For SOC analysts and security operations analysts
who triage scanner output and pentest findings into a defensible queue
SOC analysts and security operations analysts triage what landed overnight, validate scanner output against reality, calibrate severity for the environment, deduplicate against the existing backlog, route findings to the named engineering owner, and verify that the fix held on retest. SecPortal pairs findings consolidation with CVSS 3.1 calibration, the open or in_progress or resolved or verified or reopened status workflow, scanner imports for Nessus and Burp Suite and custom CSV, scheduled scans with diff-aware regression detection, retest validation, exception capture, and an append-only activity log on one workspace, so the analyst works one queue rather than rotating through five vendor consoles.
No credit card required. Free plan available forever.
A finding queue, a CVSS calibration surface, and an audit trail an analyst can actually run
SOC analysts and security operations analysts triage what landed overnight, validate scanner output against reality, calibrate severity for the environment, deduplicate against the existing backlog, route findings to the named engineering owner, and verify that the fix held on retest. The work spans scanner output from external scans, authenticated scans, code scans, third-party pentest reports, and manual review items, and the analyst typically runs it across a vulnerability scanner console, a SAST or SCA dashboard, a pentest report PDF, a spreadsheet for the queue, and a ticketing tool for the engineering hand-off. The queue does not sit on one record, the calibration story is in a comment thread, and the audit trail rebuilds from chat history every time the auditor asks.
SecPortal gives in-house SOC and security operations analysts one workspace for findings consolidation, CVSS 3.1 calibration on the engagement record, the open or in_progress or resolved or verified or reopened status workflow, scanner imports for Nessus and Burp Suite and custom CSV, scheduled scans with diff-aware regression detection, evidence attachments on the finding, retest validation, exception capture with the structured decision chain, and the append-only activity log that ties the lifecycle together. Analysts work one queue rather than five, the calibration is a record event rather than a message in a thread, and the audit trail is one record rather than a multi-team excavation. The analyst gets back the hours that used to disappear into reconciliation between tools.
Capabilities SOC analysts use day to day
One finding queue across scanner, pentest, and code-scan output
Scanner output, third-party pentest results, code scanning findings, manually logged review items, and bulk Nessus, Burp Suite, and CSV imports consolidate on one engagement record with CVSS 3.1 vector, severity, evidence, owner, and status. The analyst works one queue rather than rotating through five vendor consoles to figure out what is open against which asset.
Status workflow that mirrors how analysts actually triage
Findings carry the open, in_progress, resolved, verified, and reopened states from the moment they land. The analyst can move a finding from open to in_progress when investigation starts, from in_progress to resolved or verified when the fix is confirmed, and from resolved back to reopened when a regression appears. The state machine is the workflow, not a free-text comment trail.
CVSS 3.1 calibration for environmental and temporal context
Every finding stores the parsed CVSS 3.1 vector and the calculated base score. Analysts can recalibrate the environmental and temporal vectors on the engagement record without losing the original scanner-supplied score, so a critical finding from one scanner against an internal-only service does not read identically to a critical finding from another scanner against an internet-exposed login.
Append-only activity log per finding with timestamps and actor
Every state change, severity recalibration, evidence upload, comment, retest run, and assignment change is recorded with the actor, the finding, the timestamp, and the action. Plan retention covers 30, 90, or 365 days, and CSV export keeps the trail reproducible at audit time. The analyst hand-off survives shift change, tester rotation, and tool migrations because the trail is one record rather than five reconciled chat histories.
Bulk import for Nessus, Burp Suite, and custom CSV
When a vendor scanner output needs to land on the analyst queue, bulk import covers Nessus .nessus files, Burp Suite XML, and custom CSV with column mapping. The import becomes structured findings with severity, CVE/CWE references, and asset context preserved verbatim, ready for triage rather than ready for a copy-paste session into a spreadsheet.
Engagement-scoped access with MFA enforced
Role-based access control covers owner, admin, member, viewer, and billing roles. Analysts can be scoped to the engagements they triage rather than to the entire workspace, and the middleware promotes sessions to AAL2 when MFA is required, so the access model is enforced rather than asserted. Removing an analyst through team management revokes their access without breaking the live engagement record they were working on.
