First Steps
Set up your software inventory, configure monitoring, and start receiving CVE alerts.
-
Software Catalog
Browse the Software Catalog, select what you use, and get up and running in minutes
-
Software Monitoring
Adjust thresholds, track ownership, and manage your company's asset inventory
-
Webhooks
Select the integrations you use and configure webhooks to receive alerts
-
Alerts
Get notified every day when a newly published CVE matches your preferences
After completing these onboarding steps, you'll be ready to monitor vulnerabilities affecting your software. You can continue exploring the application or sit back and wait for the first alerts.