/
CyberSage Plan

CyberSage, Threat Modeling Automation

CyberSage Plan

CyberSage SAAS Plans

Features

Feature

Standard

Enterprise

Enterprise +

Feature

Standard

Enterprise

Enterprise +

Automated Threat Modeling

Threat Modeling Profiles

Threat modeling engine uses profiles to build contextualized attack tree and threat model.

5

15

customized

Issues Tracking

Repo of security weakness found in threat modeling.

AppSec Knowledge Base

Developers get real-time help to understand the security issues and how to remediate them with the knowledge base (KB) embedded in the threat modeling sessions. KB is based on CWE and OWASP.

Jira Single-Sign-On

Users log into CyberSage with their Jira accounts. Seamlessly integrates security threat modeling into the development workflow.

 

Issues Management in Jira

Developers manage the life-cycle security tasks using their Jira development workflow.

 

Release Management Dashboard

Support risk-based software release management and CI/CD pipeline.

 

ChatGPT Integration

Available in 2024. Support developers with security expertise by integrating with OpenAI ChatGPT. Need customer’s ChatGPT API account.

 

Issues Security Risk Rating

Prioritize remediation of security weaknesses. Risk rating considers both likelihood and impact to business.

Basic

Advanced

Advanced

Risk and Control Repository & Certification

Threat modeling engine uses risk and control facts to produce the accurate threat model. Security professionals certify these facts to be accurate so these facts are re-used in all threat modeling sessions to produce accurate results.

 

Application Inherent Risk Info Repo

Repository for enterprise applications catalog along with their essential inherent risk info. Can be synchronized with the enterprise’s book of record.

 

Create Threat Modeling Policies

Configure threat modeling profiles for applications when applications and business features change. (Configuration is done with out-of-box profiles set.)

 

 

Risk and Impact Analysis

Analyze risks to applications and their business features, establish impacts to business and impact ratings.

 

 

Reports and Charts

Graphic reports and charts for real-time security risk status and trends.

 

 

Security & Admin Controls

Feature

Standard

Enterprise

Enterprise +

Feature

Standard

Enterprise

Enterprise +

Private Cloud Instance

Encryption in transit and at rest

User roles and permissions

Basic

Advanced

Advanced

Related content