Average Ratings 0 Ratings
Average Ratings 0 Ratings
Average Ratings 0 Ratings
Description
From various assets and countermeasures to factoids, personas, and architectural components, you can enter or upload a diverse array of data related to security, usability, and requirements to uncover valuable insights, including the links between requirements and risks as well as the rationale behind persona traits. Since no single perspective can encompass the complexity of a system, you can effortlessly create 12 distinct views of your developing design that examine aspects such as people, risks, requirements, architecture, and even geographical location. Additionally, as your preliminary design progresses, you can automatically produce threat models like Data Flow Diagrams (DFDs). Utilize open-source intelligence regarding potential threats and viable security architectures to assess your attack surface effectively. Furthermore, you can visualize all the security, usability, and design factors related to the risks associated with your product and how they interact with one another. This comprehensive approach ensures a thorough understanding of your system's vulnerabilities and strengths.
Description
ReqSuite® RM (from OSSENO Software) is the right choice for innovative (mid-sized) companies that want to benefit from an easy-to-use, powerful, 100% customizable, and quickly deployable requirements management tool.
It belongs to the newest generation of RM tools and therefore includes powerful features for managing requirements, test cases, risks, standards, architectural elements, and other conceptual artifacts along the development cycle.
The software provides a comprehensive toolkit for collaborative requirements management, tracking, analysis, approval, review, export, import, and reuse, as well as customization of the tool to meet individual needs. Additionally, its ease of use and simple set-up, as well as free premium support means you can get a customized solution quickly running.
With ReqSuite® RM, organizations increase the quality of requirements, and achieve higher efficiency, ease and standardization in their development processes. Savings up to 30% of the total development effort are possible.
Description
ThreatModeler™, an enterprise threat modeling platform, is an automated solution that reduces the effort required to develop secure applications. Today's information security professionals have a pressing need to create threat models of their organizations' data and software. We do this at the scale of their IT ecosystem and with the speed of innovation. ThreatModeler™, which empowers enterprise IT organizations, allows them to map their unique security requirements and policies directly into the enterprise cyber ecosystem. This provides real-time situational awareness of their threat portfolio and risks. InfoSec executives and CISOs gain a complete understanding of their entire attack landscape, defense-in depth strategy, and compensating control, which allows them to strategically allocate resources and scale up their output.
API Access
Has API
API Access
Has API
API Access
Has API
Integrations
Jira
Microsoft Azure
AWS CloudFormation
Amazon Web Services (AWS)
Azure DevOps
Azure DevOps Server
Azure Resource Manager
ClickUp
Enterprise Architect
GitHub
Integrations
Jira
Microsoft Azure
AWS CloudFormation
Amazon Web Services (AWS)
Azure DevOps
Azure DevOps Server
Azure Resource Manager
ClickUp
Enterprise Architect
GitHub
Integrations
Jira
Microsoft Azure
AWS CloudFormation
Amazon Web Services (AWS)
Azure DevOps
Azure DevOps Server
Azure Resource Manager
ClickUp
Enterprise Architect
GitHub
Pricing Details
Free
Free Trial
Free Version
Pricing Details
No price information available.
Free Trial
Free Version
Pricing Details
No price information available.
Free Trial
Free Version
Deployment
Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook
Deployment
Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook
Deployment
Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook
Customer Support
Business Hours
Live Rep (24/7)
Online Support
Customer Support
Business Hours
Live Rep (24/7)
Online Support
Customer Support
Business Hours
Live Rep (24/7)
Online Support
Types of Training
Training Docs
Webinars
Live Training (Online)
In Person
Types of Training
Training Docs
Webinars
Live Training (Online)
In Person
Types of Training
Training Docs
Webinars
Live Training (Online)
In Person
Vendor Details
Company Name
CAIRIS
Website
cairis.org
Vendor Details
Company Name
OSSENO Software GmbH
Founded
2014
Country
Germany
Website
www.osseno.com
Vendor Details
Company Name
ThreatModeler
Founded
2010
Country
United States
Website
threatmodeler.com
Product Features
Requirements Management
Automated Functional Sizing
Automated Requirements QA
Automated Test Generation
Automated Use Case Modeling
Change Management
Collaboration
History Tracking
Prioritization
Reporting
Status Reporting
Status Tracking
Summary Reports
Task Management
To-Do List
Traceability
User Defined Attributes
Product Features
Application Development
Access Controls/Permissions
Code Assistance
Code Refactoring
Collaboration Tools
Compatibility Testing
Data Modeling
Debugging
Deployment Management
Graphical User Interface
Mobile Development
No-Code
Reporting/Analytics
Software Development
Source Control
Testing Management
Version Control
Web App Development
Application Lifecycle Management
Administrator Level Control
Defect Tracking
Iteration Planning
Project Management
Release Management
Requirements Review
Task Management
Test Case Tracking
User Level Management
Version Control
Product Lifecycle Management
Change Management
Compliance Management
Cost Tracking
Design Management
Document Management
Product Data Management
Project Management
Requirements Management
Supplier Management
Requirements Management
Automated Functional Sizing
Automated Requirements QA
Automated Test Generation
Automated Use Case Modeling
Change Management
Collaboration
History Tracking
Prioritization
Reporting
Status Reporting
Status Tracking
Summary Reports
Task Management
To-Do List
Traceability
User Defined Attributes