CyberSage, Threat Modeling Automation

Skip to end of metadata
Go to start of metadata

You are viewing an old version of this page. View the current version.

Compare with Current View Page History

« Previous Version 27 Next »

CyberSage SAAS Plans

Features

Feature

Standard

Enterprise

Enterprise +

Automated Threat Modeling

(tick)

(tick)

(tick)

Threat Modeling Profiles

 More info

Threat modeling engine uses profiles to build contextualized attack tree and threat model

5

15

customized

Issues Tracking

 More info

Repo of security weakness found in threat modeling.

(tick)

(tick)

(tick)

AppSec Knowledge Base

 More info

Developer gets real-time help to understand the security issues and how to remediate with the knowledge base (KB) embedded in threat modeling session. KB are based on CWE and OWASP

(tick)

(tick)

(tick)

Jira Single-Sing-on

 More info

Users login CyberSage with their Jira accounts. Seamlessly integrates security threat modeling into development workflow

(tick)

(tick)

Issues management in Jira

 More info

Developers manages the life-cycle security tasks using their Jira development workflow.

(tick)

(tick)

Release management dashboard

 More info

Supports risk-based software release management and CI/CD pipeline.

(tick)

(tick)

ChatGpt integration

 More info

Support developers with security expertise by integrating with OpenAI ChatGPT. Need customer’s ChatGPT API account.

(tick)

(tick)

Issues security risk rating

 More info

Prioritize remediation of security weakness. Risk rating considers both likelihood and impact to business.

Basic

Advanced

Advanced

Risk and control repository & certification

 More info

Threat modeling engine uses risk and control facts to produce accurate threat model.Security professionals certifies these facts to be accurate so these facts are re-used in all threat modeling sessions to produce accurate results.

(tick)

(tick)

Application inherent risk info Repo

 More info

Enterprise’s Applications catalog along with their essential inherent risk info. Can be synchronized with enterprise’s book of record

(tick)

(tick)

Create threat modeling policies

 More info

Configure threat modeling profiles for applications when application and business features change. (Configuration is done with out-of-box profiles set)

(tick)

Risk and impact analysis

 More info

Analyze risks to applications and their business features, establishes impacts to business impact and impact rating.

(tick)

Report and charts

 More info

Graphic reports and charts for real-time security risk status and trends.

(tick)

Security & Admin Controls

Feature

Standard

Enterprise

Enterprise +

Private Cloud Instance

(tick)

(tick)

(tick)

Encryption in transit and at rest

(tick)

(tick)

(tick)

User roles and permissions

Basic

Advanced

Advanced

  • No labels

0 Comments

You are not logged in. Any changes you make will be marked as anonymous. You may want to Log In if you already have an account.