Landing Page
Welcome to KScope ASPM — your central hub for unified, contextualized, and actionable insights into application security posture. This guide will help you navigate the platform, understand key metrics, and make the most of each feature in your security operations journey.
🏠 Getting Started: Dashboard Overview
Upon login, you'll land on the ASPM Home Dashboard, a powerful summary designed to give you immediate visibility into your current application security posture.

🔹 Top KPI Metrics
Apps Protecting
Total number of applications currently monitored and protected by KScope.
Vulnerable Apps in Prod
Live count of production apps with unresolved vulnerabilities.
Vulnerable Repositories
Number of code repositories containing critical or high-risk issues.
Vulnerable Environments
Number of affected environments (Dev, QA, Prod, etc.) with detected risks.
📊 Key Trends Section
Application Risk Score Heatmap: Color-coded heatmap over a 3-month timeline showing risk levels per app. Details
Control Violations by Severity: Bar chart summarizing violations such as data leakage or unauthorized access by severity (Critical, High, Medium, Low). Details
SLA Breach Tracking: Monitors categories of vulnerabilities that have exceeded defined SLA thresholds. Details
Open vs Closed Vulnerabilities: Time-series graph tracking remediation progress and identifying backlog trends. Details
MTTR (Mean Time to Remediate) Trends: Chart to monitor and improve the efficiency of vulnerability remediation efforts. Details
Top Exploitable Vulnerabilities & Affected Applications: Chart to identify and prioritize remediation efforts for the most exploitable vulnerabilities affecting applications. Details
Unified Vulnerability Map Chart: Chart to get a holistic view of vulnerabilities across different security domains. Details
Pipeline Coverage Chart Chart: Dashboard to monitor security vulnerabilities across different stages of the software development lifecycle. Details
🚀 Navigating the Left Sidebar Menu
Your navigation panel on the left is your gateway to different security focus areas within the KScope ecosystem.
🏠 Home
The default landing page. Use it for an overall view of your current application and environment security posture.
🔁 Pipeline Security
Focused on your CI/CD and development pipeline. This section provides visibility into vulnerabilities detected through Static (SAST) and Dynamic (DAST) application security testing tools.
Use Cases:
Monitor scan coverage across pipelines.
Track unresolved findings in early-stage development.
Enforce “shift-left” security compliance.
☁️ Cloud Security
This section provides visibility into your Cloud Security Posture Management (CSPM).
Expect insights on:
Misconfigured cloud services (e.g., S3 buckets, IAM policies).
Public exposure of critical assets.
Multi-cloud misconfiguration detection (AWS, Azure, GCP).
Ideal for cloud infrastructure security leads and DevOps security teams.
🗄️ Data Security
Focused on Data Security Posture Management (DSPM), this view surfaces:
Unprotected databases (e.g., open RDS, MongoDB, or BigQuery instances).
Sensitive data flow risks (PII, PHI, PCI).
Compliance exposure related to data storage and usage.
This section helps align data governance with security policies.
📦 Inventory
The Inventory section of KScope ASPM acts as your single pane of glass—providing unified visibility across code artifacts, build artifacts, cloud resources, identities, and policies in one place. This is the foundation for achieving full-stack, full-lifecycle security coverage.
🔍 What It Offers:
✅ Real-Time Software Bill of Materials (SBOM): Automatically generates and updates an SBOM for every monitored application, including code libraries, third-party packages, and infrastructure components.
✅ Unified Resource Inventory: Consolidates visibility across development (source code, builds), infrastructure (VMs, containers, databases), and operational (network, storage) layers.
✅ Identity & Access Mapping: Surfaces the relationships between services, owners, and access policies—essential for governance and zero-trust enforcement.
✅ Deployment and Ownership Metadata: Know who owns each service, where it's deployed, and how it's connected to the business.
✅ Environment Mapping: Instantly trace which code repository or artifact is deployed to which environment or cluster.
✅ Relationship Awareness: Visualize links between applications, APIs, cloud services, and data layers—useful for root cause analysis, impact modeling, and compliance audits.
🧑💼 Who It’s For:
Security Architects seeking full asset visibility across layers.
Application Owners wanting to track and protect everything their team deploys.
DevSecOps Engineers needing deep insights into where code ends up in runtime.
Compliance Teams validating ownership, access controls, and audit trails.
Inventory turns complexity into clarity—offering full visibility from repository to runtime, all in one place.
🔦 Insight Feeds
The Insight Feeds section delivers a continuous stream of prioritized, contextual security intelligence across your entire application ecosystem. From source code to cloud infrastructure, it curates the most relevant alerts, vulnerabilities, and exposures—so you can act fast and stay ahead of threats.
