...
Such automation enables software development communities and other information technology disciplines to scale up security risk analysis with threat modeling methodology.
In In addition, it enables enterprises to achieve consistency in such analysis by using common profiles, models and rules. The consistency is a common draw-back for security analysis done by a team of analysts, whose skill set and perspectives may vary.
Produce contextualized and accurate threat modeling results
...
CyberSage supports the threat modeling methodology, where the threat model is derived from business values and the threats to these values.
Customize threat modeling profiles for enterprise' specific business and risk profile
...
CyberSage’s threat modeling engine supports changes in these profiles with rule changes in its rule interface. The rule changes are independent from CyberSage core software and therefore can be done quickly.
The following customizations are supported:
update existing threat modeling profile
...
Associate the threats (the objectives of the attackers), the business profile and and the applicable attack vectors by building a tree structure graphic representation.
...
CyberSage incorporate threat and impact analysis of IT assets in security issue risk rating.
Please see details here automate security issue risk rating.
Easy to use?
need a browser
...