Welcome to the Panoptica Platform!

Congratulations for selecting Panoptica to secure your cloud-native applications—from code to runtime! Follow these step-by-step instructions to quickly get started on using Panoptica in your own Kubernetes and cloud environment.

Before You Begin

Make sure you sign up for Panoptica’s free tier. Sign up with no time limit on usage and no credit card requirements. Yes! It’s free to use forever. Panoptica’s free tier version protects up to 10 nodes, 1 cluster, and unlimited pods.

Step 1

Trying out Panoptica is easy. Just sign up for the free tier version here.


Let’s Get Started

Step 2

Setting up Panoptica as a first-time user requires a few simple steps. Start by logging in. Then click on the “Set Up Panoptica” button when you arrive at the screen shown below.

Step 3

Decide where you would like to start. You have options! Kubernetes Security, API Security or Serverless Security.

  • If you choose to start with using the Kubernetes Security or API Security functionalities, you’ll need to deploy our controller on a cluster.
  • If you choose to start using Serverless Security functionalities, you’ll need to connect your cloud accounts to Panoptica.
Start with using Kubernetes Security

Step 1

Deploy our controller on a cluster. Click on CONNECT CONTROLLER.

Step 2

If you don’t have a cluster, create your first cluster by navigating to the Dashboard tab and clicking on the ADD NEW CLUSTER button shown below. Clicking on this link will create a controller which will connect one of your clusters to Panoptica.

Step 3

Now fill out the forms to add information about the cluster using DEPLOYMENTS > CREATION WIZARD.

  • Enter a cluster number and choose from the Orchestration dropdown options. Then click the “FINISH” button to use preset values or follow the steps to set your own values.

Step 4

After you’ve created your cluster, it must be deployed. To deploy the cluster, our controller must be installed by adding the following command lines:

Step 5

Check the status of the controller by navigating to K8s Controllers in the administration section. Once activated, the controller kicks off an initial scan. You will be able to see your environment’s vulnerabilities. Note that installation to actual activation may take some time.

Step 6

After the controller is installed and fully activated, Panoptica will analyze the pods in the cluster and give you an overview of the current risks and vulnerabilities. Navigate to RUNTIME > WORKLOADS to get insights.


Step 7

Now navigate to RISK ASSESSMENT > RUNTIME SCAN to scan your cluster for a health check of your images.

Step 8

You can next navigate to CI/CD > IMAGES to see image vulnerabilities and generate an SBOM (software bill of materials).