Quickstart process
Ready to leverage the power of Helm to streamline your vulnerability management? Let's get you up and running!
Sign in
When you create your account, you’ll automatically be enrolled in multi-factor authentication (MFA), also known as two-factor authentication (2FA). This means that you’ll need to provide a code from an authentication app. If you don’t already have an authentication application installed on your smartphone, you’ll need to choose one (e.g., Google Authenticator).
You’ll receive a welcome email, inviting you to sign in to your Helm account.
After signing in, you’ll be prompted to enable your MFA for security. At that time, you’ll be provided with recovery codes in case your phone is lost or stolen. Make sure to copy and paste these recovery codes into a safe place.
When you first sign in and until you’ve uploaded your first SBOM, you’ll see a get started prompt. Choose the path that best suits you. If you accidentally closed that get started modal, don’t worry. You can always access it from Help item in the sidebar.
Step 1: Upload your Software Bill of Materials (SBOM) file:
Got an SBOM ready? Upload your CycloneDX or SPDX SBOM file to Helm.
Don’t have an SBOM yet? We've got you covered:
Contact us to use our SBOM generation tool.
Generate a CycloneDX SBOM or SPDX SBOM using our open-source tool suggestions.
Manually create your SBOM.
If you’re still unsure how to get started, contact us so we can assist you.
Step 2: Ensure all of your components are matched to known software in the NVD
Once you’ve uploaded your SBOM, Helm will try to match your components to the NVD (National Vulnerability Database). Only components that are matched to the NVD will show vulnerabilities.
Click each status badge to start the resolution process.
For components that have a Matched status with a package manager badge, but no NVD badge, this could indicate that there are no published vulnerabilities for those components. However, components can also be named differently in the NVD, so you should check the NVD to see if there actually is a match.
Try to resolve any Not found statuses, as this indicates Helm was unable to find a match in the NVD.
When you determine the appropriate matches, create an alias for each component so that these will be auto-matched for all future SBOMs.
Step 3: Helm auto-enriches your data for enhanced vulnerability identification accuracy (Automatic)
There are many ways that Helm auto-enriches your data, including:
If we identify inaccurate CPEs or PURLs in your SBOM, Helm will automatically attempt to provide an enriched CPE or PURL that matches to the correct software. You can export this enriched SBOM or your original SBOM.
Helm will automatically update vulnerabilities with severity, exploitability, and source information.
Helm will automatically update components with source information.
For Windows vulnerabilities, Helm provides Windows KB patch recommendations.
You can also prompt Helm to auto-enrich information:
Create rules to auto-update support level and EOS/EOL across all products.
Reload any component to automatically add missing licenses for any components that do not already have associated licenses. Helm does not overwrite existing licenses.
Step 4: Prioritize your most exploitable vulnerabilities
Enable email notifications for new vulnerabilities. You can receive daily, weekly, and/or monthly updates.
Bulk rescore all vulnerabilities across your selected product version. If desired, you can also rescore individual vulnerabilities.
Enable the Date updated column to keep track of updated vulnerabilities. You can filter on date range to view these updates.
Step 5: Patch Windows vulnerabilities with WinKB recommendations
If you already know which Windows KBs to add to your digital product, you can bulk patch by adding these KBs to the product version.
To patch individual vulnerabilities, filter KB patch to Patch available. You can view these across all products or select a product version.
Step 6: Remediate vulnerabilities
You can remediate with CycloneDX and/or CycloneDX VEX statuses.
Bulk remediate vulnerabilities within a product, across products, or target a particular component's vulnerabilities with the click of a button, enabling you to speed triage and ensure remediation consistency of particular vulnerabilities across your product portfolio.
If desired, individually remediate vulnerabilities.
Step 7: Monitor your progress on your dashboard (Optional)
Quickly identify threats and track your progress on your Dashboard, accessible via the Home icon on the sidebar.
Quickly prioritize and remediate threats to your most impacted products and components
Zero in on critical vulnerabilities
Track progress on vulnerabilities you still need to remediate
Step 8: Export your FDA SBOM or other FDA-ready reports
Export your expert-crafted FDA SBOM to ensure a smooth FDA submission.
Export VEX and VDR reports.
Export enriched SBOM or original SBOM.
Integrate to your CI/CD process (Optional)
API: Use our Helm API to automate many tasks, such as creating product versions, uploading SBOMs, returning all vulnerabilities and generating reports, as well as returning only unmatched components or only CISA KEV vulnerabilities.
GitHub: Integrate our GitHub action your CI/CD process or use it independently to automate product version creation and SBOM uploads.
Check whether you are impacted by a particular vulnerability (Optional)
Check whether a particular vulnerability impacts your products, and if so, which products you'll need to focus on. Just enter the vulnerability ID in the global search bar at the top of any page.
Check whether your products contain a particular component (Optional)
Check whether your products contain a particular component, and if so, which ones. Just enter the component name in the global search bar at the top of any page.
Last updated