For security engineering teams
who build and operate the security tooling stack
Security engineering teams build and operate the platforms that the rest of the security organisation depends on. SecPortal pairs scanner orchestration, scheduled SAST and SCA from the Git provider, authenticated DAST with encrypted credential storage, finding consolidation, role-based access, and an append-only activity log on one workspace, so the security tooling stack runs as one record rather than a fleet of disconnected services.
No credit card required. Free plan available forever.
A security engineering platform built around the workspace as a record
Security engineering teams build and operate the platforms that the rest of the security organisation depends on. The work spans scanner fleet operation, CI scanner integration, scan scheduling, credential rotation, repository connections, identity and access policy, verification and authorisation gates, and the audit trail every other team eventually asks for. Most teams run this programme across a SAST tool, an SCA tool, a DAST scanner, an external scanner, a credential manager, a scheduler, an issue tracker, a shared drive, and a spreadsheet, and pay the cost in glue code, reconciliation hours, and tooling bills that nobody can map to outcomes.
SecPortal gives in-house security engineering teams one workspace for scanner output, scheduled scans, encrypted credentials, repository connections, role-based access, an append-only activity log, and AI-assisted reporting. The platform is the record. The scanner fleet, the credential vault, the schedules, and the access model all read from the same source rather than from a fleet of consoles. Whether the team is one person operating a security platform inside a Series B SaaS company or a dedicated function inside a regulated enterprise, SecPortal is the workspace the security tooling stack runs against.
Capabilities security engineering teams use day to day
Scanner orchestration on a workspace record
Run external scanning across 16 modules, authenticated DAST behind login, and Semgrep-based SAST plus dependency auditing through SCA on the repositories the workspace owns. Output from each scanner type lands on the same engagement record with CVSS 3.1 vector, severity, evidence, owner, and remediation status, so the security tooling stack produces one queue rather than five reconciled ones.
Scheduled runs with diff-aware regression detection
Continuous monitoring drives daily, weekly, biweekly, or monthly schedules for external, authenticated, and code scans on the same record as the findings they produce. The scan diff endpoint surfaces new findings, fixed findings, unchanged findings, and module-only deltas between runs, so regressions are observable without a manual export.
Encrypted credential storage with rotation
Authenticated scanners need credentials. SecPortal stores them with AES-256-GCM authenticated encryption, scopes them to a verified domain inside a workspace, gates access through role-based access control, and records every lifecycle event in the activity log. Rotation is a tracked operation through CREDENTIAL_ENCRYPTION_KEY_PREVIOUS support rather than a tribal-knowledge handover.
Workspace-scoped repository connections
Connect GitHub, GitLab, or Bitbucket through OAuth at the workspace level. Repository connections, scan schedules, and credential vaults are workspace-scoped rather than per-engineer, so removing a team member does not break the live scan jobs the security platform depends on.
Domain verification before any scan runs
Every external, authenticated, and continuous scan targets a verified domain. Three verification methods (DNS TXT, HTML meta tag, and .well-known file upload) prove the workspace owns or is authorised to test the target before scanner traffic ever reaches it. Scan authorisation is a precondition, not a runtime check.
Append-only activity log across the platform
Every finding update, engagement change, scan run, credential lifecycle event, document upload, comment, invoice, and team change is recorded with the actor, the entity, the timestamp, and the action. Plan-level retention covers 30, 90, or 365 days, and the trail is reproducible at audit time without a multi-team excavation.
How security engineering teams operate the platform inside SecPortal
Security platforms that hold up between releases operate on a small set of disciplines. SecPortal supports each one rather than a single phase of it.
- Treat the security tooling stack as a product with a single engagement record rather than as a fleet of disconnected services with their own dashboards, identifiers, and severity models.
- Run scan schedules on a workspace record so cadence is observable as a programme metric rather than a per-tool console question, and so the diff between runs is part of the platform rather than a reconciliation script.
- Store every authenticated-scan credential in the encrypted vault so cookie, bearer, basic auth, and form login secrets stop circulating in shared password managers, environment variables, and wiki pages.
- Verify ownership of every scan target before traffic runs so the platform does not produce accidental scan traffic against assets the workspace does not own.
- Use role-based access control to scope analysts, engineers, and viewers to the access they actually need, and require multi-factor authentication on every account so the access model is enforced rather than asserted.
- Keep an append-only activity trail so the question of who triaged what, who rotated which credential, and who changed which schedule has a single defensible answer at audit time.
From verified domain to triaged finding, on one record
The security engineering loop is verify the target, connect the source, store the credentials, schedule the run, triage the output, and operate the access model that holds the trail together. SecPortal runs a single workflow that the security engineer, the application security analyst, the vulnerability management owner, and the security leader can all work against without re-keying state into another tool.
- 1Open a workspace and verify the domains, repositories, and assets the security platform is authorised to scan. Domain verification through DNS TXT, HTML meta tag, or .well-known file is the precondition that gates every external, authenticated, and continuous scan that follows.
