Welcome to Plexicus Documentation

Plexicus is the leading AI-powered Application Security Posture Management (ASPM) platform, built to secure your software supply chain and enhance your organization’s cybersecurity resilience. Designed for modern CI/CD environments, Plexicus provides comprehensive tools to identify, prioritize, and remediate vulnerabilities with unprecedented efficiency.

Our platform automates critical aspects of application security, helping your teams:

  • Streamline Security Workflows: Automate vulnerability identification, enrichment, and remediation to reduce manual intervention by up to 95%.
  • Ensure Compliance: Maintain adherence to industry standards like PCI DSS, SOC 2, NIST 800-53, and more.
  • Seamlessly Integrate: Work effortlessly with your existing tools such as GitHub, GitLab, Bitbucket, and other CI/CD platforms.

By leveraging advanced AI algorithms, Plexicus delivers actionable insights to secure every stage of the software development lifecycle, from code creation to deployment. Explore this documentation to unlock the full potential of Plexicus and transform the way your organization protects its digital assets.


Workflow

  1. Initiating Repository Analysis:
    An Admin, Cyberoper, or Developer begins by analyzing a new repository.

  2. Findings Creation:
    Once the repository is analyzed, AI generates findings and suggests improvements.

  3. File Editing and Review:

    • The Admin or Cyberoper reviews and edits the file containing AI-driven improvements.
    • They send the edited file to the Developer.
  4. Developer Review and Finalization:

    • The Developer analyzes the suggested improvements.
    • They can make additional edits or finalize the changes by creating a pull request to update the file.

Role Differences

ActionAdminCyberoperDeveloper
Add Members to TeamYesNoNo
Analyze RepositoriesYesNoYes
View All FindingsYesYesNo
Send Findings to Dev TeamYesYesNo
Edit FileYesYesYes
Make Pull RequestYesNoYes
Request ReviewNoNoYes