By clicking “Accept”, you agree to the storing of cookies on your device to enhance site navigation, analyze site usage, and assist in our marketing efforts. View our Privacy Policy for more information.
18px_cookie
e-remove
Blog
Glossary
Customer Story
Video
eBook / Report
Solution Brief

Five9 Transforms Software Supply Chain Security with Endor Labs

Five9 is a leading provider of contact center software that aims to transform traditional call and contact centers into customer engagement centers. The company name is a reference to the industry gold standard for uptime: 99.999%.

Five9 is a leading provider of contact center software that aims to transform traditional call and contact centers into customer engagement centers. The company name is a reference to the industry gold standard for uptime: 99.999%.

Five9 is a leading provider of contact center software that aims to transform traditional call and contact centers into customer engagement centers. The company name is a reference to the industry gold standard for uptime: 99.999%.

Written by
Jenn Gile
Jenn Gile
Published on
August 20, 2025

Five9 is a leading provider of contact center software that aims to transform traditional call and contact centers into customer engagement centers. The company name is a reference to the industry gold standard for uptime: 99.999%.

Five9 is a leading provider of contact center software that aims to transform traditional call and contact centers into customer engagement centers. The company name is a reference to the industry gold standard for uptime: 99.999%.

The Challenge

Five9 faced increasing challenges in managing the risks of third-party library vulnerabilities within its applications. As the company evaluated the strengths and gaps of its existing tools, it became clear that its current SCA solution (Black Duck) was not reducing risk in a meaningful way. While it met certain regulatory compliance requirements, the overwhelming volume of alerts made it difficult to identify which findings represented true risks. With thousands of issues in the backlog, the pace of remediation fell short of the company’s high standards, creating potential exposure to what matters most for Five9’s credibility: uptime.

The team recognized that replacing the SCA would require significant change management. Developers were not accustomed to acting on alerts, and modifying third-party libraries required extensive regression testing to avoid breaking changes that could disrupt services and cause financial loss. Naturally, no one wanted to upgrade a dependency unless it was certain the change was necessary. These realities made improving the program as much about people and processes as about technology.

The Solution

Five9 ran a competitive evaluation to find an AppSec platform, looking at startups and established tools (including Snyk), to find one that could deliver on four key requirements:

  • High Accuracy and Verifiability: Five9's paramount requirement was the verifiability of findings. The findings had to be justifiable and for the tool to definitively show how a vulnerability could be reached within their applications.
  • Comprehensive Coverage and CI/CD Integration: The new solution needed to support their primary coding languages, specifically Java. They valued the continuous expansion of language support (e.g., JavaScript) and the ability to integrate with their existing source code management systems like GitLab and Azure DevOps for 100% scanning coverage of their codebase.
  • Strong Partnership and Responsiveness: Five9 deliberately sought a vendor that was "hungry" and willing to listen to feedback. They valued deep technical conversations and a high degree of customer service, where their enhancement requests and bug reports were taken to heart. This partnership was crucial for the continuous maturation of their software supply chain security program.
  • Operational Efficiency for a Lean Team: As a one-person team managing two security programs for over 250 developers, they required a high degree of automation to maintain efficiency. The ability of the new SCA tool to reduce noise and provide actionable, verifiable findings was paramount to enabling a single individual to effectively manage the software supply chain security program.

Why Endor Labs Won

Five9 chose Endor Labs to be their SCA for the future for two key reasons:

  • Reachability-Based Prioritization: Endor Labs accurately showed which vulnerabilities were exploitable in Five9’s code, reducing false positives dramatically. While other tools classified findings based on aggregate scores, CVEs, or in-the-wild exploits, Endor Labs could demonstrate how the vulnerable function was being called.
  • Willingness to Listen and Partner: At the time of the evaluation, Endor Labs was a stealth startup. Five9 was impressed with the team’s technical acumen and readiness to embrace Five9 as a design partner. This commitment gave them the confidence that the product would mature and meet their needs long-term.

The Impact

Five9 has been a customer for several years, including a renewal, and has created a strong software supply chain security program centered around Endor Labs. Five9 has had significant influence over product development, from UI/UX to Jira automation to Customer Advisory Boards. Whether they’re reporting a bug or making enhancement requests, Endor Labs takes them to heart. The result is a better product and high customer satisfaction.

96.5% noise reduction

Reachability had a transformative impact on Five9's vulnerability management, drastically reducing their actionable backlog. They went from nearly 50k findings to as few as 30-40. The ability to definitively show the call graph that demonstrates how a dangerous dependency is being called has enabled them to gain developer trust and rapidly remediate vulnerabilities. Combined with automation and CI/CD capabilities, this makes it possible for one security engineer to support 250+ developers.

“If it wasn’t for reachability, this program would fail. A little extra effort up front to onboard is worth the deep application context we use every day."
- Greg Pettengill, Principal Product Security Engineer

Rapid zero-day response

After becoming a customer, Five9 faced a situation that could have been disastrous: a zero day. But this is a success story. Within a short time after the disclosure, Endor Labs automatically identified 40 instances across 40 projects where the vulnerable dependency was being used. Due to the program's established credibility earned through reachability, all these issues were fixed in under two weeks.

“Endor Labs gave me the credibility to say, ‘this zero day is in 40 places and we need to fix it immediately’, and we did. Everything was remediated in under two weeks, which would have been impossible before we had Endor Labs.”
- Greg Pettengill, Principal Product Security Engineer

Security is shifted left

Five9 is now able to block multiple types of risk from entering the codebase through a "build warn" and then "build fail/block" approach. This allowed Five9 to initially warn developers about issues, giving them time to adapt, before eventually blocking builds for critical and high-priority reachable findings. This structured enforcement, after building program credibility, has been crucial for systematically reducing vulnerabilities and improving code quality.

“Endor Labs is fully entrenched in our CI/CD pipeline, so anything brand new automatically gets an SCA scan and ensures immediate security checks for new development.”
- Greg Pettengill, Principal Product Security Engineer

AppSec for AI risks

As software development is revolutionized by generative AI, Five9 is working to evolve their software supply chain security program. Like many modern SaaS platforms, Five9 uses AI coding assistants, models, and services. They know AI code assistants can’t be counted on to generate inherently secure code, and the models and services leveraged in their applications represent a new attack vector.

“Endor Labs is helping us adapt our application security program to address emerging risks from generative AI while using AI to scale and enhance its effectiveness.”
- Greg Pettengill, Principal Product Security Engineer

Book a Demo

Book a Demo

Book a Demo

Welcome to the resistance
Oops! Something went wrong while submitting the form.

Book a Demo

Book a Demo

Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.

Book a Demo