PLATFORM FEATURES

Everything You Need for Modern Pentesting

From project management to professional reporting, Canopy provides all the tools your security team needs to deliver exceptional penetration testing services.

CORE CAPABILITIES

Built for Security Professionals

Canopy combines powerful project management, finding documentation, and report generation in one seamless platform. See how much your team could save.

Project Dashboards

Get an overview of all your pentest projects, including status, findings, team assignments, and progress tracking with visual timelines and metrics.

Finding Templates & Tracking

Standardised templates for common vulnerabilities with customisable fields, severity scoring, and comprehensive finding lifecycle tracking.

Evidence Management

Capture and organise screenshots, logs, and other evidence with easy recording, tagging, and integration into reports.

Team Collaboration

Work together with role-based permissions, real-time notifications, commenting features, change history, edit clobber detection, and more.

Fully Customised Reports

Create branded, professional reports in multiple formats with native Word charts, custom rating systems, and one-click generation. Calculate time savings.

RESTful API & Integrations

Import findings directly from popular tools like Burp Suite, Nessus, and more through our comprehensive API and plugin system.

DETAILED CAPABILITIES

Comprehensive Feature Set

Every tool you need to manage the complete penetration testing lifecycle.

Project Management

Client Dashboard

Standard

Client-facing portal for viewing project status, findings, and deliverables with real-time updates.

Project Dashboard

Standard

Internal project overview with status tracking, team assignments, and progress visualization.

Auto-notifications

Standard

Automated alerts for project milestones, deadline reminders, and team updates.

Request Management

Premium

Manage opportunities, statements of work, and client requests throughout the sales process.

Team Scheduler

Premium

Assessment schedule overview for managers, with resource allocation and conflict detection.

Productivity

Methodologies

Standard

Preloaded templates covering OWASP's ASVS, MASVS, WSTG, and more. Build your own custom methodology frameworks.

Finding Templates

Standard

Pre-built templates for common vulnerabilities. Easily add your own or import existing writeups from in-house or other tools.

Tool Importing

Standard

Direct import of findings from popular tools like Burp Suite, Nessus, and more. Overwrite vendor writeups with your own custom versions.

Analytics

Vulnerability Analytics

Premium

Analysis of vulnerability trends, patterns, and risk metrics across projects.

Custom Analytics

Premium

Build custom reports, and visualizations tailored to your specific needs.

Configurability

Custom Report Templates

Standard

Create branded, professional reports with custom layouts, formats, and styling. Easily convert your existing templates.

Custom Fields

Standard

Configure custom data fields and validation rules for your specific workflow needs.

FieldSets & Configurations

Standard

Group custom fields into logical sets and configure validation rules.

Notification Templates

Standard

Customise email templates and notification formats for different events and recipients.

Integration & Automation

RESTful API

Standard

ComprehensiveRESTful API with several example implementations and supporting documentation. Support for user and token based API use.

Plugin System

Standard

Extend functionality with custom plugins, integrations, and workflow automations.

Tool Parser Framework

Standard

Framework for parsing and importing results from various security tools. Build your own parsers to override default behaviour or support custom tools.

Security

Role-based Access Control

Standard

Granular permissions and role management for secure team collaboration.

Local Authentication

Standard

Secure local authentication with password policies.

SSO Authentication

Standard

Single Sign-On integration with SAML, OAuth, and enterprise identity providers. Say no to the SSO tax!

Deployment

On-Premise

Standard

Deploy on your own infrastructure for maximum control and security. Direct hardware, VMS, your own AWS/Azure environment, and containers are supported. Review our security standards.

Managed Isolated Instances

Standard

Fully managed instances with dedicated resources and network isolation.

Data Import/Export

Standard

Comprehensive configuration and data migration tools for seamless deployment/migrations.

Ready to transform your penetration testing workflow?

Join 200+ security teams already using CheckSec to streamline their entire penetration testing process.