...
Feature | Standard | Enterprise | Enterprise + |
---|
Automated Threat Modeling | | | |
Threat Modeling Profiles Expand |
---|
| Threat modeling engine uses profiles to build contextualized attack tree and threat model. |
| 5 | 15 | customized |
Issues Tracking Expand |
---|
| Repo of security weakness found in threat modeling. |
| | | |
AppSec Knowledge Base Expand |
---|
| Developer gets Developers get real-time help to understand the security issues and how to remediate them with the knowledge base (KB) embedded in the threat modeling sessionsessions. KB are is based on CWE and OWASP. |
| | | |
Jira Single-SingSign-on On Expand |
---|
| Users login log into CyberSage with their Jira accounts. Seamlessly integrates security threat modeling into the development workflow. |
| | | |
Issues management Management in Jira Expand |
---|
| Developers manages manage the life-cycle security tasks using their Jira development workflow. |
| | | |
Release management dashboard Management Dashboard Expand |
---|
| Supports Support risk-based software release management and CI/CD pipeline. |
| | | |
ChatGpt integration ChatGPT Integration Expand |
---|
| Available in 2024. Support developers with security expertise by integrating with OpenAI ChatGPT. Need customer’s ChatGPT API account. |
| | | |
Issues security risk rating Security Risk Rating Expand |
---|
| Prioritize remediation of security weaknessweaknesses. Risk rating considers both likelihood and impact to business. |
| Basic | Advanced | Advanced |
Risk and control repository Control Repository & certification Certification Expand |
---|
| Threat modeling engine uses risk and control facts to produce the accurate threat model. Security professionals certifies certify these facts to be accurate so these facts are re-used in all threat modeling sessions to produce accurate results. |
| | | |
Application inherent risk info Inherent Risk Info Repo Expand |
---|
| Enterprise’s Applications Repository for enterprise applications catalog along with their essential inherent risk info. Can be synchronized with the enterprise’s book of record. |
| | | |
Create threat modeling policiesThreat Modeling Policies Expand |
---|
| Configure threat modeling profiles for applications when application applications and business features change. (Configuration is done with out-of-box profiles set.) |
| | | |
Risk and impact analysis Impact Analysis Expand |
---|
| Analyze risks to applications and their business features, establishes establish impacts to business impact and impact ratingratings. |
| | | |
Report Reports and charts Charts Expand |
---|
| Graphic reports and charts for real-time security risk status and trends. |
| | | |
Security & Admin Controls
Feature | Standard | Enterprise | Enterprise + |
---|
Private Cloud Instance | | | |
Encryption in transit and at rest | | | |
User roles and permissions | Basic | Advanced | Advanced |