Phoenix Security – June Major Release – 3.28

Phoenix Security proudly unveils a powerful suite of new features and enhancements designed to supercharge Application Security Posture Management (ASPM) and vulnerability management across code and cloud environments. These updates mark a significant evolution in how engineering and security teams detect, prioritize, and remediate vulnerabilities with surgical precision.

With a user-driven approach and a relentless focus on unifying AppSec and CloudSec visibility, this release delivers robust improvements that empower organizations to stay ahead of modern threats while streamlining compliance and development workflows.

Previous Features



🔍 What’s New in Phoenix Security Application Security Posture Management (ASPM)

🌐 Unified Dashboards with Deep Context

The new beta dashboard offers a fully refreshed interface to view and manage your security landscape. It now includes:

  • AppSec, CloudSec, or Unified Views: Toggle between code, cloud, or both to gain actionable context across your software supply chain.
  • Timeframe Selection: Focus on specific periods for trend analysis and SLA tracking.
  • Interactive Metrics: Drill into Findings by Severity, Status, SLA compliance, and attack surface filters to prioritize what truly matters.

New Preview: Container Lineage Graph

Track container relationships across environments with lineage visualizations—paving the way for runtime-aware ASPM, together with contextual deduplication this feature has enabled our major clients to sca vulnerabilities noise up to 82% and container throttling unified to lineage enabled the reduction of 98% of noise version of container and 78% of non active containers in our ad-tech client.

Banking ClientAD Tech Client

Summary of all the features introduced in this update

  • Component Multi-Deployments
  • New Suggested Deployment Model
  • Enhanced Exception Management
  • Enhanced Exception Engine Filtering Capabilities
  • A New Garbage Collector added for Missing Targets
  • New Matching Conditions for Findings Filters
  • New Severity Distribution Bars in Vulnerability Table

🔗 Expanded ASPM Integrations

Integrate seamlessly with new and improved security tools, enhancing data ingestion and unifying your ASPM strategy:

  • Fortify SSC
  • Aikido Security
  • Orca Security
  • Semgrep (SCA & SAST)
  • Arnica enhancements

Get in control of your Application Security posture and Vulnerability management


New Dashboard

This release introduces a revamped version of our key dashboards: main, security and team.

After extensive consultation with our users, we are pleased to introduce an enhanced dashboard layout and functionality. This update includes numerous changes and improvements, but we’ll highlight some of the key ones here.

New Dashbaord and Improved filtering


The newly redesigned Phoenix Security dashboard delivers a powerful, user-centric interface that transforms how security and engineering teams manage their application security posture. With its beta release, the dashboard introduces a seamless code-to-cloud view, enabling users to toggle between AppSec (code), OpSec (cloud), or a unified perspective across both domains. Enhanced with global scope and dynamic timeframe selectors, the dashboard offers deep visibility into security metrics such as Findings by Severity, Findings by Status, and SLA compliance. Interactive charts and filters allow teams to drill down by attack surface, making it easier than ever to prioritize vulnerabilities that truly matter. Combined with real-time SLA tracking and actionable visual insights, the new dashboard sets a new standard in ASPM dashboards, aligning perfectly with modern vulnerability management needs.

The all-new Findings per Status chart redefines your vulnerability management process, now allowing you to track new, open, and closed tickets using findings counts based on attack surface.   

Global Scope and Time-frame Switches

Users get a more focused and uniform experience by being able to select the time frame to focus on and whether they can see data just for their Appsec (Code), OpSec (Cloud) or both.

Detailed SLA Status

The introduction of SLA metrics into the dashboard now makes prioritisation of vulnerabilities as clear and efficient as ever. Track SLA based on compliance status, even categorised by severity level, to prioritise vulnerabilities that matter most. The users can now switch between the remediation SLA and the discovery time SLA  

New Suggested Deployment Model

Leverage intelligent insights to automate deployment mapping:

  • Get AI-driven recommendations based on file/container similarities and naming conventions.
  • Use a dual table + graph interface to visualize and confirm the suggested architecture.

In tandem with the introduction of Component Multi-deployments, this release of the Phoenix platform provides users with a powerful tool to identify and create deployment relationships. The Suggested Deployment table and graph streamlines the process by offering deployment suggestions based on different criteria, while facilitating the confirmation of those suggestions in bulk or with detailed precision. 