📌 What It Delivers:
✅ Unified Security Insights Aggregates and correlates findings from across the application lifecycle—code artifacts, build pipelines, and cloud environments—into a single view.
✅ Prioritized by Business Risk Insights are automatically ranked based on application risk scores, asset criticality, exploitability, and proximity to sensitive data or production environments.
✅ Zero-Day & Emerging Threat Detection Real-time alerts for newly discovered zero-day vulnerabilities or active exploits that impact your stack or dependencies.
✅ CVEs and Misconfigurations Highlights newly disclosed CVEs and misconfiguration risks tied to your deployed assets, cloud posture, or application layers.
✅ Threat Intelligence Overlay Enriches security alerts with external threat intel and internal context—making it easier to understand the why, not just the what.
🧠 Why It Matters:
Cut through alert fatigue with smart prioritization.
Reduce mean time to detect (MTTD) and mean time to respond (MTTR).
Empower teams with high-confidence, context-rich intelligence that aligns with their environment and responsibilities.
Insight Feeds transform raw data into operationally relevant guidance—so you can respond to what matters, when it matters.
🤖 KAI (Kortext Augmented Insights)
KAI is your AI-powered, conversational assistant designed to help you explore and analyze complex hypergraph data that powers KScope’s contextual intelligence engine. With KAI, you can intuitively ask questions and receive real-time, insight-rich answers about your application security posture, infrastructure, risks, and relationships—without needing to manually dig through layers of data.
🔍 Key Capabilities:
Interactive Hypergraph Exploration: Ask natural language questions to explore nodes, edges, relationships, and properties within your environment’s hypergraph—KScope’s contextual data backbone.
Context-Aware Security Q&A: Query about risks, exposures, and policy violations—KAI understands the context and criticality of each component in your stack.
Dynamic Risk Analysis: Instantly assess how vulnerabilities, misconfigurations, or access issues connect across services, APIs, and environments.
💼 Value to IT & Security Engineers:
✅ Advanced Data Exploration Without the Overhead: No need for SQL, graph query languages, or dashboards—KAI translates complex relationships into understandable, actionable answers.
✅ Real-Time Decision Support: Whether you’re planning a fix, assessing impact, or preparing for an audit, KAI delivers the clarity needed to make confident decisions.
✅ Boosted Operational Efficiency: Slash investigation times by quickly pinpointing high-risk zones, system dependencies, or compliance gaps—right from chat.
💬 Try Asking KAI:
“What are the top 5 production risks for our financial services apps?”
“Which S3 buckets are connected to applications with known vulnerabilities?”
“Which environments have unpatched software linked to business-critical APIs?”
“Show me all services owned by the Payments team with critical control violations.”
Think of KAI as your on-demand, AI-powered security analyst—here to simplify the complex and spotlight what matters most.
📋 Jobs
The Jobs page serves as your central command center for managing all data processing, reporting, and export operations within KScope ASPM. Whether you're generating compliance reports, exporting structured datasets, or running scheduled scans, this is where you track it all—clearly and efficiently.
🔧 Key Capabilities:
Real-Time Job Monitoring: View the live status of active, scheduled, and completed jobs—including scans, report generation, data exports, and integration syncs.
Downloadable Output Files: Quickly access and download result files—whether it’s a security findings export, compliance audit trail, or SBOM report.
👨💻 Built for IT & Security Engineers:
✅ Improves Operational Efficiency: Eliminates guesswork with full transparency into backend processes and task outcomes.
✅ Supports Compliance & Audit Readiness: Easily retrieve structured reports for regulators, auditors, or executive stakeholders.
✅ Enables Data-Driven Collaboration: Export standardized data sets to share across teams, integrate with analytics platforms, or fuel custom dashboards.
The Jobs page turns background operations into a fully visible and controllable workflow—so your data is always accessible, actionable, and audit-ready.
⚙️ Settings
Configure your environment, integrations, and team access.
Options include:
Adding cloud accounts or SCM tools.
Managing user roles and permissions.
Configuring alert policies and thresholds.
📣 Need More Help?
Use the built-in KAI assistant to ask live questions about platform features, risk posture, or even platform usage tips.
Or contact support anytime at [email protected] for advanced troubleshooting or onboarding assistance.
✅ Summary
Whether you're a CISO, DevSecOps lead, or application owner, KScope ASPM gives you the visibility, context, and control to protect what matters most—your applications, your data, and your business.
See beyond the vulnerability. Act with confidence. Lead with intelligence.
Would you like this as a downloadable PDF or turned into an interactive in-product help panel? I can also write contextual tooltips or walkthroughs for onboarding flows.
Last updated
Was this helpful?