ThreatModeler Community Edition

Code With Confidence Using Our Intuitive Wizard

ThreatModeler Contributes to Secure Technology Development During Challenging Times Empowering DevSecOps to Maximize Efforts at No Cost

For the first time ever, developers can harness the power of ThreatModeler’s industry leading automated platform via the free Community Edition. Known for our innovative diagramming functionality, DevSecOps can now choose to use a questionnaire for threat modeling, enabling them to choose the approach that best-suits their security needs. 

Leverage our innovative Threat Intelligence Framework to uncover all threats to your IT applications and underlying infrastructure in a simple, easy-to-use checklist.  We provide the unparalleled ability for developers to confidently produce secure code. 

ThreatModeler Community Edition Key Features

Rapid and Intuitive Approach

Simply answer a few questions posed by our intuitive Wizard to leverage ThreatModeler’s unmatched, industry leading Intelligent Threat Engine.

Identify Threats In Minutes

Eliminate weeks spent trying to identify attack surface entry points. Gain a full understanding of every threat to your entire IT environment in minutes – enabling threat modeling to scale across applications.

Communicate Threats to Stakeholders

Seamlessly communicate threats across teams by exporting the automatically generated Threat Report as a PDF.

Create Threat Models In 3 Easy Steps

Step 1

Answer the Wizard’s adaptive questionnaire describing the application and IT environment.

Step 2

The Wizard adjusts in real-time to accurately identify the threats associated with your attack surface.

Step 3

In under 5 minutes, developers receive a list of all potential security threats ranked in order of priority.

Process Flow Diagrams (PFDs) vs. Data Flow Diagrams (DFDs) in the Threat Modeling Arena

DFD-based threat modeling has been the traditional approach to threat modeling in the Information Security profession. As technology development has moved towards rapid iterative modular development and deployment, the flaws that result from using DFDs have become painfully obvious. This white paper looks at some flaws and the advantages of moving to a more mature Process Flow Diagram (PFD) approach to threat modeling as a solution.

Still have questions about ThreatModeler Cloud?