About ThreatModeler® Software, Inc.
The Evolution of Threat Modeling
Like everything else in technology, threat modeling continues to evolve. What started out as engineers doing ad hoc threat modeling, evolved into data flow diagrams built by security experts. And that worked for a while, but it has its limitations. It’s time intensive to manually identify threats and mitigations, and it offers no integration into the software development lifecycle. But worst of all, it’s unscalable.
For threat modeling to be scalable, it can’t be held hostage by security experts. The future of threat modeling is a self-service model where developers do their own threat modeling. But, develops are generally not security experts. So, what’s the answer?
Threat Modeling for the Modern World
Imagine a threat model that is more representative of today’s complex architectures. One that depicts how a hacker moves through your system, identifying where they’ll attack, and more importantly, what controls are required to mitigate it.
Now imagine if your developers could use this threat modeling tool in-house, with little to no security expertise, little to no learning curve and without the needleless expense of an outside security consultant.
How is that possible? By using the same language and diagrams to model threats that developers already use. By making threat modeling just another step in the software development lifecycle.
Data flow diagrams don’t do a good job of modeling threats in modern system architectures. And hiring outside security consultants to create custom threat models doesn’t scale. The answer is ThreatModeler software.
A Scalable Enterprise Threat Modeling Platform
ThreatModeler software was created to address the shortcomings of data flow diagrams, bring threat modeling capabilities in-house and make it scalable. The vision for ThreatModeler software is to be able to model ALL the threats, automatically, with no security expertise required. And we think we’ve done that.
Threat Modeling can do More Than you Think
ThreatModeler software enables you to design in security from the start, in lock step with your DevOps workflow. And the ThreatModeler platform can do more than you think. Here are just a few examples:
Automatically convert your diagrams into threat models—no data flow diagrams required
Automatically see all threats based on your threat model—no brainstorming required
Automatically update your threat model based on new threats without doing anything
Automatically generate cloud architecture diagrams simply by scanning your VPC
COMPLIANT (AT LAST)
Integrate with ITSM (e.g., JIRA) to instantly turn a security requirement into a service ticket
Founder & CEO
20+ years of sales, technical and operations leadership. Entrepreneur and senior executive with a demonstrated history of success working in IT security, finance and IT infrastructure. CISSP and SANS GWEB certified.
10+ years of security, technical, analytics and operations leadership. Executive with demonstrated history of success working in IT security, cloud and infrastructure.
20+ years of sales, services and operations leadership. Entrepreneur and senior executive with a proven track record of success building global sales channels, exceeding quota consistently, as well as advising boards and select VC on cybersecurity issues and company viability.
20+ years of technical and CTO leadership advising for innovative security product firms and maturing security initiatives through his firm Aedify.
VP of Sales
6+ years of sales, security, and vulnerability analysis experience. Application security professional with expertise in threat modeling.
Your Next Step
The cyber threat landscape changes daily. The only chance you have is a threat modeler that keeps up with those changes in real time. ThreatModeler software can help you do that whether your application is on premises or in the cloud.
If you already understand the benefits of threat modeling, but want a solution more comprehensive and secure than a simple data flow diagram, we'd like to show you how easy it is to do that with a ThreatModeler demo. Fill in email below and we'll send you a link.
THREATMODELER SOFTWARE NEWS & BLOG