Skip to content

Frequently Asked Questions

Common questions about CyberOrigen.

Getting Started

What is CyberOrigen?

CyberOrigen is an AI-powered security and compliance platform that provides automated vulnerability scanning, GRC (Governance, Risk, and Compliance) management, and intelligent remediation guidance.

How do I sign up?

  1. Visit app.cyberorigen.com
  2. Click Sign Up
  3. Enter your email and create a password
  4. Set up MFA (required)
  5. Choose your subscription plan

Is there a free trial?

Contact [email protected] to discuss trial options for your organization.

What browsers are supported?

CyberOrigen works best with:

  • Chrome (recommended)
  • Firefox
  • Safari
  • Edge

Scanning

What can I scan?

You can scan:

  • Domains and subdomains
  • IP addresses
  • CIDR ranges
  • Web applications
  • Cloud accounts (AWS, Azure, GCP)

How long does a scan take?

Scan TypeTypical Duration
Quick Scan5-10 minutes
Full Scan30-60 minutes
Compliance Scan15-30 minutes

Duration varies based on target scope and complexity.

Do I need to authorize scans?

Yes. Before each scan, you must confirm you have authorization to test the target. This attestation is required for legal compliance.

What tools does CyberOrigen use?

CyberOrigen uses 19 security tools including:

  • Nmap, Subfinder, Httpx (discovery)
  • Nuclei, SQLMap, Semgrep (vulnerability detection)
  • ScoutSuite (cloud security)
  • Trivy (container scanning)

See Scanning for the full list.

Can I schedule recurring scans?

Yes. You can schedule scans to run:

  • Daily
  • Weekly
  • Monthly
  • Custom schedule

Go to ScansSchedules to configure.

Compliance

Which frameworks are supported?

CyberOrigen supports 7 compliance frameworks:

  • SOC 2 Type II
  • ISO 27001:2022
  • PCI-DSS v4.0
  • HIPAA
  • GDPR
  • NIST CSF
  • DORA

Can I use multiple frameworks?

Yes. You can enable multiple frameworks simultaneously. CyberOrigen automatically maps controls across frameworks, so implementing one control can satisfy requirements in multiple frameworks.

How is compliance score calculated?

Compliance score = (Implemented Controls / Total Applicable Controls) × 100

The score considers:

  • Control implementation status
  • Evidence availability
  • Scanner findings
  • Manual assessments

Does CyberOrigen replace auditors?

No. CyberOrigen helps you prepare for audits by:

  • Tracking control implementation
  • Collecting evidence
  • Identifying gaps
  • Generating reports

You still need qualified auditors for formal certifications.

AI Features

How many AI requests do I get?

PlanAI Requests/Month
Startup100
Professional500
Enterprise5,000

Can I purchase more AI requests?

Yes. Go to BillingBuy CreditsAI Credits to purchase additional requests.

What AI model is used?

CyberOrigen primarily uses Claude 3.5 Sonnet from Anthropic. Enterprise customers have access to Claude 3 Opus for deeper analysis.

Is my data used to train AI?

No. Your data is never used for AI model training. AI queries are encrypted and sensitive data is redacted before processing.

Billing

What payment methods are accepted?

  • Visa
  • Mastercard
  • American Express

Enterprise customers can also use:

  • Wire transfer
  • Purchase orders
  • ACH

Can I change my plan?

Yes. Go to BillingManage Subscription to upgrade or downgrade.

  • Upgrades: Take effect immediately
  • Downgrades: Take effect at end of billing period

What happens if I exceed my limits?

When you reach scan or AI request limits:

  1. Warning notification at 80%
  2. Alert at 100%
  3. Purchase credits to continue, or wait for monthly reset

Are there annual discounts?

Yes. Annual billing provides a discount compared to monthly billing. Contact sales for specific pricing.

Security

Is CyberOrigen secure?

Yes. CyberOrigen implements:

  • AES-256 encryption at rest
  • TLS 1.3 encryption in transit
  • MFA required for all accounts
  • SOC 2 Type II compliant infrastructure
  • Regular penetration testing

Where is my data stored?

Data is stored in AWS data centers in the US. Enterprise customers can request specific regions.

Can I delete my data?

Yes. Contact support to request data deletion. We retain data for 30 days after account cancellation.

What happens to quarantined files?

Files identified as threats are quarantined. You can:

  • Review the threat analysis
  • Delete confirmed threats
  • Release false positives

Quarantined files auto-delete based on your plan's retention period.

Integrations

Which integrations are available?

Professional and Enterprise plans include:

  • Jira (bi-directional sync)
  • Slack (notifications)
  • Microsoft Teams (notifications)
  • GitHub (CI/CD)
  • GitLab (CI/CD)
  • Jenkins (CI/CD)
  • Custom webhooks

Is there an API?

Yes. Full REST API available at https://backend.cyberorigen.com/api/v1. See API Reference for documentation.

Can I use SSO?

SSO/SAML is available on Enterprise plans. Supported providers:

  • Okta
  • Azure AD
  • Google Workspace
  • OneLogin
  • PingIdentity

Troubleshooting

My scan won't start

Check:

  1. Target is reachable
  2. Scan quota not exceeded
  3. Target format is correct
  4. You've authorized the scan

I'm not receiving notifications

  1. Check SettingsNotifications
  2. Verify email address
  3. Check spam folder
  4. Test with the Send Test button

My compliance score seems wrong

Compliance score includes both scanner findings and manual control status. Check:

  1. All controls have current status
  2. Evidence is linked
  3. Scanner findings are addressed

I can't log in

  1. Verify email address
  2. Check password (case-sensitive)
  3. Complete MFA verification
  4. Check for account lockout (5 failed attempts)
  5. Use "Forgot Password" to reset

Support

How do I get help?

  1. AI Support: Available 24/7 in Slack
  2. Documentation: You're here!
  3. Email: [email protected]
  4. Phone: Enterprise plans only

What are the support SLAs?

PriorityStartupProfessionalEnterprise
Critical48 hours24 hours8 hours
High72 hours48 hours24 hours
Medium5 days3 days48 hours

How do I report a security issue?

Email [email protected] with:

  • Description of the issue
  • Steps to reproduce
  • Potential impact
  • Your contact information

We respond to security reports within 24 hours.

Agentic AI-Powered Security & Compliance