Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

CyberSage SAAS Plans

Features

Feature

/Plan

Standard

Enterprise

Enterprise +

Automated Threat Modeling

(tick)

(tick)

(tick)

Threat Modeling Profiles

Expand
titleMore info

Threat modeling engine uses profiles to build contextualized attack tree and threat model.

3

5

10

15

customized

Issues Tracking

Expand
titleMore info

Repo of security weakness found in threat modeling.

(tick)

(tick)

(tick)

AppSec Knowledge Base

Expand
titleMore info
Developer gets

Developers get real-time help to understand the security issues and how to remediate them with the knowledge base (KB) embedded in the threat modeling

session

sessions. KB

are

is based on CWE and OWASP.

(tick)

(tick)

(tick)

Jira Single-

Sing

Sign-

on

On

Expand
titleMore info

Users

login

log into CyberSage with their Jira accounts. Seamlessly integrates security threat modeling into the development workflow.

(tick)

(tick)

Issues

management

Management in Jira

Expand
titleMore info

Developers

manages

manage the life-cycle security tasks using their Jira development workflow.

Release management dashboard

(tick)

(tick)

Release Management Dashboard

Expand
titleMore info
Supports

Support risk-based software release management and CI/CD pipeline.

ChatGpt integration

(tick)

(tick)

ChatGPT Integration

Expand
titleMore info

Available in 2024. Support developers with security expertise by integrating with OpenAI ChatGPT. Need customer’s ChatGPT API account.

Issues security risk rating

(tick)

(tick)

Issues Security Risk Rating

Expand
titleMore info

Prioritize remediation of security

weakness

weaknesses. Risk rating considers both likelihood and impact to business.

 Threat

Basic

Advanced

Advanced

Risk and Control Repository & Certification

Expand
titleMore info

Threat modeling engine uses risk and control facts to produce the accurate threat model.

SME certifies

Security professionals certify these facts to be accurate so these facts are re-used in all threat modeling sessions to produce accurate results.

Application inherit risk info registry

Risk and impact analysis

Report and charts

Security & Infrastructure

Feature/Plan

Starter

(tick)

(tick)

Application Inherent Risk Info Repo

Expand
titleMore info

Repository for enterprise applications catalog along with their essential inherent risk info. Can be synchronized with the enterprise’s book of record.

(tick)

(tick)

Create Threat Modeling Policies

Expand
titleMore info

Configure threat modeling profiles for applications when applications and business features change. (Configuration is done with out-of-box profiles set.)

(tick)

Risk and Impact Analysis

Expand
titleMore info

Analyze risks to applications and their business features, establish impacts to business and impact ratings.

(tick)

Reports and Charts

Expand
titleMore info

Graphic reports and charts for real-time security risk status and trends.

(tick)

Security & Admin Controls

Feature

Standard

Enterprise

Enterprise +

Jira integration

Expand
titlemore info

integrate with jira

(tick)

user admin

Expandtitledetails. manage users

Private Cloud Instance

(tick)

(tick)

(tick)

Encryption in transit and at rest

(tick)

(tick)

(tick)

User roles and permissions

Basic

Advanced

Advanced