CyberSage, Threat Modeling Automation
CyberSage Plan
CyberSage SAAS Plans
Features
Feature | Standard | Enterprise | Enterprise + |
---|---|---|---|
Automated Threat Modeling |
|
|
|
Threat Modeling Profiles Threat modeling engine uses profiles to build contextualized attack tree and threat model. | 5 | 15 | customized |
Issues Tracking Repo of security weakness found in threat modeling. |
|
|
|
AppSec Knowledge Base Developers get real-time help to understand the security issues and how to remediate them with the knowledge base (KB) embedded in the threat modeling sessions. KB is based on CWE and OWASP. |
|
|
|
Jira Single-Sign-On Users log into CyberSage with their Jira accounts. Seamlessly integrates security threat modeling into the development workflow. |
|
|
|
Issues Management in Jira Developers manage the life-cycle security tasks using their Jira development workflow. |
|
|
|
Release Management Dashboard Support risk-based software release management and CI/CD pipeline. |
|
|
|
ChatGPT Integration Available in 2024. Support developers with security expertise by integrating with OpenAI ChatGPT. Need customer’s ChatGPT API account. |
|
|
|
Issues Security Risk Rating Prioritize remediation of security weaknesses. Risk rating considers both likelihood and impact to business. | Basic | Advanced | Advanced |
Risk and Control Repository & Certification Threat modeling engine uses risk and control facts to produce the accurate threat model. Security professionals certify these facts to be accurate so these facts are re-used in all threat modeling sessions to produce accurate results. |
|
|
|
Application Inherent Risk Info Repo Repository for enterprise applications catalog along with their essential inherent risk info. Can be synchronized with the enterprise’s book of record. |
|
|
|
Create Threat Modeling Policies Configure threat modeling profiles for applications when applications and business features change. (Configuration is done with out-of-box profiles set.) |
|
|
|
Risk and Impact Analysis Analyze risks to applications and their business features, establish impacts to business and impact ratings. |
|
|
|
Reports and Charts Graphic reports and charts for real-time security risk status and trends. |
|
|
|
Security & Admin Controls
Feature | Standard | Enterprise | Enterprise + |
---|---|---|---|
Private Cloud Instance |
|
|
|
Encryption in transit and at rest |
|
|
|
User roles and permissions | Basic | Advanced | Advanced |