Find answers to common questions, learn how to use our platform effectively, and get support when you need it.
New to our platform? Start here with basic setup and configuration guides.
Learn More →Create your account and choose the right plan for your organization.
Install security agents on your systems and configure monitoring.
Access real-time dashboards and automated security responses.
Our security agents are available for Windows, Linux, and macOS. Download the appropriate installer from your dashboard, run the installation wizard, and follow the configuration prompts. Detailed installation guides are available in our agent download section.
Our platform performs comprehensive security assessments including vulnerability scanning, malware detection, network analysis, compliance checking, and threat intelligence gathering. The system automatically prioritizes findings based on severity and potential impact.
Security reports are color-coded by severity (Critical, High, Medium, Low). Each finding includes detailed descriptions, affected systems, recommended remediation steps, and compliance references. Use the dashboard filters to focus on specific areas of concern.
Yes, our platform supports automated response workflows. Configure rules to automatically quarantine infected systems, block malicious IPs, or generate incident tickets based on specific security events and thresholds.
Our support team is available 24/7 to assist you with any questions or issues you may encounter.
Our support team is available 24/7 to assist you with any questions or issues you may encounter.