You can import or enter a wide variety of security, usability and requirements data to gain new insights. These include information about assets, countermeasures, personas, requirements, and architectural components. A single view cannot capture a complex system. Therefore, automatically generate 12 views of your emerging design, from different perspectives, including people, risks and requirements, architecture, physical location, and even physical locations. As your design develops, automatically generate threat models such Data Flow Diagrams. Open source intelligence about possible attacks and candidate security architectures can be used to assess your attack surface. Showcase all security, usability, design, and risk factors associated with your product.