...
Feature | Standard | Enterprise | Enterprise + |
---|
Automated Threat Modeling | | | |
Threat Modeling Profiles Expand |
---|
| Threat modeling engine uses profiles to build contextualized attack tree and threat model. |
| 5 | 15 | customized |
Issues Tracking Expand |
---|
| Repo of security weakness found in threat modeling. |
| | | |
AppSec Knowledge Base Expand |
---|
| Developers get real-time help to understand the security issues and how to remediate them with the knowledge base (KB) embedded in the threat modeling sessions. KB is based on CWE and OWASP. |
| | | |
Jira Single-Sign-On Expand |
---|
| Users log into CyberSage with their Jira accounts. Seamlessly integrates security threat modeling into the development workflow. |
| | | |
Issues Management in Jira Expand |
---|
| Developers manage the life-cycle security tasks using their Jira development workflow. |
| | | |
Release Management Dashboard Expand |
---|
| Support risk-based software release management and CI/CD pipeline. |
| | | |
ChatGpt ChatGPT Integration Expand |
---|
| Available in 2024. Support developers with security expertise by integrating with OpenAI ChatGPT. Need customer’s ChatGPT API account. |
| | | |
Issues Security Risk Rating Expand |
---|
| Prioritize remediation of security weaknesses. Risk rating considers both likelihood and impact to business. |
| Basic | Advanced | Advanced |
Risk and Control Repository & Certification Expand |
---|
| Threat modeling engine uses risk and control facts to produce the accurate threat model. Security professionals certify these facts to be accurate so these facts are re-used in all threat modeling sessions to produce accurate results. |
| | | |
Application Inherent Risk Info Repo Expand |
---|
| Repository for enterprise applications catalog along with their essential inherent risk info. Can be synchronized with the enterprise’s book of record. |
| | | |
Create Threat Modeling Policies Expand |
---|
| Configure threat modeling profiles for applications when applications and business features change. (Configuration is done with out-of-box profiles set.) |
| | | |
Risk and Impact Analysis Expand |
---|
| Analyze risks to applications and their business features, establish impacts to business and impact ratings. |
| | | |
Reports and Charts Expand |
---|
| Graphic reports and charts for real-time security risk status and trends. |
| | | |
Security & Admin Controls
Feature | Standard | Enterprise | Enterprise + |
---|
Private Cloud Instance | | | |
Encryption in transit and at rest | | | |
User roles and permissions | Basic | Advanced | Advanced |