• /
  • EnglishEspaรฑolๆ—ฅๆœฌ่ชžํ•œ๊ตญ์–ดPortuguรชs
  • Log inStart now

Get started with Security RX

Modern software is composed of thousands of components, and legacy security offerings donโ€™t provide the necessary insight to monitor and remediate vulnerabilities these components introduce efficiently. With New Relic Security Remediation Explorer (Security RX), engineers from DevSecOps, SREs, and InfoSec teams can collaborate faster, identifying, triaging, and remediating vulnerabilities across your estate.

An image showing the summary Vulnerability Management overview page.

one.newrelic.com > All capabilities > Security RX

With Security RX, you get:

  • A birds-eye view of all vulnerabilities, including the ones that are detected by the New Relic platform and our integration partners such as FOSSA, AWS Security Hub, Trivy, Snyk, Dependabot, and more.

  • Continuous run-time visibility of vulnerabilities in your applications and infrastructure

  • Near real-time deployment validation of security patches

  • Automated prioritization that helps you triage and remediate the vulnerabilities posing the highest risk

With Security RX, overcome security blindspots across your entire stack from application to infrastructure without sacrificing velocity. Spend less time triaging false positives and low value findings, so your team can fix less and deliver more.

Visit one.newrelic.com to get started today.

View security insights for developers, security teams, and architects

As an engineer, you want to:

  • Maintain a healthy application
  • Identify the most urgent vulnerabilities in your software portfolio
  • Understand the risk each vulnerability poses
  • Surface "security" tasks from the security team in your daily workflow so it's easy to deliver more secure software with less toil

To dive deeper into these use cases, see Manage vulnerabilities as an engineer.

As a member of a security team, you want to:

  • Calculate the vulnerability surface area of your software systems
  • Understand how runtime architecture of each application affects business risk, vulnerability, and severity

To dive deeper into these use cases, see Manage vulnerabilities as a security team.

Copyright ยฉ 2025 New Relic Inc.

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.