Use the system architecture diagram to analyse the suggested deployments of services at an application or component level, depending on your preference. Customise your approach to component deployment using suggestions based on: build file to container similarities, build asset name and container asset names similarity, as well as component to service name. 

The dual table/graph display provides a mix of visual and detailed information about the context of the suggested deployments, making the review and decision-making process easier than ever. 

Component Multi-Deployments

This new release provides an increased level of granularity and flexibility when configuring your deployment relationships. This evolution relies on two key changes:

  1. Deployment relationships are now established between Components, rather than Applications, and Services. This provides more granularity when defining which parts of your code are deployed where.
  2. Each Component can be deployed onto multiple Services, which enables organisations to better reflect the reality of the relationships between code and runtime.

However, to maintain flexibility within deployment relationships, we have kept the option to deploy entire applications in one go. This will now deploy all components (present and future) inside that application to the selected services, with the relationships being between components and services. (See “Inherit from Application” switch in screenshot above.)

When looking at the Deployed Applications graph, the new Multi-deployments switch allows you to view cross-relationships between Components and services (indicated by Blue arrows) in a simplified or detailed manner.

Enhanced Exception Management

The risk exception management flow allows engineers and security specialists to request the removal of an existing exception. This complements the ability to modify an existing exception by requesting a new request that would overwrite the previous one.

The deletion of risk exceptions is, obviously, managed through an approval flow in order to ensure that only users with the right permissions can apply the removal. If the requesting user has the permissions to approve as well, then this option would be available right in the request form.

Enhanced Exception Engine filtering capabilities

Creating Exceptions couldn’t be more straightforward. With our newly introduced filtering capabilities, you’ll never have an issue filtering for a finding. We have introduced a series of asset attribute-based filtering options, e.g. NetBIOS, Hostname and IP, to ensure that exception rules can be defined for any finding.

New lifecycle management for missing Scanner Targets

Phoenix Security has released another way to keep ASPM clean and focused on relevant and up-to-date information. Automate the deletion of missing targets using custom-selected grace periods to keep Security teams focused on the vulnerabilities that matter most. This feature will automatically declutter obsolete missing targets, ensuring scanner targets are up to date and not displaying outdated vulnerabilities.

New matching conditions for Findings filters

At Phoenix Security, we never fail to introduce innovative ways to approach vulnerability management. Searching for a specific group of findings can be a long and tedious process, which is why we have made it as simple and efficient as possible. Use our new ALL/ANY matching conditions to filter findings based on your specific preferences. The “ALL” condition acts as an AND condition, meaning findings displayed will only be shown if all filtering options selected have been met. The “ANY” matching condition acts as an OR condition, meaning findings displayed will be shown if at least one of the filtering conditions has been met. 

New Severity distribution bars in Vulnerability table

The new severity distribution bar is your ultimate weapon for prioritising threats with laser focus. At a glance, it transforms complex vulnerability data into a clear, colour-coded bar highlighting critical, high, medium, low, and negligible risks. This streamlines your vulnerability management process by providing a clear colour-coded representation of the criticality of each vulnerability. Each numeric value within a criticality grouping represents a finding, giving you insight into the criticality of specific findings within a vulnerability.

Integrations

As usual with every Phoenix release, a new set of native API integrations the extensive list already available out of the box.

Fortify SSC Scanner Integration

A new addition to the WEB scanner line-up included in this release is Fortify SSC.

Customers using Fortify SSC as part of their security scanning would be able to integrate with their account using Phoenix’s native API-based integration.

Aikido Security Scanner Integration

with this release, customers using Aikido Security as part of their security scanning would be able to integrate with their account using Phoenix’s native API-based integration.

Orca Security Scanner Integration

A new addition to the Phoenix scanner integration line-up included in this release is Orca Security.

Customers using Orca as part of their security scanning would be able to integrate with their account using Phoenix’s native API-based integration.

