Overview
Product video
The product has all the features and functionality as our standard offering, deployed on a ThreatModeler-managed multi-tenant public cloud environment.
No Minimum Deployment Required.
AWS customers benefit from our non-NDA procurement process. Simply purchase licenses based on your needs and get started immediately. DevOps receives immediate proof of value and there is no minimum application deployment. Benefit from our leading threat modeling platform that is designed to help DevOps to meet the complex needs of Agile cloud development.
ThreatModeler enables users to build upon existing threat models through its patented Threat Chaining feature. Updates and changes made to a chained threat model will reflect across all models in which it is nested.
Alongside the highlighted features, ThreatModeler provides -
Auto Threat Mitigation - Ensure all the required security controls are implemented correctly. Based on the results of your threat model, automatically mitigate identified threats.
CI/CD Pipeline - Include your existing technology investments, such as JIRA and Jenkins in a seamless CI/CD toolchain integration. Set your data free and do more with our bi-directional API.
Reporting - Stay on top of risk by understanding threats and how to secure your architecture. Drill into your data assets and identify threats that will drive your mitigation steps (Security Controls). Gain intelligent insights and communicate them across DevOps.
Highlights
- Accelerator (Patented) - With just one click, automatically build threat models for your cloud environments. ThreatModeler keeps your threat model synchronized with your cloud environment and automatically validates the security configurations.
- Onboard Architect (Patented) - Create accurate threat models with the patented Onboard Architect feature, guiding you through the process of building cloud architectures securely. Define custom rules based on your deployment needs.
- Built In Compliance Frameworks - ThreatModeler supports established regulatory standards such as NIST, GDPR & PCI which empowers teams to understand and meet compliance requirements at the beginning of your CDLC.
Details
Features and programs
Financing for AWS Marketplace purchases
Pricing
- ...
Instance type | Product cost/hour | EC2 cost/hour | Total/hour |
---|---|---|---|
t1.micro | $999.99 | $0.02 | $1,000.01 |
t2.nano | $999.99 | $0.006 | $999.996 |
t2.micro AWS Free Tier | $999.99 | $0.012 | $1,000.002 |
t2.small | $999.99 | $0.023 | $1,000.013 |
t2.medium | $999.99 | $0.046 | $1,000.036 |
t2.large | $999.99 | $0.093 | $1,000.083 |
t2.xlarge | $999.99 | $0.186 | $1,000.176 |
t2.2xlarge | $999.99 | $0.371 | $1,000.361 |
t3.nano | $999.99 | $0.005 | $999.995 |
t3.micro AWS Free Tier | $999.99 | $0.01 | $1,000.00 |
Vendor refund policy
We do not currently support refunds.
Legal
Vendor terms and conditions
Content disclaimer
Delivery details
ThreatModeler
One Web Server which accepts requests through an Application Load Balancer and an RDS.
CloudFormation Template (CFT)
AWS CloudFormation templates are JSON or YAML-formatted text files that simplify provisioning and management on AWS. The templates describe the service or application architecture you want to deploy, and AWS CloudFormation uses those templates to provision and configure the required services (such as Amazon EC2 instances or Amazon RDS DB instances). The deployed application and associated resources are called a "stack."
Version release notes
First Release
Additional details
Usage instructions
Access the application via a browser at "https://<dns name provided during the CFN launch>/" (From within accessible network). To connect to the operating system, use SSH and the username ec2-user.
Resources created/external dependencies: ThreatModelerLinuxServer -Downloads and configures the first-time user login utility which uses Email parameter Email - Valid email of the customer which is used as the username for accessing ThreatModeler platform. ThreatModelerIAMRole - To start using ThreatModeler functionalities with out any IAM issues ThreatModelerDBRestoreIAMRole - IAM role to restore ThreatModeler database snapshot ThreatModelerReadOnlyPolicy - Policy that allows ThreatModeler to assume the Readonly roles
Resources
Vendor resources
Support
Vendor support
Please allow 24 hours | 5 Days a week support support@threatmodeler.com
AWS infrastructure support
AWS Support is a one-on-one, fast-response support channel that is staffed 24x7x365 with experienced and technical support engineers. The service helps customers of all sizes and technical abilities to successfully utilize the products and features provided by Amazon Web Services.