How can we help?
Everything you need to know right here at your fingertips. Ask questions, browse around for answers, or submit your feature requests.
Overview
Yes! You can connect your ThreatKey account to any data source that has an
integration. We have a growing list of integrations, but if you don't see the
one you need, let us know and we'll add it to our roadmap. Our goal is to make
ThreatKey work with all of your data sources. You can learn more about what sources work with ThreatKey today by going to the Environment
tab and clicking Sources
.
Absolutely! You can invite anyone to collaborate on your ThreatKey
organization. You should only invite people you trust, because they will have
access to all of your findings and data. You can invite people to collaborate
on your organization by going to the Settings
tab and clicking Invite Collaborators
.
We sure will! We have a team of experts that can help you connect your data sources to ThreatKey. Just reach out to us via the chat widget in the bottom right corner of your screen and we'll get you set up.
To become a partner, please reach out to us via the chat widget in the bottom right corner of your screen and we'll get you set up. We're always looking for new partners to help us grow and expand our reach to new customers. We look forward to hearing from you!
Support
You can reach us via the chat widget in the bottom right corner of your screen. We're available 24/7 to answer any questions you may have. We look forward to hearing from you!
Connecting your applications to ThreatKey allows you to find misconfigurations in your applications faster and more efficiently. It also allows you to find misconfigurations in your applications that you may not have found otherwise. We're always adding new integrations, so if you don't see the one you need, let us know and we'll add it to our roadmap. Our goal is to make ThreatKey work with all of your applications.
You can learn more about what sources work with ThreatKey today by going to
the Environment
tab and clicking Sources
. You'll see a list of all of the
sources that work with ThreatKey today. If you don't see the one you need, let
us know and we'll add it to our roadmap. Our goal is to make ThreatKey work
with all of your sources.
Security, Privacy and Compliance
Yes, role-based access control is supported in ThreatKey. You can create roles for your organization and assign users to those roles. Soon, you will be able to also create roles for your sources and assign users to those roles. This allows you to control who has access to what data in ThreatKey.
No, we do not sell or share the content of your findings with third parties. We only use the content of your findings to help you find more vulnerabilities in your applications and infrastructure. We do not sell or share your findings with anyone.
ThreatKey has multiple levels of internal access controls to ensure that only the right people have access to your findings. We also have a team of security experts that review all of our internal access controls on a regular basis to ensure that they are working as intended. Access is only granted via a secure login process that requires two-factor authentication and an explicit access grant from the organization owner within ThreatKey.
ThreatKey does not have access to data within your sources. We only have access to the metadata about your source, such as the name and type of source and configuration details. We do not have access to the content of your sources, such as the data in your databases or the code in your repositories, unless you explicitly grant us access to that data.
Yes, ThreatKey is GDPR and CCPA compliant. We take your privacy very seriously and we will never sell or share your data with anyone. We only use your data to help you find more vulnerabilities in your applications and infrastructure. We also have a team of security experts that review all of our internal access controls on a regular basis to ensure that they are working as intended.
Yes, ThreatKey is SOC 2 Type 2 certified. We take your privacy very seriously and we will never sell or share your data with anyone. We only use your data to help you find more vulnerabilities in your applications and infrastructure. We also have a team of security experts that review all of our internal access controls on a regular basis to ensure that they are working as intended. If you have any questions about our SOC 2 Type 2 certification, please reach out to us via the chat widget in the bottom right corner of your screen.
Yes, ThreatKey has undergone penetration testing. At ThreatKey we have a comprehensive security program that includes regular penetration testing by a third party. We also have a team of security experts that review all of our internal access controls on a regular basis to ensure that they are working as intended. If you have any questions about our penetration testing, please reach out to us via the chat widget in the bottom right corner of your screen. We're always happy to answer any questions you may have.
Troubleshooting
If you are having trouble logging in, please try the following steps:
- Make sure you are using the correct email address.
- Make sure you are using the correct URL for your organization.
- Make sure you are using the correct login method (email/password or SSO).
- Clear your browser cache and cookies.
- Try logging in from a different browser or device.
- Try logging in from a different network (e.g., home vs. work).
You may not be able to connect a source for a variety of reasons. Here are some common reasons why you may not be able to connect a source:
- You may not have the correct permissions to connect a source.
- Your session may have expired.
- The source may be unavailable on your current plan (e.g., you may need to upgrade to a higher plan).
- The source may be unavailable in your current region (e.g., you may need to switch to a different region).
- The source may be unavailable due to a temporary outage (e.g., new enrollments of the source may be down for maintenance).
- The source may be unavailable as you have reached your limit of sources you can connect on your current plan (e.g., you may need to delete an existing source before you can connect a new one).
ThreatKey does not allow you to invite personal email addresses to your organization. This is to prevent people from accidentally inviting people they don't know to their organization. If you would like to invite someone to your organization, please use their work email address.
You can invite anyone to collaborate on your ThreatKey organization. You
should only invite people you trust, because they will have access to all of
your findings and data. You can invite people to collaborate on your
organization by going to the Settings
tab and clicking Invite Collaborators
.