Others Enhancements

License information for SBOM/Libraries

Keep up to date with legal and organisational policies with the new Licence column in the SBOM libraries table. Licence criticality is even indicated by colour-coded tiles, with a breakdown of the key information of the selected Licence and remediation actions recommended to be taken, such as switching to a better alternative. This transparency helps mitigate risks of unintentional license violations and supports informed decision-making when selecting or updating components.

Get in control of your Application Security posture and Vulnerability management

🔐 Why It Matters

This release solidifies Phoenix Security’s position as a leading ASPM platform by delivering:

  • Greater visibility across the application lifecycle
  • Smarter prioritization powered by real-time SLAs, lineage, and context
  • Cleaner vulnerability management with automated lifecycle control
  • Deeper integrations with industry-standard tools and scanners

Organizations embracing Phoenix Security can now align their security operations more tightly with engineering workflows, transforming vulnerability management from reactive to predictive.


Alfonso brings experience running international teams for multi-million dollar, technologically advanced projects for Telefónica, IBM and Vodafone. Alfonso joins with two decades of experience working for tech leaders, including at Dell EMC, Yahoo! and Intershop.

Discuss this blog with our community on Slack

Join our AppSec Phoenix community on Slack to discuss this blog and other news with our professional security team

From our Blog

Phoenix Security has integrated Orca Security to enhance vulnerability management across runtime environments and cloud infrastructure. This agentless expansion brings cloud misconfiguration remediation, real-time risk intelligence, and full code-to-cloud security visibility into the ASPM platform, empowering DevSecOps teams to prioritize and resolve high-impact application security issues across AWS, Azure, and GCP.
Alfonso Eusebio
Phoenix Security has integrated Semgrep to enhance code-to-cloud security coverage, bringing high-performance static analysis and Software Composition Analysis (SCA) into its Application Security Posture Management platform. This integration empowers DevSecOps teams with faster triage, contextual vulnerability management, and precise prioritization across cloud-native environments including AWS, Azure, and GCP.
Alfonso Eusebio
The team at Phoenix Security pleased to bring you another set of new application security (ASPM) features and improvements for vulnerability management across application and cloud security engines. This release builds on top of previous releases with key additions and progress across multiple areas of the platform. Application Security Posture Management (ASPM) Enhancements • New Weighted Asset Risk Formula – Refined risk aggregation for tailored vulnerability management. • Auto-Approval of Risk Exceptions – Accelerate mitigation by automating security approvals. • Enhanced Risk Explorer & Business Unit Insights – Monitor and analyze risk exposure by business units for better prioritization. Vulnerability & Asset Management • Link Findings to Existing Tickets – Seamless GitHub, ServiceNow, and Azure DevOps integration. • Multi-Finding Ticketing for ADO – Group multiple vulnerabilities in a single ticket for better workflow management. • Filter by Business Unit, CWE, Ownership, and Deployment Environment – Target vulnerabilities with precision using advanced filtering. Cyber Threat Intelligence & Security Enhancements • Cyber Threat Intelligence Premium – Access 128,000+ exploits for better exploitability and fixability metrics. • SBOM, Container SBOM & Open Source Artifact Analysis – Conduct deep security analysis with reachability insights. • Enhanced Lacework Container Management – Fetch and analyze running container details for better security reporting. • REST API Enhancements – Use asset tags for automated deployments and streamline security processes. Other Key Updates • CVE & CWE Columns Added – Compare vulnerabilities more effectively. • Custom Status Management for Findings – Personalize security workflows with custom status configurations. • Impact & Risk Explorer Side Panel – Gain heatmap-based insights into vulnerability distribution and team risk impact. 🚀 Stay ahead of vulnerabilities, optimize risk assessment, and enhance security efficiency with Phoenix Security’s latest features! 🚀
Alfonso Eusebio
We don’t need more tools. We need a new way of thinking. Application Security Posture Management (ASPM) promises the world, but most teams crumble under tool sprawl, silos, and endless ticket queues. That’s why I built IronClad™ — a brutally simple, brutally effective operating model that fuses ASPM with decentralized ownership and ruthless clarity. This isn’t theory. It’s how security teams can actually win: small empowered squads, zero ambiguity, and mission-first remediation. If you’re tired of drowning in dashboards and ready to rethink how your teams build, secure, and scale, this is the blueprint. 👉 Read how ASPM + IronClad™ flips the script on vulnerability management.
Phil Moroni
