How can we help you?

Search our knowledge base or browse categories below for quick solutions.

Getting Started Threat Management Billing & Plans API & Webhooks

Browse by Category

🚀

Getting Started

Installation guides, initial configuration, and onboarding workflows for new organizations.

24 articles
🛡️

Threat Detection & Response

Understanding alerts, managing incidents, and configuring automated response playbooks.

38 articles
💳

Account & Billing

Manage subscriptions, update payment methods, view invoices, and upgrade/downgrade plans.

15 articles

API & Integrations

REST API reference, webhook setup, authentication, and third-party service integrations.

42 articles
🔧

Troubleshooting

Common errors, connection issues, performance optimization, and diagnostic tools.

29 articles
📊

Compliance & Reporting

SOC 2, ISO 27001, GDPR tools, audit logs, and custom report generation.

18 articles

Contact Support

🎫

Submit a Ticket

Detailed issue tracking with priority routing and full case history.

Create Ticket
💬

Live Chat

Real-time assistance from our security operations specialists.

Start Chat
📞

Phone Support

Direct line for critical incidents and enterprise clients.

(800) 555-7328
📖

Knowledge Base

Comprehensive documentation, tutorials, and best practices.

Browse Docs

System Status & SLA

All Systems Operational
Threat Detection Engine
SOC Monitoring Portal
API & Webhooks
Incident Response Queue
Billing & Invoicing
Uptime Guarantee99.99%

Frequently Asked Questions

Standard tickets are acknowledged within 2 hours during business hours. Critical security incidents routed to our SOC receive immediate triage, typically within 15 minutes. Enterprise SLA guarantees are documented in your service agreement.

Yes. Plan changes are prorated automatically. Upgrades take effect immediately with adjusted billing at the next cycle. Downgrades take effect at the start of your next billing period to avoid service interruption.

You can quickly mark alerts as false positives from the dashboard. Our ML model learns from your feedback to reduce similar false positives in the future. You can also adjust sensitivity thresholds per asset group.

Yes. CyberVault offers automated compliance mapping for SOC 2, ISO 27001, HIPAA, and GDPR. Exportable audit trails, control evidence, and policy documentation are available in the Compliance module.

Absolutely. Our REST API allows full programmatic access to alerts, assets, user management, and reporting. Comprehensive documentation, SDKs, and webhook support are available in the Developer section.