Get Help When You Need It
Plexicus provides comprehensive support to help you get the most out of our platform.
From documentation to dedicated assistance
We're here to help you succeed
Support Plans for Every Team
- Access to community forums
- Knowledge base articles
- Documentation
- Best practices guides
- Response within 24 hours
- Technical assistance
- Feature requests
- Bug reports
- Priority response
- Dedicated support engineer
- Phone support
- Custom training sessions
- 24/7 support
- Dedicated account manager
- Custom SLA
- On-site training
Comprehensive Documentation
Find Answers Fast
Platform Overview
Get familiar with Plexicus CNAPP dashboard, navigation, and core concepts.
Quick Start Guide
Step-by-step setup process to get your first scan running in under 10 minutes.
Basic Configuration
Essential settings and configurations for optimal security scanning.
First Scan Setup
Configure your first vulnerability scan and understand the results.
User Management
Add team members, set permissions, and manage user access levels.
Initial Deployment
Deploy Plexicus agents and connect your cloud environments.
Application Security
Comprehensive application vulnerability scanning and SAST/DAST analysis.
Cloud Security
Multi-cloud security posture management and compliance monitoring.
Container Security
Container image scanning, runtime protection, and Kubernetes security.
Runtime Protection
Real-time threat detection and automated incident response capabilities.
Compliance Monitoring
Automated compliance checks for SOC2, PCI-DSS, HIPAA, and more.
Risk Assessment
Advanced risk scoring and prioritization of security vulnerabilities.
Source Code Management
GitHub, GitLab, Bitbucket integration for automated code scanning.
CI/CD Pipelines
Jenkins, GitHub Actions, Azure DevOps, and GitLab CI integration.
Cloud Providers
AWS, Azure, GCP native integration for comprehensive cloud security.
Container Registries
Docker Hub, ECR, ACR, GCR integration for container image scanning.
SIEM Integration
Splunk, Elastic, QRadar integration for centralized security monitoring.
Notification Systems
Slack, Teams, PagerDuty, and email notifications for security alerts.
Vulnerability Management
Identify, prioritize, and track security vulnerabilities across your infrastructure.
Compliance
Automated compliance reporting and continuous monitoring for industry standards.
Risk Assessment
Advanced risk scoring algorithms and business impact analysis.
Remediation
Automated remediation workflows and guided fix recommendations.
Threat Intelligence
Real-time threat intelligence feeds and IOC monitoring.
Incident Response
Automated incident response playbooks and forensic analysis tools.
Join the Plexicus Community
GitHub Discussions
Join our community discussions
Stack Overflow
Ask technical questions
Slack Channel
Join our community chat
Blog
Read our latest updates
Level Up Your Skills
Master cybersecurity with our interactive learning paths and unlock your potential
Self-Paced Learning
Video Tutorials
Comprehensive video courses covering all security topics
Interactive Guides
Step-by-step interactive tutorials with hands-on practice
Best Practices
Industry best practices and proven methodologies
Security Fundamentals
Core security concepts and foundational knowledge
Live Training
Webinars
Live expert sessions on trending security topics
Workshops
Hands-on workshops with practical exercises
Custom Training Sessions
Tailored training programs for your organization
Certification Programs
Industry-recognized certification preparation
Need help? Our support team is here for you
Next Steps
Ready to secure your applications? Choose your path forward.
Start Free Trial
Try Plexicus risk-free for 14 days
View Pricing
Transparent pricing for teams of all sizes
Join Community
Join our Global Community
Read Documentation
Read our Comprehensice Documentation
Join 500+ companies already securing their applications with Plexicus