01

Get notified

A basic workflow starts with a basic notification.
BitSensor is built to deviate from current security solutions where staring at the screen all day is the norm.

A message contains all information you need to follow up. This includes, but is not limited to:

  • Occurrence
  • Endpoint URI
  • Attack types
  • Priority

Besides, in this information overview the text, email or custom notification contains a link to the BitSensor dashboard. There you will see the attack / vulnerability in the application's context at the relevant timeframe.

02

Explore

After the notification you land on the connected graph. Here it is clearly visible which part of the application got attacked and by whom. Next to that you will see what attack types were used and how BitSensor correlated these attacks.

After that you will find out whether an attack was successful and how severe the attack was.

The connected graph is time-based. This allows you as a user to scroll through time and see the hackers path over time, allowing you to analyse where and how the hacker found weak spots in your system.

03

Block & Fix

Now that you know who attacked you, where and how, it is time for the next step, taking action.

There are a few things you can do right away:

  • Block — If you want to block the security event / breach this is one click away.
  • False positive — In the exceptional case that BitSensor's detections were too harsh and had a wrong detection, you can report the detection as a ‘false positive’ to make BitSensor learn and improve your experience.

The next step is fixing the problem.

  • Fix — BitSensor will tell you in what line of code the vulnerability is situated, so you can fix it.
  • Export — If you want to consult someone on fixing your problem or want them to fix it, you can export all relevant data with a single button click.