Listing Thumbnail

    ThreatModeler

     Info
    A next generation platform that builds process flow diagram-based threat models for cloud with just one click. ThreatModeler enables you to design applications/ infrastructure securely and supports established regulatory standards such as NIST, GDPR & PCI, enabling DevOps to ensure compliance is met

    Overview

    Play video

    The product has all the features and functionality as our standard offering, deployed on a ThreatModeler-managed multi-tenant public cloud environment.

    No Minimum Deployment Required.

    AWS customers benefit from our non-NDA procurement process. Simply purchase licenses based on your needs and get started immediately. DevOps receives immediate proof of value and there is no minimum application deployment. Benefit from our leading threat modeling platform that is designed to help DevOps to meet the complex needs of Agile cloud development.

    ThreatModeler enables users to build upon existing threat models through its patented Threat Chaining feature. Updates and changes made to a chained threat model will reflect across all models in which it is nested.

    Alongside the highlighted features, ThreatModeler provides -

    Auto Threat Mitigation - Ensure all the required security controls are implemented correctly. Based on the results of your threat model, automatically mitigate identified threats.

    CI/CD Pipeline - Include your existing technology investments, such as JIRA and Jenkins in a seamless CI/CD toolchain integration. Set your data free and do more with our bi-directional API.

    Reporting - Stay on top of risk by understanding threats and how to secure your architecture. Drill into your data assets and identify threats that will drive your mitigation steps (Security Controls). Gain intelligent insights and communicate them across DevOps.

    Highlights

    • Accelerator (Patent Pending) - With just one click, automatically build threat models for your cloud environments. ThreatModeler keeps your threat model synchronized with your cloud environment and automatically validates the security configurations.
    • Patented Onboard Architect - Create accurate threat models with the patented Onboard Architect feature, guiding you through the process of building cloud architectures securely. Define custom rules based on your deployment needs.
    • Built In Compliance Frameworks - ThreatModeler supports established regulatory standards such as NIST, GDPR & PCI which empowers teams to understand and meet compliance requirements at the beginning of your CDLC.

    Details

    Delivery method

    Deployed on AWS
    New

    Introducing multi-product solutions

    You can now purchase comprehensive solutions tailored to use cases and industries.

    Multi-product solutions

    Features and programs

    Financing for AWS Marketplace purchases

    AWS Marketplace now accepts line of credit payments through the PNC Vendor Finance program. This program is available to select AWS customers in the US, excluding NV, NC, ND, TN, & VT.
    Financing for AWS Marketplace purchases

    Pricing

    Pricing is based on the duration and terms of your contract with the vendor. This entitles you to a specified quantity of use for the contract duration. If you choose not to renew or replace your contract before it ends, access to these entitlements will expire.
    Additional AWS infrastructure costs may apply. Use the AWS Pricing Calculator  to estimate your infrastructure costs.

    12-month contract (1)

     Info
    Dimension
    Cost/12 months
    LICENSE
    $4,000.00

    Vendor refund policy

    No Refund

    How can we make this page better?

    We'd like to hear your feedback and ideas on how to improve this page.
    We'd like to hear your feedback and ideas on how to improve this page.

    Legal

    Vendor terms and conditions

    Upon subscribing to this product, you must acknowledge and agree to the terms and conditions outlined in the vendor's End User License Agreement (EULA) .

    Content disclaimer

    Vendors are responsible for their product descriptions and other product content. AWS does not warrant that vendors' product descriptions or other product content are accurate, complete, reliable, current, or error-free.

    Usage information

     Info

    Delivery details

    Software as a Service (SaaS)

    SaaS delivers cloud-based software applications directly to customers over the internet. You can access these applications through a subscription model. You will pay recurring monthly usage fees through your AWS bill, while AWS handles deployment and infrastructure management, ensuring scalability, reliability, and seamless integration with other AWS services.

    Support

    Vendor support

    AWS infrastructure support

    AWS Support is a one-on-one, fast-response support channel that is staffed 24x7x365 with experienced and technical support engineers. The service helps customers of all sizes and technical abilities to successfully utilize the products and features provided by Amazon Web Services.

    Product comparison

     Info
    Updated weekly
    By ThreatModeler
    By IriusRisk

    Accolades

     Info
    Top
    100
    In Infrastructure as Code
    Top
    10
    In Container Workloads

    Customer reviews

     Info
    Sentiment is AI generated from actual customer reviews on AWS and G2
    Reviews
    Functionality
    Ease of use
    Customer service
    Cost effectiveness
    2 reviews
    Insufficient data
    Insufficient data
    Insufficient data
    Insufficient data
    3 reviews
    Insufficient data
    Insufficient data
    Insufficient data
    Insufficient data
    Positive reviews
    Mixed reviews
    Negative reviews

    Overview

     Info
    AI generated from product descriptions
    Automated Threat Model Generation
    One-click automatic threat model building for cloud environments with synchronization to cloud infrastructure and automatic security configuration validation
    Threat Chaining and Model Nesting
    Patented threat chaining capability enabling users to build upon existing threat models with automatic propagation of updates and changes across all nested models
    Compliance Framework Support
    Built-in support for established regulatory standards including NIST, GDPR, and PCI for compliance requirement validation throughout the development lifecycle
    Automated Threat Mitigation
    Automatic implementation and validation of required security controls based on threat model results to mitigate identified threats
    CI/CD Pipeline Integration
    Bi-directional API integration with existing technology investments such as JIRA and Jenkins for seamless toolchain connectivity
    Threat Modeling and Data Flow Diagramming
    Platform enables creation of threat models with data flow diagrams, threat identification, and countermeasure recommendations for systems and applications
    Pre-defined Component and Threat Library
    Includes built-in library of pre-defined components, threats, and countermeasures to enable rapid model generation without requiring security expert involvement
    ALM Tool Integration
    Supports two-way synchronization with application lifecycle management tools including Jira, TFS, Azure DevOps, and Rally to integrate security countermeasures into developer workflows
    Compliance Framework Alignment
    Provides compliance mapping and validation against PCI DSS, EU GDPR, NIST 800-53, and OWASP ASVS standards
    DevSecOps Pipeline Integration
    Offers native integration and API connectivity with DevSecOps pipeline tools for automated security requirement generation and deployment throughout the software development lifecycle
    Multi-Workload Security Coverage
    Unified platform securing containers, serverless, Kubernetes, and AI workloads across AWS, on-premises, and multi-cloud environments
    Runtime Threat Detection and Enforcement
    Runtime protection to detect threats, block malicious activity, and enforce compliance in production across all cloud native workloads
    AI and LLM Security Governance
    Purpose-built AI workload security to govern large language models and generative AI applications with model abuse detection and policy enforcement
    Full Lifecycle Security
    Security coverage across the entire software development lifecycle from code development through production deployment
    Compliance and Authorization Standards
    FedRAMP High authorization enabling compliance with rigorous security and regulatory standards

    Security credentials

     Info
    Validated by AWS Marketplace
    FedRAMP
    GDPR
    HIPAA
    ISO/IEC 27001
    PCI DSS
    SOC 2 Type 2
    No security profile
    No security profile
    -
    -
    -

    Contract

     Info
    Standard contract
    No
    No

    Customer reviews

    Ratings and reviews

     Info
    0 ratings
    5 star
    4 star
    3 star
    2 star
    1 star
    0%
    0%
    0%
    0%
    0%
    0 reviews
    No customer reviews yet
    Be the first to review this product . We've partnered with PeerSpot to gather customer feedback. You can share your experience by writing or recording a review, or scheduling a call with a PeerSpot analyst.