Getting Started with CyberOptix

This page will help you get started with CyberOptix. You'll be up and running in a jiffy!

Welcome to CyberOptix

CyberOptix is a unified platform for purple teaming that brings offensive and defensive security teams together to identify and manage exposures across your attack surface.


Platform Capabilities

CyberOptix provides comprehensive security testing, monitoring, and management capabilities:

  • Penetration Testing - Active discovery, findings management, and automated scanning
  • Attack Surface Management - Monitor external and cloud-based attack surfaces
  • SIEM - Centralized log collection and security event analysis
  • DevSecOps - Integrate SAST, DAST, and SCA into development pipelines
  • Dark Web Intelligence - Monitor for compromised credentials and data leaks
  • Vulnerability Management - Network, cloud, and application security testing
  • Agent Management - Deploy and manage endpoints across Windows, macOS, and Linux

Feature Overview

Penetration Testing Management

Active Discovery

  • Discover hosts and web applications across your infrastructure
  • Automated asset identification and classification

Findings Management

  • Kanban board for tracking security findings
  • Collaborative remediation workflow
  • Risk prioritization and assignment

Scanners

  • Deploy and manage automated security scanning tools
  • Schedule recurring scans
  • Integration with multiple vulnerability scanners

Network Organization

  • Define subnets for discovery and testing
  • Track web application URLs
  • Organize assets into logical zones

Attack Surface Management

External Attack Surface

  • Map internet-facing assets
  • Continuous monitoring for new exposures
  • Certificate and DNS tracking

Cloud Security

  • Multi-cloud asset discovery (Azure, AWS, Google Cloud)
  • Configuration drift detection
  • Cloud security posture management

SIEM

Log Collection & Analysis

  • Centralized syslog collection
  • Azure event and security data integration
  • Custom data collectors

Search & Investigation

  • Query and analyze security events
  • Threat hunting capabilities
  • Real-time alerting

DevSecOps

Software Security

  • Static Application Security Testing (SAST)
  • Dynamic Application Security Testing (DAST)
  • Software Composition Analysis (SCA)
  • Pipeline integration for automated testing
  • Vulnerability tracking across development lifecycle

Dark Web Intelligence

Credential Monitoring

  • Identify compromised credentials tied to your organization
  • Monitor combo lists for exposed username-password pairs
  • Track phishing-related credential exposure

Data Leak Detection

  • Monitor for exfiltrated data from breaches
  • Detect information from automated scraping
  • Alert on info-stealer malware campaigns

Agent Management

Endpoint Deployment

  • Windows agent deployment and management
  • macOS agent deployment and management
  • Linux agent deployment and management
  • Centralized agent configuration and updates

Vulnerability Management

Comprehensive Testing

  • Network-based vulnerability assessments
  • Cloud platform misconfiguration detection
  • Dynamic application security testing (DAST)
  • Static application security testing (SAST)
  • Manual penetration testing documentation

Integrations

Cloud Platforms

  • Azure
  • AWS
  • Google Cloud

Endpoint Detection & Response

  • CrowdStrike
  • SentinelOne

Code Management

  • GitHub
  • GitLab
  • AzureDevOps

Vulnerability Management

  • Snyk
  • Qualys

Firewall

  • Palo Alto Networks
  • Fortinet

Organization & Reporting

Asset Organization

  • Tag-based categorization
  • Business unit structure
  • Public DNS management

Reports

  • Exportable penetration testing reports
  • Custom report templates
  • Executive summaries

Administration

Platform Management

  • Multi-organization support
  • Global integration configuration
  • User and role management
  • System parameter configuration

Getting Started

This documentation provides comprehensive guides for:

  1. Setting up integrations - Connect cloud platforms, code repositories, and security tools
  2. Deploying scanners - Configure automated security testing
  3. Managing findings - Track and remediate security issues
  4. Configuring SIEM - Centralize log collection and monitoring
  5. Generating reports - Export pentest results and metrics

Navigate through the sections to explore each capability in detail and maximize the value of your purple teaming program.


Why CyberOptix?

CyberOptix eliminates tool sprawl by combining penetration testing, attack surface management, DevSecOps, dark web intelligence, and SIEM into a single platform. This unified approach enables security teams to:

  • Collaborate effectively - Offensive and defensive teams work from the same data
  • Reduce context switching - All security testing and monitoring in one interface
  • Accelerate remediation - Streamlined workflows from detection to resolution
  • Improve visibility - Comprehensive view of your entire attack surface
  • Scale security programs - Automation and integration across the security lifecycle