Welcome to Backline!
Follow these simple steps to start managing your security vulnerabilities effectively.Step 1: Connect Your SCM
First, connect your source control management platform to allow Backline to access your repositories.Step 2: Add Security Scanners
Connect your security scanning tools to start collecting vulnerability data.Step 3: Let Backline Work Its Magic
Once your integrations are connected, Backline’s agents will automatically:- Collect and de-duplicate vulnerabilities from all connected sources
- Analyze severity and impact
- Plan remediation steps
- Apply the suggested remediation plan
- Verify the change applied
- Monitor deployment of the fix and SLA compliance
Initial collection of vulnerabilities may take a few minutes depending on the size of your security backlog.
Step 4: Explore Your Dashboard
Head to the Dashboard to view:- Total vulnerabilities by severity
- Active remediation efforts
- SLA status and violations
- Remediation pipeline and performance metrics