Skip to content

First Steps

Set up your software inventory, configure monitoring, and start receiving CVE alerts.

  • Software Catalog


    Browse the Software Catalog, select what you use, and get up and running in minutes

    Software Catalog

  • Software Monitoring


    Adjust thresholds, track ownership, and manage your company's asset inventory

    Software Monitoring

  • Webhooks


    Select the integrations you use and configure webhooks to receive alerts

    Webhooks

  • Alerts


    Get notified every day when a newly published CVE matches your preferences

    Alerts

After completing these onboarding steps, you'll be ready to monitor vulnerabilities affecting your software. You can continue exploring the application or sit back and wait for the first alerts.