Threat modeling features
Knowledge graph
The whole platform relies on a knowledge hypergraph allowing the usage of hyper-entities and hyper-relationships including nested relationships.
Exploration and correlation
The whole dataset could be explored with analytics and correlation engines including many visualization plugins, MapReduce and Pregel computations.
Unified and consistent data model
From operational to strategic level, all information are linked through a unified and consistent data model based on the STIX2 standards.
Automated reasoning
The database engine performs logical inference through deductive reasoning, in order to derive implicit facts and associations in real-time.
By-design sourcing of data origin
Every relationships between entities have time-based and space-based attributes and must be sourced by a report with a specific confidence level.
Data access management
Full control of data access management using groups with permissions based on granular markings on both entities and relationships.