Integrates is a platform which allows control of the vulnerability testing and remediation processes. In Integrates, every project stakeholder (e.g., developers, technicians, security analysts and managers) can interact and access information about all security issues and manage them. Through this platform, an internal or external security team communicates all security risks identified in a hacking project so that they can be remedied quickly, efficiently and effectively.
Know the security status and trends of
Facilitate collaboration of all stakeholders
to manage the vulnerabilities and reach a
high fixing rate.
See the details of each detected
Have a thorough prioritization of
security risks for their timely
Facilitate the executive control of processes
via the Integrates-App (on Android and iOS)
by providing crucial information
on the vulnerability remediation rate
on your tested systems.
Integrate our app with your existing
products using a common query language
for modern APIs (GraphQL).
Request verification of treatments and
documentation from your security team.
Establish quick communication with, and
receive important notifications from,
our team (when you purchase Drills).
Integrates provides you with information about the current security status of all your company’s applications such as: 1) the number of security vulnerabilities identified; 2) the current threat level that those vulnerabilities pose to your organization, and 3) the vulnerabilities that have already been remediated.
Through Integrates you will have access to the visualization of all vulnerabilities found as well as information about their current status, location, type and severity of the threat, identification/reporting date, evolution, and recommendations on how to eliminate them.
Integrates helps you determine which vulnerabilities require immediate attention based on parameters including: age, severity, status (open/closed) and resolution options (accepted/new/in progress/indefinitely accepted). After a vulnerability has been remediated you can ask Fluid Attacks for documentation.
Integrates allows you to monitor what is happening in the Continuous Integration pipeline. You can check at any time what has been found in your tested system, as well as all information related to the use of Forces (Fluid Attacks' product). Forces works on the information provided by Integrates about the state of the vulnerabilities found, and from that, it breaks the build if required.
The Compromised Records function within Integrates shows your company information such as names, identifiers, balances, products, etc., that would be vulnerable to a security breach in a real attack. All events that inhibit the testing can also be viewed in Integrates in real time.
When Drills (Fluid Attacks' product) is purchased, Fluid Attacks will provide continuous support via chat and email to the development team in order to help them reach high remediation rates.