When you log in for the first time, you will be landed upon the Overview page.
To get started, you are required to:
- Onboard your asset inventory onto the platform
- Invite your security stakeholders such as the management team, development team, IT team, internal security team, external security vendors, etc.
- Provision access to assets to its respective stakeholders
- Configure SLA policy
Once you finish these steps, you can:
- Import your old scan reports
- Set up workflows to run an automated scan
- Log vulnerabilities
- Export reports in various formats
- Access dashboards to review security posture and so much more…
Comments
Article is closed for comments.