- 2Connect GitHub, GitLab, or Bitbucket through OAuth at the workspace level. Schedule Semgrep-based SAST and dependency auditing through SCA on the repositories the workspace owns, and route findings into the same engagement record as authenticated DAST and external scans.
- 3Add the credentials authenticated scanners need (cookie, bearer token, basic auth, form login) to the encrypted credential vault. Credentials are scoped to a verified domain, gated through the manage_credentials permission, and every lifecycle event is captured in the activity log so rotation is a tracked operation rather than a hand-off.
- 4Set scan schedules on the engagement record. Continuous monitoring runs daily, weekly, biweekly, or monthly schedules for external, authenticated, and code scans, and the scan diff endpoint surfaces new, fixed, and unchanged findings between runs so regression detection is part of the platform rather than a manual export.
- 5Triage scanner output on the engagement record. Validate the detection, deduplicate against the existing backlog, recalibrate the CVSS 3.1 vector for environmental and temporal context, attach OWASP and framework mapping where it applies, and assign each finding to a named owner with a severity-driven SLA window.
- 6Operate the platform under role-based access control with multi-factor authentication enforced at the workspace level. The middleware promotes sessions to AAL2 so the access model is real rather than asserted, and the activity log captures the trail every auditor and incident responder eventually asks for.
Where the security engineering programme connects to the rest of the workspace
Most security engineering teams adopt the platform in three phases: bring scanner output and the consolidated finding backlog into one workspace so SAST, SCA, DAST, and external scans stop living in five tools, layer in encrypted credentials and continuous monitoring so authenticated scans actually run on a schedule with a credential rotation story, then consolidate role-based access, multi-factor authentication, and the activity log so the platform meets the audit posture the rest of the organisation operates against. The relevant feature, workflow, and research pages explain each phase in detail.
- The scanner output, scheduling cadence, and diff-aware regression detection sit on the continuous monitoring feature page, with code-side coverage on the code scanning feature page and runtime DAST on the authenticated scanning feature page.
- The credential vault, the rotation story, and the access model live on the encrypted credential storage feature page, the verification gate on the domain verification feature page, and the workspace-enforced second factor on the multi-factor authentication feature page.
- The findings repository, CVSS calibration, and the audit trail are covered on the findings management feature page, the append-only activity record on the activity log feature page, and the role-based access controls on the team management feature page.
- The scanner triage discipline lives on the scanner result triage use case, the bulk import flow on the bulk finding import use case, and the scheduling cadence and baseline diff guidance on the scan scheduling and baseline cadence guide.
- The framework cadence floors and audit-evidence cadence are covered on the ISO 27001 framework page, the SOC 2 framework page, and the PCI DSS framework page, with the deeper analysis of how throughput, evidence currency, and remediation cycle time behave on the vulnerability remediation throughput research and the audit evidence half-life research.
For security engineering teams evaluating against bundled enterprise platforms
Security engineering teams evaluating consolidation tend to compare SecPortal against bundled enterprise vulnerability platforms, against scanner-led platforms with a remediation tab bolted on, against open source findings hubs, and against issue trackers used as a vulnerability tool. The detailed side-by-side comparisons cover the operational footprint and the evidence model on each model.
- The SecPortal vs Tenable.io comparison covers a workspace-scoped engagement record versus a scanner-led platform with a remediation view bolted on top.
- The SecPortal vs Qualys comparison covers the same scanner-led model from a different vendor, where authenticated scanning, continuous monitoring, and the audit trail sit in different consoles.
- The SecPortal vs DefectDojo comparison covers the move from a self-hosted findings hub to a managed delivery platform with authenticated scanning, encrypted credential storage, AI reporting, and a branded portal view.
- The SecPortal vs ServiceNow Vulnerability Response comparison covers a security-engineering-owned workspace versus a workflow-engine-led platform where the scanner integration is a custom build.
- The SecPortal vs Jira comparison covers the workspace model versus an issue tracker with a vulnerability template, where severity, evidence, retests, and OWASP mapping live on the engagement record rather than on a ticket comment trail.
SecPortal is built for security engineering teams that want one platform for the full verify-connect-store-schedule-triage-operate loop: live findings, SAST and SCA from the Git provider, authenticated DAST against the deployed service with encrypted credentials, external scanning across the verified perimeter, scheduled runs with diff-aware regression detection, role-based access, multi-factor authentication, and an append-only activity log. Application security gets a clearer signal on the services it owns, vulnerability management gets a clean backlog, GRC gets reproducible evidence, and the security engineering function gets back the hours that used to disappear into glue code, credential rotation, and console hopping.
If your function sits closer to pipeline security and CI scanning than to security platform engineering, the sister page SecPortal for DevSecOps teams covers SAST and SCA from the Git provider, authenticated DAST on a schedule, and the operating model that makes security testing continuous rather than release-blocking.