How analysts run triage inside SecPortal
A triage discipline that holds up between cycles operates on a small set of habits. SecPortal makes each one a record event rather than a tribal-knowledge convention.
- Triage every new finding into the structured workflow rather than a comment thread, so the question of what state a finding is actually in has a single defensible answer in the system rather than three different ones across email, chat, and a ticket comment.
- Recalibrate CVSS on the engagement record before promoting a finding into the deliverable, so a scanner-supplied critical against an internal admin panel behind a VPN does not read identically to a scanner-supplied critical against an internet-facing login. The environmental and temporal vectors are the analyst lever.
- Deduplicate against the existing backlog before opening a new finding, so two scanners flagging the same parameter on the same asset land as one canonical entry with both source links preserved rather than as two separate findings the engineering team has to reconcile.
- Attach evidence at the moment of validation rather than at the end of the cycle, so the screenshot, the request and response pair, the proof-of-concept, and the rationale are on the finding record when the engineering owner picks it up rather than missing when retest week arrives.
- Move findings through the verified state on retest rather than leaving them as resolved on the engineering claim alone, so the analyst signs off on the close decision and the activity log records who verified what against which retest run.
- Capture exceptions, compensating controls, and risk acceptances on the same finding record with the structured decision chain so the analyst hand-off to the security committee carries the rationale rather than a narrative document the next analyst has to reconstruct.
From new finding to verified close, on one engagement record
The analyst loop for security operations is land, validate, calibrate, deduplicate, assign, and verify. SecPortal runs that loop on one engagement record so the analyst, the engineering owner, the security operations leader, and the audit reviewer all read from the same source rather than from four reconciled documents.
- 1A new finding lands on the engagement queue, either from a scheduled external, authenticated, or code scan run, from a bulk import of Nessus, Burp Suite, or custom CSV output, or from a manual entry against an internal review. The analyst sees CVSS 3.1 vector, severity, scanner source, asset context, and the timestamp on the record without flipping consoles.
- 2The analyst validates the detection. Reproduce the request and response, confirm the response shape against the scanner claim, and record the validation evidence on the finding. False positives stay on the record with the reproduction attempt and the reason rather than disappearing, so the next scan run does not re-flag the same finding without context.
- 3Calibrate severity for the environment using the CVSS 3.1 environmental and temporal vectors on the engagement record. The original scanner-supplied score is preserved alongside the calibrated score, so the analyst can defend the recalibration in front of the security committee, the engineering owner, or the audit reviewer without reconstructing the rationale from chat history.
- 4Deduplicate against the existing backlog using hostname, URL, parameter, method, CWE, and CVE as primary signals. When two scanners surface the same underlying issue, merge into the canonical entry with both source links preserved. The deduplicated count is the count the analyst defends in front of the engineering owner and the leadership view.
- 5Assign the finding to the named engineering owner, set the severity-driven SLA window, attach the OWASP and framework mapping where it applies, and move the state from open to in_progress when investigation begins. The activity log records the assignment with actor and timestamp, so the hand-off to the engineering side is one record rather than an email thread.
- 6On retest, run the targeted scan against the original asset, validate the fix, and move the finding state from resolved to verified. If the regression appears on the next scheduled run, the diff endpoint surfaces the reopen, and the analyst moves the state to reopened on the same record with the regression rationale. The close decision survives scanner version changes, tester rotation, and tool migrations because the trail is one record across the lifecycle.
Where the analyst view connects to the rest of the workspace
Most analyst teams adopt SecPortal in three phases: bring scanner output and pentest findings onto one engagement record so the queue is one queue, layer in the CVSS calibration discipline and the deduplication signals so the count the analyst defends is the count the leadership view reads, then operationalise the retest verification and the exception governance so the close decision survives the audit cycle. The relevant feature, workflow, and research pages explain each phase in detail.
- The findings repository, the CVSS calibration surface, and the open or in_progress or resolved or verified or reopened state workflow live on the findings management feature page, the append-only audit record on the activity log feature page, and the engagement-scoped access controls on the team management feature page.
