Plexicus Logo

Get Help When You Need It

Plexicus provides comprehensive support to help you get the most out of our platform.

From documentation to dedicated assistance

We're here to help you succeed

Support Plans for Every Team

Community Support
Available to all users
  • Access to community forums
  • Knowledge base articles
  • Documentation
  • Best practices guides
Email Support
Available on Professional and Enterprise plans
  • Response within 24 hours
  • Technical assistance
  • Feature requests
  • Bug reports
Premium Support
Available on Enterprise plan
  • Priority response
  • Dedicated support engineer
  • Phone support
  • Custom training sessions
Dedicated Support
Available on Custom plan
  • 24/7 support
  • Dedicated account manager
  • Custom SLA
  • On-site training

Comprehensive Documentation

Quick Start
Getting Started Guide
Quick setup and configuration to get you up and running with Plexicus CNAPP in minutes.
REST API
v2.0
API Reference
Complete API documentation with examples, endpoints, authentication, and integration guides for developers.
Tutorials
User Guide
Step-by-step tutorials and best practices for using all Plexicus features effectively.
Security
Best Practices
Security recommendations and optimization tips from our expert team.
Support
Troubleshooting
Common issues, error codes, and solutions to help you resolve problems quickly.

Find Answers Fast

Platform Overview

Get familiar with Plexicus CNAPP dashboard, navigation, and core concepts.

Quick Start Guide

Step-by-step setup process to get your first scan running in under 10 minutes.

Basic Configuration

Essential settings and configurations for optimal security scanning.

First Scan Setup

Configure your first vulnerability scan and understand the results.

User Management

Add team members, set permissions, and manage user access levels.

Initial Deployment

Deploy Plexicus agents and connect your cloud environments.

Application Security

Comprehensive application vulnerability scanning and SAST/DAST analysis.

Cloud Security

Multi-cloud security posture management and compliance monitoring.

Container Security

Container image scanning, runtime protection, and Kubernetes security.

Runtime Protection

Real-time threat detection and automated incident response capabilities.

Compliance Monitoring

Automated compliance checks for SOC2, PCI-DSS, HIPAA, and more.

Risk Assessment

Advanced risk scoring and prioritization of security vulnerabilities.

Source Code Management

GitHub, GitLab, Bitbucket integration for automated code scanning.

CI/CD Pipelines

Jenkins, GitHub Actions, Azure DevOps, and GitLab CI integration.

Cloud Providers

AWS, Azure, GCP native integration for comprehensive cloud security.

Container Registries

Docker Hub, ECR, ACR, GCR integration for container image scanning.

SIEM Integration

Splunk, Elastic, QRadar integration for centralized security monitoring.

Notification Systems

Slack, Teams, PagerDuty, and email notifications for security alerts.

Vulnerability Management

Identify, prioritize, and track security vulnerabilities across your infrastructure.

Compliance

Automated compliance reporting and continuous monitoring for industry standards.

Risk Assessment

Advanced risk scoring algorithms and business impact analysis.

Remediation

Automated remediation workflows and guided fix recommendations.

Threat Intelligence

Real-time threat intelligence feeds and IOC monitoring.

Incident Response

Automated incident response playbooks and forensic analysis tools.

Join the Plexicus Community

GitHub Discussions

Join our community discussions

Stack Overflow

Ask technical questions

Slack Channel

Join our community chat

Blog

Read our latest updates

Level Up Your Skills

Master cybersecurity with our interactive learning paths and unlock your potential

Self-Paced Learning

Self-Paced50+ hours

Video Tutorials

Comprehensive video courses covering all security topics

Completion75%
Features:
HD Quality
Subtitles
Mobile Access
Offline Download
Self-Paced30+ guides

Interactive Guides

Step-by-step interactive tutorials with hands-on practice

Completion60%
Features:
Code Examples
Live Demos
Progress Tracking
Quizzes
Self-Paced25+ articles

Best Practices

Industry best practices and proven methodologies

Completion85%
Features:
Expert Tips
Case Studies
Checklists
Templates
Self-Paced40+ lessons

Security Fundamentals

Core security concepts and foundational knowledge

Completion90%
Features:
OWASP Top 10
Risk Assessment
Compliance
Frameworks

Live Training

Live TrainingWeekly

Webinars

Live expert sessions on trending security topics

Participation45%
Includes:
Q&A Sessions
Expert Speakers
Recording Access
Certificates
Live TrainingMonthly

Workshops

Hands-on workshops with practical exercises

Participation30%
Includes:
Lab Environment
Group Projects
Peer Learning
Mentorship
Live TrainingOn-demand

Custom Training Sessions

Tailored training programs for your organization

Participation20%
Includes:
Custom Curriculum
Team Focus
Flexible Schedule
Dedicated Trainer
Live Training3-6 months

Certification Programs

Industry-recognized certification preparation

Participation15%
Includes:
Exam Prep
Practice Tests
Study Groups
Career Support

Need help? Our support team is here for you

Next Steps

Ready to secure your applications? Choose your path forward.

Join 500+ companies already securing their applications with Plexicus

SOC 2 Compliant
ISO 27001 Certified
Enterprise Ready