Bright Security’s Enterprise Grade Dev-Centric DAST Integrates with

Microsoft Defender for Cloud →
Product
Product overview

See how dev-centric DAST for the enterprise secures your business.

Web attacks

Continuous security testing for web applications at high-scale.

API attacks

Safeguard your APIs no matter how often you deploy.

Business logic attacks

Future-proof your security testing with green-flow exploitation testing.

LLM attacks

Next-gen security testing for LLM & Gen AI powered applications and add-ons.

Interfaces & extensions

Security testing throughout the SDLC - in your team’s native stack.

Integrations

Connecting your security stack & resolution processes seamlessly.

Docs

Getting started with Bright and implementing it in your enterprise stack.

Book a demo

We’ll show you how Bright’s DAST can secure your security posture.

Resources
Blog

Check out or insights & deep dives into the world of security testing.

Webinars & events

Upcoming & on-demand events and webinars from security experts.

Docs

Getting started with Bright and implementing it in your enterprise stack.

Case studies

Dive into DAST success stories from Bright customers.

Research

Download whitepapers & research on hot topics in the security field.

Company
About us

Who we are, where we came from, and our Bright vision for the future.

News

Bright news hot off the press.

Webinars & events

Upcoming & on-demand events and webinars from security experts.

We're hiring

Want to join the Bright team? See our open possitions.

Bug bounty

Found a security issue or vulnerability we should hear about? Let us know!

Contact us

Need some help getting started? Looking to collaborate? Talk to us.

Resources > Blog >
Bright Product Update – June 2021

Bright Product Update – June 2021

Nera Besic

This blog post announces the June 2021 Update for Bright.
We added some new features and product enhancements that will make your experience even better.

New Features:

You can now upgrade to the Pro plan on your own

We have officially released our self-service billing system! You can now easily upgrade your free plan to a Pro plan! The Pro plan expands the number of scan hours and developers, and enables new features:

  • 3 ticketing integrations (Jira, Github, Slack, Azure, GitLab, Monday)
  • Export reports to PDF and JSON
  • Role-based access control (RBAC)
  • Single sign-on (SSO)
  • User and organization APIs

Check it out!

GitLab Ticketing Integration

You can now open tickets for found issues directly in your GitLab repositories! To enable, in your account, go to Organization and scroll down to Ticket Management Integration.

See documentation

Skip Slow Entry-Points Automatically

Speed up your scans by skipping the few slow endpoints that may cause a delay! (Don’t worry, you can always scan them separately later)

See documentation

Improvements:

Easier private cloud deployments with the ‘Cluster’ parameter in the CLI

Configure a Repeater for private cloud deployments more easily with the new ‘cluster’ parameter for the CLI

See documentation

New Scan Templates

We added a few new scan templates, including OWASP Top 10, and MITRE Top 25.

To run a scan from a template, go to Scans (click the button below), click on New Scan.  In the New Scan window, click on the Advanced tab (top-right), and click on Templates. Select your desired template from the list. That’s it!

Resources

Domain Hijacking: How It Works and 6 Ways to Prevent It

What Is Domain Hijacking?  Domain hijacking refers to the unauthorized acquisition of a domain name by a third party, effectively taking control away from the rightful owner. This form of cyber attack can lead to significant disruptions, including loss of website functionality, email services, and potentially damaging the brand’s reputation.  Domain hijackers often exploit security

Mastering Vulnerability Management: A Comprehensive Guide

Modern day organizations face a constant barrage of cyber threats, making it imperative to implement robust vulnerability management processes. Vulnerability management is a systematic approach to identifying, evaluating, treating, and reporting on security vulnerabilities in systems and their associated software. In this blog post, we’ll delve into the four crucial steps of vulnerability management process

Vulnerability Scanners: 4 Key Features, Types, and How to Choose

A vulnerability scanner is a specialized software tool designed to assess the security of computers, networks, or applications by automatically detecting and analyzing weaknesses. These scanners proactively search for security vulnerabilities, such as unpatched software, misconfigurations, and other security gaps that could be exploited by attackers. Some scanners can simulate the actions of an attacker to help identify exploitable vulnerabilities.

Get our newsletter