- The scheduled external, authenticated, and code scans the analyst queue pulls from sit on the continuous monitoring feature page, the authenticated DAST detail on the authenticated scanning feature page, and the code scan detail on the code scanning feature page.
- The triage workflow itself sits on the scanner result triage use case, the bulk import handling on the bulk finding import use case, and the retest validation discipline on the retesting use case.
- The exception register with the structured decision chain sits on the vulnerability acceptance and exception management use case, the SLA window enforcement on the vulnerability SLA management use case, and the engineering hand-off discipline on the scanner to ticket hand-off governance use case.
- The output deduplication signals the analyst leans on are covered on the scanner output deduplication guide, the scheduling and baseline cadence on the scan scheduling and baseline cadence guide, and the false positive triage workflow on the scanner false positives guide.
- The deeper analysis of why the analyst queue grows faster than capacity sits on the ingest vs remediation capacity research, the per-finding lifecycle frame on the mean time to detect vs remediate research, and the durability picture on the vulnerability reopen rate research.
For analyst teams evaluating against bundled enterprise platforms
Analyst teams evaluating consolidation tend to compare SecPortal against bundled enterprise vulnerability platforms, against issue trackers used as a finding queue, against open source findings hubs, and against scanner-vendor consoles. The detailed side-by-side comparisons cover the operational footprint and the analyst-side cost on each model.
- The SecPortal vs DefectDojo comparison covers the analyst-side move from a self-hosted findings hub to a managed delivery platform with authenticated scanning, encrypted credential storage, AI reporting, and a branded portal view.
- The SecPortal vs Jira comparison covers the workspace model versus an issue tracker with a vulnerability template, where severity, evidence, retests, and OWASP mapping live on the engagement record rather than on a ticket comment trail the analyst has to maintain.
- The SecPortal vs Nessus comparison covers the analyst-side trade-off between a scanner console with a separate triage spreadsheet and a workspace where scanner output, calibration, deduplication, and retest verification share one record.
- The SecPortal vs Rapid7 comparison covers the trade-off between a bundled vulnerability platform and a workspace where the scanners themselves run alongside the triage queue and the engagement record.
- The SecPortal vs Tenable.io comparison covers the trade-off between a vulnerability management suite and a workspace where findings, scans, retests, and the leadership view all read from one engagement record.
SecPortal is built for SOC and security operations analysts that want one platform for the full land-validate-calibrate-deduplicate-assign-verify loop: live findings with the open or in_progress or resolved or verified or reopened state workflow, CVSS 3.1 calibration on the engagement record, scanner imports for Nessus and Burp Suite and custom CSV, scheduled scans with diff-aware regression detection, retest validation, exception capture with the structured decision chain, role-based access, multi-factor authentication, and an append-only activity log. Engineering owners get a clean hand-off, the security operations leader gets a defensible queue posture between assessments, and the analyst stops being the human reconciliation layer between the scanner and the spreadsheet.
If your function sits closer to running the recurring SecOps cadence at the leadership level rather than triaging the operator queue, the sister page SecPortal for security operations leaders covers findings consolidation, scheduled scanning, severity-driven SLA tracking, exception governance, retest evidence, AI-assisted reporting, and the activity log on a single workspace from the SecOps leadership side.
If your function sits closer to running the vulnerability backlog at the programme level rather than the per-finding triage queue, the SecPortal for vulnerability management teams page covers SLA enforcement, exception management, the prioritisation function, and the cross-source consolidation discipline a vulnerability management programme depends on.
If your function sits closer to incident response and detection-response work rather than per-finding scanner triage, the incident response use case covers detection-to-containment-to-eradication-to-recovery on the engagement record, and the PSIRT product security incident response use case covers the vendor-side product-vulnerability response workflow that runs from any inbound channel through coordinated disclosure.
If the analyst function reports up to a security leader who needs the leadership view on the same record the analysts run on, the SecPortal for CISOs and security leaders page covers the program-level reporting workflow that sits on top of the analyst queue without rebuilding a deck every quarter.
The problems you face
And how SecPortal solves each one.
