Skip to main content
Skip table of contents

Threat modeling features

Knowledge graph

The whole platform relies on a knowledge hypergraph allowing the usage of hyper-entities and hyper-relationships including nested relationships.

Exploration and correlation

The whole dataset could be explored with analytics and correlation engines including many visualization plugins, MapReduce and Pregel computations.

Unified and consistent data model

From operational to strategic level, all information are linked through a unified and consistent data model based on the STIX2 standards.

Automated reasoning

The database engine performs logical inference through deductive reasoning, in order to derive implicit facts and associations in real-time.

By-design sourcing of data origin

Every relationships between entities have time-based and space-based attributes and must be sourced by a report with a specific confidence level.

Data access management

Full control of data access management using groups with permissions based on granular markings on both entities and relationships.

JavaScript errors detected

Please note, these errors can depend on your browser setup.

If this problem persists, please contact our support.