Myrror Security Logo
Getting Started

πŸ–₯️ Platform Overview

Now that you've successfully signed In, you're ready to explore the Myrror platform. This guide will introduce you to the key functionalities accessible through the Myrror Security Dashboard, categorized by the navigation bar tags: Dashboard, Issues, Discovery, and Integrations.

Integrations:

Myrror Security integrates seamlessly with various security tools and platforms, enabling a unified approach to security management. This section allows you to:

image3

  • Connect Third-Party Tools: Integrate Myrror Security with your existing security ecosystem, including Continuous Integration/Continuous Delivery (CI/CD) pipelines, Security Information and Event Management (SIEM) systems, and ticketing platforms.
  • Streamline Workflows: Automate tasks and data exchange between Myrror Security and your integrated tools, fostering a more efficient security workflow.
  • Enhanced Security Posture: Leverage the combined capabilities of Myrror Security and your existing tools to achieve a more comprehensive and robust security posture.

Discovery:

The "Discovery" section empowers you to actively manage and expand your security assessments. Here, you can:

image2

  • Manage Assets: Maintain an accurate inventory of your IT infrastructure, including applications, systems, and devices.
  • Scan Repositories: Integrate and scan code repositories (e.g., Git repositories) to identify vulnerabilities within your codebase.
  • Analyze Dependencies: Gain insights into the security posture of your third-party dependencies, a major source of potential vulnerabilities.

Dashboard:

Upon login, you'll be greeted by the Myrror Security Dashboard, your central hub for monitoring your security posture. It provides a comprehensive overview with actionable insights, including:

image5

  • Quick SDLC View: See total repositories, dependencies, and detected issues.
  • Issues Breakdown: Analyze issues by category, severity, and code language.
  • Remediation Status: Track current threat level, available fixes, and potential new vulnerabilities introduced during fixes.
  • Monitoring Status: Monitor repositories, and dependencies, and identify outdated dependencies.
  • Language Meter: Understand the programming language distribution in your codebase.

Issues:

The "Issues" page dives deeper into the security issues identified within your IT infrastructure. Myrror Security empowers you to:

image1

  • View All Issues: Gain a comprehensive list of all detected vulnerabilities across your systems.
  • Prioritize Remediation: Leverage severity levels (Critical, High, Medium, Low) to prioritize vulnerabilities requiring immediate attention. (We'll explore severity levels in detail on a separate page)
  • Focus on Recommended Issues: Narrow your focus to Myrror's recommended security issues, representing the most critical issues demanding prompt action.
  • Address Low-Risk Issues: Review and address low-risk security issues according to a designated schedule to maintain a strong overall security posture.

This overview equips you with a basic understanding of Myrror Security's core functionalities. We encourage you to explore each section of the platform in more detail and leverage the provided resources, including in-depth tutorials and the Myrror Security Help Center, to maximize the value you get from Myrror.

User Settings

To access the settings for the users, select the drop-down menu in the bottom left section and select the settings option. The settings tab is for the users according to their own preferences and would not affect other users in the organization.

image4

Here, users can invite multiple members to the organization’s Myrror page as well as create tokens for integrations with Myrror Security.

image6

Here, options like scan configurations can be created and saved. Myrror allows users to create their own scan configurations and assign a dedicated configuration per repository. Each scan can control which detection engines to enable or disable, which notification to receive, what portions of he repository to scan, and more…

image7

On this page