As cyber threats become increasingly sophisticated, the need for a more proactive and comprehensive approach to vulnerability management is undeniable. A threat-centric methodology, when combined with advanced tools like Agentic AI and Application Security Posture Management (ASPM), offers organizations the ability to predict and mitigate vulnerabilities before they are exploited by threat actors. This article delves into how leveraging threat intelligence, exposure and reachability analysis, and contextual risk assessments can help organizations stay ahead of cyber threats, specifically focusing on high-risk vulnerabilities like remote code execution (RCE) and memory corruption. Through case studies like Citrix ADC and MOVEit Transfer, the article highlights the growing trend of zero-day exploits and emphasizes the importance of a proactive, data-driven security strategy. In a world where vulnerabilities are constantly targeted, adopting a threat-centric approach is not just a best practice—it’s essential to ensuring long-term security. For startups, the focus is clear—establish visibility and ensure core security practices are in place. Application Security Posture Management (ASPM) tools provide a straightforward, automated approach to detecting vulnerabilities and enforcing policies. These solutions help reduce risk quickly without overburdening small security teams. Mature organizations, on the other hand, are tackling a different set of problems. With the sheer number of vulnerabilities and an increasingly complicated threat landscape, enterprises need to fine-tune their approach. The goal shifts toward intelligent remediation, leveraging real-time threat intelligence and advanced risk prioritization. ASPM tools at this stage do more than just detect vulnerabilities—they provide context, enable proactive decision-making, and streamline the entire remediation process. The emergence of AI-assisted code generation has further complicated security in both environments. These tools, while speeding up development, are often responsible for introducing new vulnerabilities into applications at a faster pace than traditional methods. The challenge is clear: AI-generated code can hide flaws that are difficult to catch in the rush of innovation. Both startups and enterprises need to adjust their security posture to account for these new risks. ASPM platforms, like Phoenix Security, provide automated scanning of code before it hits production, ensuring that flaws don’t make it past the first line of defense. Meanwhile, organizations are also grappling with the backlog crisis in the National Vulnerability Database (NVD). A staggering number of CVEs remain unprocessed, leaving many businesses with limited data on which to base their patching decisions. While these delays leave companies vulnerable, Phoenix Security steps in by cross-referencing CVE data with known exploits and live threat intelligence, helping organizations stay ahead despite the lag in official vulnerability reporting. Whether just starting their security program or managing a complex infrastructure, organizations need a toolset that adapts with them. Phoenix Security enables businesses of any size to prioritize vulnerabilities based on actual risk, not just theoretical impact, helping security teams navigate the evolving threat landscape with speed and accuracy.
Francesco Cipollone
The journey of securing an organization’s application landscape varies dramatically, depending on where a company stands in its maturity. Early-stage startups with small security teams face challenges not only with vulnerabilities but also with scaling their security processes in line with their growth. On the flip side, established enterprises struggle with managing complex environments, prioritizing remediation, and dealing with vast amounts of vulnerabilities while staying ahead of sophisticated threats. For startups, the focus is clear—establish visibility and ensure core security practices are in place. Application Security Posture Management (ASPM) tools provide a straightforward, automated approach to detecting vulnerabilities and enforcing policies. These solutions help reduce risk quickly without overburdening small security teams. Mature organizations, on the other hand, are tackling a different set of problems. With the sheer number of vulnerabilities and an increasingly complicated threat landscape, enterprises need to fine-tune their approach. The goal shifts toward intelligent remediation, leveraging real-time threat intelligence and advanced risk prioritization. ASPM tools at this stage do more than just detect vulnerabilities—they provide context, enable proactive decision-making, and streamline the entire remediation process. The emergence of AI-assisted code generation has further complicated security in both environments. These tools, while speeding up development, are often responsible for introducing new vulnerabilities into applications at a faster pace than traditional methods. The challenge is clear: AI-generated code can hide flaws that are difficult to catch in the rush of innovation. Both startups and enterprises need to adjust their security posture to account for these new risks. ASPM platforms, like Phoenix Security, provide automated scanning of code before it hits production, ensuring that flaws don’t make it past the first line of defense. Meanwhile, organizations are also grappling with the backlog crisis in the National Vulnerability Database (NVD). A staggering number of CVEs remain unprocessed, leaving many businesses with limited data on which to base their patching decisions. While these delays leave companies vulnerable, Phoenix Security steps in by cross-referencing CVE data with known exploits and live threat intelligence, helping organizations stay ahead despite the lag in official vulnerability reporting. Whether just starting their security program or managing a complex infrastructure, organizations need a toolset that adapts with them. Phoenix Security enables businesses of any size to prioritize vulnerabilities based on actual risk, not just theoretical impact, helping security teams navigate the evolving threat landscape with speed and accuracy.
Francesco Cipollone
Derek

