Cloud Security Architect

Senior Cloud Security Architect

Chris

Chris Romeo

Co-Founder
Security Journey

Chris Romeo is a leading voice and thinker in application security, threat modeling, and security champions and the CEO of Devici and General Partner at Kerr Ventures. Chris hosts the award-winning “Application Security Podcast,” “The Security Table,” and “The Threat Modeling Podcast” and is a highly rated industry speaker and trainer, featured at the RSA Conference, the AppSec Village @ DefCon, OWASP Global AppSec, ISC2 Security Congress, InfoSec World and All Day DevOps. Chris founded Security Journey, a security education company, leading to an exit in 2022. Chris was the Chief Security Advocate at Cisco, spreading security knowledge through education and champion programs. Chris has twenty-six years of security experience, holding positions across the gamut, including application security, security engineering, incident response, and various Executive roles. Chris holds the CISSP and CSSLP certifications.

jim

Jim Manico

Founder of Manicode Security

Jim Manico is the founder of Manicode Security, where he trains software developers on secure coding and security engineering. Jim is also the founder of Brakeman Security, Inc. and an investor/advisor for Signal Sciences. He is the author of Iron-Clad Java: Building Secure Web Applications (McGraw-Hill), a frequent speaker on secure software practices, and a member of the JavaOne Rockstar speaker community. Jim is also a volunteer for and former board member of the OWASP foundation.

Join our Mailing list!

Get all the latest news, exclusive deals, and feature updates.

The IKIGAI concept
x  Powerful Protection for WordPress, from Shield Security
This Site Is Protected By
ShieldPRO