CyberSage SAAS Plans
Features
Feature | Standard | Enterprise | Enterprise + |
---|
Automated Threat Modeling | | | |
Threat Modeling Profiles Expand |
---|
| Threat modeling engine uses profiles to build contextualized attack tree and threat model. |
|
35 | 15 | customized |
Issues Tracking Expand |
---|
| Repo of security weakness found in threat modeling. |
| | | |
AppSec Knowledge Base |
Developer gets Developers get real-time help to understand the security issues and how to remediate them with the knowledge base (KB) embedded in the threat modeling |
|
session are is based on CWE and OWASP. |
| | | |
Jira Single- |
Singon login log into CyberSage with their Jira accounts. Seamlessly integrates security threat modeling into the development workflow. |
| | | |
Issues |
management manages manage the life-cycle security tasks using their Jira development workflow. |
| | | |
Release |
management dashboard Supports Support risk-based software release management and CI/CD pipeline. |
| | | |
ChatGpt integration ChatGPT Integration Expand |
---|
| Available in 2024. Support developers with security expertise by integrating with OpenAI ChatGPT. Need customer’s ChatGPT API account. |
| | | |
Issues |
security risk rating Security Risk Rating Expand |
---|
| Prioritize remediation of security |
|
weaknessweaknesses. Risk rating considers both likelihood and impact to business. |
| Basic | Advanced | Advanced |
Risk and |
control repository certification Certification Expand |
---|
| Threat modeling engine uses risk and control facts to produce the accurate threat model. Security professionals |
|
certifies certify these facts to be accurate so these facts are re-used in all threat modeling sessions to produce accurate results. |
| | | |
Application |
inherent risk information Enterprise’s Applications Repository for enterprise applications catalog along with their essential inherent risk info. Can be synchronized with the enterprise’s book of record. |
| | | |
Create Threat Modeling Policies Expand |
---|
| Configure threat modeling profiles for applications when applications and business features change. (Configuration is done with out-of-box profiles set.) |
| | | |
Risk and |
impact analysis Impact Analysis Expand |
---|
| Analyze risks to applications and their business features, |
|
establishes establish impacts to business |
|
impact ratingReport charts Charts Expand |
---|
| Graphic reports and charts for real-time security risk status and trends. |
| | | |
Security & Admin Controls
Feature | Standard | Enterprise | Enterprise + |
---|
Private Cloud Instance | | | |
Encryption in transit and at rest | | | |
User roles and permissions | Basic | Advanced | Advanced |