Derek Fisher

Head of product security at a global fintech

Derek Fisher – Head of product security at a global fintech. Speaker, instructor, and author in application security.

Derek is an award winning author of a children’s book series in cybersecurity as well as the author of “The Application Security Handbook.” He is a university instructor at Temple University where he teaches software development security to undergraduate and graduate students. He is a speaker on topics in the cybersecurity space and has led teams, large and small, at organizations in the healthcare and financial industries. He has built and matured information security teams as well as implemented organizational information security strategies to reduce the organizations risk.

Derek got his start in the hardware engineering space where he learned about designing circuits and building assemblies for commercial and military applications. He later pursued a computer science degree in order to advance a career in software development. This is where Derek was introduced to cybersecurity and soon caught the bug. He found a mentor to help him grow in cybersecurity and then pursued a graduate degree in the subject.

Since then Derek has worked in the product security space as an architect and leader. He has led teams to deliver more secure software in organizations from multiple industries. His focus has been to raise the security awareness of the engineering organization while maintaining a practice of secure code development, delivery, and operations.

In his role, Jeevan handles a range of tasks, from architecting security solutions to collaborating with Engineering Leadership to address security vulnerabilities at scale and embed security into the fabric of the organization.

Jeevan Singh

Jeevan Singh

Founder of Manicode Security

Jeevan Singh is the Director of Security Engineering at Rippling, with a background spanning various Engineering and Security leadership roles over the course of his career. He’s dedicated to the integration of security practices into software development, working to create a security-aware culture within organizations and imparting security best practices to the team.
In his role, Jeevan handles a range of tasks, from architecting security solutions to collaborating with Engineering Leadership to address security vulnerabilities at scale and embed security into the fabric of the organization.

James

James Berthoty

Founder of Latio Tech

James Berthoty has over ten years of experience across product and security domains. He founded Latio Tech to help companies find the right security tools for their needs without vendor bias.

christophe

Christophe Parisel

Senior Cloud Security Architect

Senior Cloud Security Architect

Chris

Chris Romeo

Co-Founder
Security Journey

Chris Romeo is a leading voice and thinker in application security, threat modeling, and security champions and the CEO of Devici and General Partner at Kerr Ventures. Chris hosts the award-winning “Application Security Podcast,” “The Security Table,” and “The Threat Modeling Podcast” and is a highly rated industry speaker and trainer, featured at the RSA Conference, the AppSec Village @ DefCon, OWASP Global AppSec, ISC2 Security Congress, InfoSec World and All Day DevOps. Chris founded Security Journey, a security education company, leading to an exit in 2022. Chris was the Chief Security Advocate at Cisco, spreading security knowledge through education and champion programs. Chris has twenty-six years of security experience, holding positions across the gamut, including application security, security engineering, incident response, and various Executive roles. Chris holds the CISSP and CSSLP certifications.

jim

Jim Manico

Founder of Manicode Security

Jim Manico is the founder of Manicode Security, where he trains software developers on secure coding and security engineering. Jim is also the founder of Brakeman Security, Inc. and an investor/advisor for Signal Sciences. He is the author of Iron-Clad Java: Building Secure Web Applications (McGraw-Hill), a frequent speaker on secure software practices, and a member of the JavaOne Rockstar speaker community. Jim is also a volunteer for and former board member of the OWASP foundation.

Join our Mailing list!

Get all the latest news, exclusive deals, and feature updates.

The IKIGAI concept
x  Powerful Protection for WordPress, from Shield Security
This Site Is Protected By
ShieldPRO