Welcome to Backline!
Follow these simple steps to start managing your security vulnerabilities effectively.Step 1: Connect Your SCM
First, connect your source control management platform to allow Backline to access your repositories.Step 2: Add Security Scanners
Connect your security scanning tools to start collecting vulnerability data.Step 3: Let Backline Work Its Magic
Once your integrations are connected, Backline’s agents will automatically:- Collect and de-duplicate vulnerabilities from all connected sources
- Analyze severity and impact
- Plan remediation steps
- Apply the suggested remediation plan
- Verify the change applied
- Monitor deployment of the fix and SLA compliance
Initial collection of vulnerabilities may take a few minutes depending on the size of your security backlog.
Step 4: Explore Your Dashboard
Head to the Dashboard to view:- Total vulnerabilities by severity
- Active remediation efforts
- SLA status and violations
- Remediation pipeline and performance metrics
Next Steps
Configure SLA
Set up service level agreements for your organization.
View Vulnerabilities
Explore all discovered vulnerabilities in detail.
Track Remediations
Monitor ongoing remediation efforts.