Getting Started with CyberOptix
This page will help you get started with CyberOptix. You'll be up and running in a jiffy!
Welcome to CyberOptix
CyberOptix is a unified platform for purple teaming that brings offensive and defensive security teams together to identify and manage exposures across your attack surface.
Platform Capabilities
CyberOptix provides comprehensive security testing, monitoring, and management capabilities:
- Penetration Testing - Active discovery, findings management, and automated scanning
- Attack Surface Management - Monitor external and cloud-based attack surfaces
- SIEM - Centralized log collection and security event analysis
- DevSecOps - Integrate SAST, DAST, and SCA into development pipelines
- Dark Web Intelligence - Monitor for compromised credentials and data leaks
- Vulnerability Management - Network, cloud, and application security testing
- Agent Management - Deploy and manage endpoints across Windows, macOS, and Linux
Feature Overview
Penetration Testing Management
Active Discovery
- Discover hosts and web applications across your infrastructure
- Automated asset identification and classification
Findings Management
- Kanban board for tracking security findings
- Collaborative remediation workflow
- Risk prioritization and assignment
Scanners
- Deploy and manage automated security scanning tools
- Schedule recurring scans
- Integration with multiple vulnerability scanners
Network Organization
- Define subnets for discovery and testing
- Track web application URLs
- Organize assets into logical zones
Attack Surface Management
External Attack Surface
- Map internet-facing assets
- Continuous monitoring for new exposures
- Certificate and DNS tracking
Cloud Security
- Multi-cloud asset discovery (Azure, AWS, Google Cloud)
- Configuration drift detection
- Cloud security posture management
SIEM
Log Collection & Analysis
- Centralized syslog collection
- Azure event and security data integration
- Custom data collectors
Search & Investigation
- Query and analyze security events
- Threat hunting capabilities
- Real-time alerting
DevSecOps
Software Security
- Static Application Security Testing (SAST)
- Dynamic Application Security Testing (DAST)
- Software Composition Analysis (SCA)
- Pipeline integration for automated testing
- Vulnerability tracking across development lifecycle
Dark Web Intelligence
Credential Monitoring
- Identify compromised credentials tied to your organization
- Monitor combo lists for exposed username-password pairs
- Track phishing-related credential exposure
Data Leak Detection
- Monitor for exfiltrated data from breaches
- Detect information from automated scraping
- Alert on info-stealer malware campaigns
Agent Management
Endpoint Deployment
- Windows agent deployment and management
- macOS agent deployment and management
- Linux agent deployment and management
- Centralized agent configuration and updates
Vulnerability Management
Comprehensive Testing
- Network-based vulnerability assessments
- Cloud platform misconfiguration detection
- Dynamic application security testing (DAST)
- Static application security testing (SAST)
- Manual penetration testing documentation
Integrations
Cloud Platforms
- Azure
- AWS
- Google Cloud
Endpoint Detection & Response
- CrowdStrike
- SentinelOne
Code Management
- GitHub
- GitLab
- AzureDevOps
Vulnerability Management
- Snyk
- Qualys
Firewall
- Palo Alto Networks
- Fortinet
Organization & Reporting
Asset Organization
- Tag-based categorization
- Business unit structure
- Public DNS management
Reports
- Exportable penetration testing reports
- Custom report templates
- Executive summaries
Administration
Platform Management
- Multi-organization support
- Global integration configuration
- User and role management
- System parameter configuration
Getting Started
This documentation provides comprehensive guides for:
- Setting up integrations - Connect cloud platforms, code repositories, and security tools
- Deploying scanners - Configure automated security testing
- Managing findings - Track and remediate security issues
- Configuring SIEM - Centralize log collection and monitoring
- Generating reports - Export pentest results and metrics
Navigate through the sections to explore each capability in detail and maximize the value of your purple teaming program.
Why CyberOptix?
CyberOptix eliminates tool sprawl by combining penetration testing, attack surface management, DevSecOps, dark web intelligence, and SIEM into a single platform. This unified approach enables security teams to:
- Collaborate effectively - Offensive and defensive teams work from the same data
- Reduce context switching - All security testing and monitoring in one interface
- Accelerate remediation - Streamlined workflows from detection to resolution
- Improve visibility - Comprehensive view of your entire attack surface
- Scale security programs - Automation and integration across the security lifecycle
Updated about 2 months ago