Findings live across the vulnerability scanner console, the SAST or SCA dashboard, the third-party pentest report PDF, the spreadsheet for the queue, and the ticketing tool for the engineering hand-off, and the analyst rebuilds the picture from scratch every shift
One findings database with CVSS 3.1 vector, severity, evidence, owner, and status across every source. Nessus and Burp Suite imports, custom CSV mapping for vendor exports, code scan results from GitHub, GitLab, or Bitbucket OAuth, authenticated DAST output, external scanning across 16 modules on the verified perimeter, and manually logged third-party pentest findings consolidate on the same engagement record. The analyst works one queue, not five.
Scanner-supplied severity does not reflect the environment, and the analyst has no surface to recalibrate without losing the original score the auditor expects to see
Every finding stores the parsed CVSS 3.1 vector and the calculated base score. Analysts recalibrate the environmental and temporal vectors on the engagement record, and the original scanner-supplied score is preserved alongside the calibrated score. The recalibration is a record event, defensible in front of the security committee, the engineering owner, and the audit reviewer.
The status of a finding lives in three places: the scanner console (still flagging), the spreadsheet (marked closed), and the ticket comment thread (in progress), so the analyst hand-off across shifts and across teams loses the truth
Findings carry the open, in_progress, resolved, verified, and reopened states from the moment they land, and the analyst moves the state explicitly on the engagement record. Every state change is captured in the activity log with the actor, the timestamp, and the action. The hand-off across shifts and across teams reads from one record rather than three reconciled documents.
Two scanners flag the same parameter on the same asset and land as two findings, so the engineering owner sees inflated counts, the analyst defends a duplicate-heavy queue, and the leadership view reads from a count that does not match the underlying picture
Hostname, URL, parameter, method, CWE, and CVE are the deduplication signals the analyst leans on. When two scanners surface the same underlying issue, merge into the canonical entry with both source links preserved so the report can show coverage from multiple scanners without inflating the count. The deduplicated count is the count the analyst defends in front of the engineering owner and the leadership view.
Retest verification lives in a screenshot folder and an email thread, and the close decision does not survive scanner version changes, tester rotation, or a tool migration
Retest runs target the original asset, validate the fix, and move the finding state from resolved to verified on the engagement record. The activity log records who verified what against which retest run with timestamp and rationale. The close decision is one record across the lifecycle, not a hand-built reconciliation.
Exceptions, compensating controls, and risk acceptances are stored in shared spreadsheets and email threads, so when the audit committee asks for the rationale the trail does not survive contact with reality
Risk acceptances and compensating controls are captured as structured exceptions on the same engagement record as the finding they cover. Linked finding, severity, compensating controls, residual likelihood, residual impact, business rationale, expiry, and review cadence sit on one record so the analyst hand-off to the security committee carries the rationale rather than a narrative document.
The analyst gets paged on every scheduled scan run because the diff between this run and the previous one is calculated by hand and every unchanged finding looks like a new finding to the queue
Continuous monitoring runs daily, weekly, biweekly, or monthly schedules for external, authenticated, and code scans on the same engagement record. The scan diff endpoint surfaces new, fixed, unchanged, and module-only deltas between runs without a manual export, so the analyst triages deltas rather than re-reading every finding on every run.
The audit trail across findings, scan runs, retests, exceptions, and team changes is rebuilt from chat history each cycle, and shift change, tester rotation, scanner version changes, and tool migrations break the narrative
The activity log records every finding update, scan run, credential lifecycle event, retest run, exception, document upload, comment, and team change with the actor, the entity, the timestamp, and the action. Plan retention covers 30, 90, or 365 days, and CSV export keeps the trail reproducible at audit time without a multi-team excavation.
Key features for you
Vulnerability management software that tracks every finding
Monitor continuously catch regressions early
Test web apps behind the login
Find vulnerabilities before they ship
Every action recorded across the workspace
Collaborate across your entire team
Multi-factor authentication on every workspace
AI-powered reports in seconds, not days
Run the analyst triage queue on one engagement record
Findings consolidation, CVSS 3.1 calibration, the open or in_progress or resolved or verified or reopened status workflow, scanner imports, scheduled scans with diff-aware regression detection, retest validation, exception capture, and the activity log on a single workspace. Free plan available.
No credit card required. Free plan available forever.