Go beyond risk: Analyze and Contextualize Threats.
Drive resolution through risk
Control risk, drive resolution through cyber risk target, analyze progress towards a path to green. Report to the board an actionbale plan
Application Security Tooling and orchestration. Aggregation, correlation and the power of cyber risk quantification
Cyber risk in one place with more than 70+ Integrations available
Control application security risk and vulnerabilities. Get insight on what to fix first
Cybersecurity risk quantification and risk target that deliver ACTIONABLE insights to developers
For cyber risk quantification.
Pricing plans that puts you in control
Control application security risk and vulnerabilities. Collaborate with developers on resolution
Cloud Security Posture Management- correlate application security and cloud security in one single place, allowing you to control and act on the most important misconfiguration
For appsec and DevSecOps teams.
Prioritize appsec vulnerabilities and scale application security programmes with risk-based approach
Prioritize cloud misconfiguration and scale cloud security programmes with risk-based approach
Visibility of application, cloud and organization risk position
For SOC and Secops teams. Prioritize vulnerability and scale vulnerability management programmes with risk-based approach
Visualize assets, prioritize vulnerabilities, and ACT on the risks that matter most
Execute actions at scale. Automate triaging and alerting gate pipeline to enforce security guardrails
Get the latest information on whitepapers, business cases, video, training
Read articles by team members, from company updates to tutorials
Explore the latest product features and integrations
Hear about the latest threats in our Vulnerability roundup
Cyber risk live and virtual upcoming events
Common questions, answered
Listen to the latest episodes of our Cyber Security & Cloud podcast
Discover helpful use cases
Read our white papers and datasheets
Application Security and Security Operations, methodologies and actions to measure progress for cloudsec and appsec
Learn how to manage and prioritize vulnerabilities at scale, with contextual prioritization
Learn how to execute and optimize Cloud and application security programs at scale
DevSecOps methodologies and how to evolve teams objectives
Win the battle with Vulnerabilities get latest prices
Chat with the Phoenix Security team and community
Phoenix Security is on a mission to prevent burnout….see how we do it
Meet the Phoenix Security Leadership team
Learn more about the veterans of application security and cloud security that advise and back Phoenix Security
Join our global team of talents
Become a part of our trusted technology partner network
Check out our latest awards
Reach out to our experts
Iframe needs to be enabled to see the page below alternatively, go to the Phoenix Security status page
SLA & Terms of service
Last updated: 14 December, 2022
Phoenix Security provides technical support to assist customers in the use of its solutions, resolve technical problems, and communicate information regarding the Phoenix Security solutions (“Support”). This page describes the Support that is included with all of AppSec Phoenix’s automated solutions; customers receive additional technical support and program management solutions through the selected Phoenix Security Customer Success package.
Phoenix Security shall provide 24 X 5 e-mail support 9-5 Friday, GMT, excluding Phoenix Security recognized holidays. All Phoenix Security customers can also engage AppSec Phoenix’s Support team by either creating a case in our Community https://phoenixsec.slack.com/ (the support case option can be found in the Login drop-down menu) via the Phoenix Security Support or by sending an email to support@phoenix.security Support may also be reached during non-standard business hours and AppSec Phoenix’s Support personnel will respond to non-standard business hour contacts based upon the severity of the issue.
Email Support
As described above, all Phoenix Security customers can also engage AppSec Phoenix’s Support team by sending an email to support@phoenix.security .
Online Help and Documentation
The Phoenix Security solution platform contains a reference section with an extensive library of online documentation, compilation requirements, upload instructions, and tutorials. This online self-service section is available to all provisioned platform users https://kb.phoenix.security/
Administration
All Phoenix Security customers have access to the basic administration services outlined below.
Customer users with the “Organization Admin” role can manage the customer’s other users and teams.
Support Case Severities and Initial Response Times
Severity |
Definition |
Standard Initial Response Time |
Severity Level 1 – “Critical”
|
Failure in the production operation of Phoenix Security solution causes a severe impact on the ability to access AppSec Phoenix’s solution platform and/or run business-critical reports from the platform. No acceptable workaround in place. |
12 Business hours |
Severity Level 2 – “High”
|
Intermittent failure in the production operation of Phoenix Security solution that causes moderate degradation in performance or functionality, resulting in a major operational impact on the ability to access AppSec Phoenix’s solution platform and/or run business-critical reports from the platform. No acceptable workaround in place. |
1 Business Day |
Severity Level 3 – “Medium” |
Minor impact in the production operation of Phoenix Security solution where the solution is operational, but a technical issue exists that may need resolution. This includes issues where an acceptable workaround is usually available and/or a documentation issue exists. |
3 Business Days |
Severity 4 – “Low”
|
Low or no impact in the production operation of Phoenix Security solution where the issue(s) do not impede operations and are limited to user questions and enhancement requests. |
5 Business Days |
Premium Services/ professional Services
The Phoenix Security Customer Success packages are designed to include activities that are aligned to the outcomes that the customer is aiming to achieve through their application security program. They are inclusive of, and not limited to, Technical Support, Application Security Architecture and Consulting, and Security Program Management services.
Last updated: December 14, 2022
Get all the latest news, exclusive deals, and feature updates.