If your function sits closer to operating the developer platform itself (golden paths, paved roads, IDP scaffolds, CI/CD glue) rather than to building security tooling, the SecPortal for platform engineering teams page covers the same workspace primitives from the platform-team integration angle, where security testing slots into the developer platform as a service rather than as a fleet of custom CI integrations.
If your function is closer to the find-track-fix-verify backlog than to the platform that produces the findings, the SecPortal for vulnerability management teams page covers scanner consolidation, severity calibration, SLA tracking, and the exception register that sits on top of the platform layer.
If your function spans cross-cutting product security review, PSIRT-style intake, and security champions inside engineering, the SecPortal for product security teams page covers SAST, SCA, authenticated DAST, security review intake, and the disclosure lifecycle on one engagement record.
If the security engineering team reports up to a security leader who needs the leadership view on the same record the operators run on, the SecPortal for CISOs and security leaders page covers the program-level reporting workflow that sits on top of the security platform record without rebuilding a deck every quarter.
The problems you face
And how SecPortal solves each one.
The team operates scanners across SAST, SCA, authenticated DAST, external scanning, and third-party pentest reports, and each output sits in a different format with a different identifier model and a different deduplication strategy
One findings database with CVSS 3.1 vector, severity, evidence, owner, and remediation status across every source. Nessus and Burp Suite imports, custom CSV mapping, code scan results from GitHub, GitLab, or Bitbucket OAuth, authenticated DAST output, and manually logged pentest findings consolidate on the same record so the platform exposes one queue rather than five.
Scan schedules live in scanner consoles, vendor portals, and cron files, so the team cannot answer in one query which assets are on cadence and which are silently behind
Continuous monitoring runs daily, weekly, biweekly, or monthly schedules for external, authenticated, and code scans on the same record as the findings they produce. The schedule is part of the engagement, not a separate cron file, and the scan diff endpoint surfaces new, fixed, and unchanged findings between runs without a manual export.
Credentials for authenticated scanners live in shared password managers, environment variables, or wiki pages, and rotation is a tribal-knowledge exercise that nobody documents
Encrypted credential storage with AES-256-GCM keeps cookie, bearer token, basic auth, and form login secrets inside the workspace. Credentials are scoped to a verified domain, gated through role-based access control, and every lifecycle event (created, used, rotated, revoked) is captured in the activity log so rotation becomes a tracked operation rather than a hand-off.
Access to scanner output, pentest reports, and credential storage is controlled by whichever tool the team rolled out last, so the team cannot answer who can read what without a ticket sweep
Role-based access control covers owner, admin, member, viewer, and billing roles inside the workspace. Authenticated scanning credentials are gated to the manage_credentials permission, finding visibility is gated to the workspace, and every account is required to enrol multi-factor authentication when the workspace owner enables it. The middleware promotes sessions to AAL2 so the access model is enforced rather than asserted.
Every change to a scan target, a credential, a finding, or a team membership produces a question at audit time about who did it and when, and the team rebuilds the trail from chat history each cycle
The activity log records every finding update, engagement change, scan run, credential lifecycle event, document upload, comment, invoice, and team change with the actor, the entity, the timestamp, and the action. Plan-level retention covers 30, 90, or 365 days, and the trail is reproducible at audit time without a multi-team excavation.
New scanners, new repositories, and new domains land on the platform faster than the team can verify ownership, and unauthorised scan traffic creates incidents that distract the engineering team for a week
Domain verification proves ownership before any scan runs through DNS TXT, HTML meta tag, or .well-known file methods. Scan authorisation is a precondition rather than a runtime check, and the verified domain is the only target an authenticated scan or external scan can run against, so the platform does not produce accidental scan traffic against assets the team does not own.
Repository connections, scanner credentials, and scan schedules are configured per engineer, so when someone leaves the team the platform half-breaks until the cleanup ticket gets prioritised
GitHub, GitLab, and Bitbucket connections are workspace-scoped through OAuth, credentials are workspace-scoped with named owners, and schedules are workspace-scoped with explicit triggers. Removing a team member through team management revokes their access without breaking the live scan jobs, the credential vault, or the repository connections the workspace depends on.
Compliance and GRC owners ask for evidence that the security tooling itself is operating under SOC 2 CC7.1, ISO 27001 Annex A 8.8, PCI DSS 11.3, and NIST SP 800-53 RA-5, and the team has to assemble it manually each cycle
Compliance tracking maps findings and controls to ISO 27001, SOC 2, Cyber Essentials, PCI DSS, and NIST frameworks on the same record as the live engagement. CSV export of findings, control status, and the activity trail is available when the auditor wants the trail in their own format rather than as a narrative document.
Run the security tooling stack as one record
Scanner orchestration, scheduled SAST and SCA, authenticated DAST with encrypted credentials, RBAC, MFA, and an append-only activity log on a single workspace.
No credit card required. Free plan available forever.