Skip to content
Phoenix Security

Phoenix Security

Category: ASPM
License: Commercial
Suphi Cankurt
Suphi Cankurt
+7 Years in AppSec
Updated April 29, 2026
2 min read
Key Takeaways
  • Threat-centric prioritization based on CISA KEV, exploitability data, EPSS, and zero-day tracking instead of CVSS severity alone.
  • Auto-assigns findings to specific repository or asset owners, eliminating shared queues and the 'whose ticket is this' problem.
  • AI agents generate fix pull requests for review β€” Phoenix positions the platform as 'Security from generation to remediation' rather than just risk reporting.
  • Founded by Francesco Cipollone (CEO) and Alfonso Eusebio (CTO); advisory board includes Jim Manico (OWASP Top 10 creator).

Phoenix Security is a threat-centric ASPM platform that connects vulnerability findings across the SDLC with ownership attribution, exploitability validation, and AI-generated remediation pull requests.

What is Phoenix Security?

Most ASPM tools stop at producing a prioritized list. Phoenix Security explicitly positions itself one step further β€” closing the loop between “this is risky” and “here is the pull request that fixes it.”

The platform’s tagline captures the angle: “Security from generation to remediation.” The implicit critique of the rest of the category is sharp β€” Phoenix’s marketing line “Prioritization without attribution & remediation is just a nicer spreadsheet” tells you exactly which problem the team is trying to solve.

Three pillars

Threat-centric prioritization
Combines CISA KEV (known-exploited vulnerabilities), EPSS scoring, reachability analysis, and runtime exposure to rank issues by what an attacker would actually use, not by raw CVSS severity.
Ownership attribution
Automatically assigns each finding to the specific repository or asset owner. Eliminates the shared backlog where “every ticket is everyone’s, so it’s no one’s.”
Agentic remediation
AI agents generate remediation pull requests directly against the affected repos. A human reviews and merges β€” Phoenix does not auto-merge β€” but the burden of writing the fix shifts to the platform.

Vulnerability intelligence sources

Phoenix layers in vulnerability intelligence beyond scanner outputs:

SourceWhat it adds
CISA KEVVulnerabilities with confirmed in-the-wild exploitation
EPSSExploit Prediction Scoring System β€” probability of exploitation in the next 30 days
OWASP Top 10Web application risk taxonomy alignment
CWEWeakness categorisation for grouping similar issues
Zero-day trackingActive monitoring of disclosed but unpatched issues
Reachability dataWhether vulnerable code is actually called from production entry points

Leadership and advisory

RolePersonBackground
CEOFrancesco CipolloneLong-time AppSec entrepreneur
CTOAlfonso EusebioInternational engineering leadership across TelefΓ³nica, IBM, and Vodafone
AdvisorJim ManicoOriginal author of the OWASP Top 10
Advisors (board)Engineers from Qualys, Oracle, Skyscanner, AWSβ€”

The Manico advisory presence is notable for AppSec credibility β€” there are not many ASPM vendors with a genuine OWASP-Top-10 author on the board.

When to use Phoenix Security

Phoenix is a strong fit for security teams that already have multiple scanners and a backlog problem caused by either weak prioritization or unclear ownership. The two recurring issues Phoenix targets β€” “everything is critical so nothing gets fixed” and “no one knows whose ticket this is” β€” are exactly the issues that ASPM exists to solve, and Phoenix is opinionated about both.

If you are evaluating Phoenix against the rest of the field, the closest direct competitors on prioritization are Apiiro and OX Security; on ownership and developer routing, Cycode and Jit overlap; on agentic remediation specifically, ArmorCode is the larger competitor.

Pricing requires a sales conversation. The platform does not publicly publish pricing tiers.

Frequently Asked Questions

What is Phoenix Security?
Phoenix Security is a threat-centric application security posture management (ASPM) platform. It correlates findings from SAST, SCA, container, IaC, and runtime scanners with exploitability data (CISA KEV, EPSS, zero-day tracking) and automatically assigns each finding to the repository or asset owner who can fix it.
How does Phoenix Security prioritize vulnerabilities?
Phoenix uses a threat-centric model rather than scanner severity. It combines CISA KEV (known-exploited vulnerabilities), Exploit Prediction Scoring System (EPSS), reachability analysis, business criticality, and runtime exposure data to surface only the issues that an attacker could realistically use against you.
What does 'agentic remediation' mean in Phoenix Security?
Phoenix’s AI agents generate remediation pull requests directly against the affected repositories. A human approves and merges. Phoenix’s official positioning is ‘Security from generation to remediation’ β€” the platform does not stop at a prioritized list, it ships proposed fixes.
Who founded Phoenix Security?
Phoenix Security was founded by Francesco Cipollone (CEO) and Alfonso Eusebio (CTO). Eusebio’s background includes engineering roles at TelefΓ³nica, IBM, and Vodafone. The advisory board includes Jim Manico, one of the original authors of the OWASP Top 10.
What integrations does Phoenix Security support?
Phoenix Security ingests findings from major scanner categories β€” SAST, SCA, container, IaC, secrets, and runtime β€” and correlates them with vulnerability intelligence from CISA KEV, OWASP Top 10, CWE, EPSS, and zero-day tracking feeds. The exact connector list expands as the product evolves; check phoenix.security for the current integration catalogue.