Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

CyberSage SAAS Plans

Features

Feature

Standard

Enterprise

Enterprise +

Automated Threat Modeling

(tick)

(tick)

(tick)

Threat Modeling Profiles

Expand
titleMore info

Threat modeling engine uses profiles to build contextualized attack tree and threat model.

3

5

15

customized

Issues Tracking

Expand
titleMore info

Repo of security weakness found in threat modeling.

(tick)

(tick)

(tick)

AppSec Knowledge Base

Expand
titleMore info
Developer gets

Developers get real-time help to understand the security issues and how to remediate them with the knowledge base (KB) embedded in the threat modeling

session

sessions. KB

are

is based on CWE and OWASP.

(tick)

(tick)

(tick)

Jira Single-

Sing

Sign-

on

On

Expand
titleMore info

Users

login

log into CyberSage with their Jira accounts. Seamlessly integrates security threat modeling into the development workflow.

(tick)

(tick)

Issues

management

Management in Jira

Expand
titleMore info

Developers

manages

manage the life-cycle security tasks using their Jira development workflow.

(tick)

(tick)

Release

management dashboard

Management Dashboard

Expand
titleMore info
Supports

Support risk-based software release management and CI/CD pipeline.

(tick)

(tick)

ChatGpt integration

ChatGPT Integration

Expand
titleMore info

Available in 2024. Support developers with security expertise by integrating with OpenAI ChatGPT. Need customer’s ChatGPT API account.

(tick)

(tick)

Issues

security risk rating

Security Risk Rating

Expand
titleMore info

Prioritize remediation of security

weakness

weaknesses. Risk rating considers both likelihood and impact to business.

Basic

Advanced

Advanced

Risk and

control repository

Control Repository &

certification

Certification

Expand
titleMore info

Threat modeling engine uses risk and control facts to produce the accurate threat model. Security professionals

certifies

certify these facts to be accurate so these facts are re-used in all threat modeling sessions to produce accurate results.

(tick)

(tick)

Application

inherent risk info

Inherent Risk Info Repo

Expand
titleMore info
Enterprise’s Applications

Repository for enterprise applications catalog along with their essential inherent risk info. Can be synchronized with the enterprise’s book of record.

(tick)

(tick)

Create

threat modeling policies

Threat Modeling Policies

Expand
titleMore info

Configure threat modeling profiles for applications when

application

applications and business features change. (Configuration is done with out-of-box profiles set.)

(tick)

Risk and

impact analysis

Impact Analysis

Expand
titleMore info

Analyze risks to applications and their business features,

establishes

establish impacts to business

impact

and impact

rating

ratings.

(tick)

Report

Reports and

charts

Charts

Expand
titleMore info

Graphic reports and charts for real-time security risk status and trends.

(tick)

Security & Admin Controls

Feature

Standard

Enterprise

Enterprise +

Private Cloud Instance

(tick)

(tick)

(tick)

Encryption in transit and at rest

(tick)

(tick)

(tick)

User roles and permissions

Basic

Advanced

Advanced