Features and Benefits
Cyber System Modeling
Integration with static and dynamic code scanning tools for vulnerability analysis
Cross referencing of vulnerabilities with RMF STIG checklists
Vulnerability propagation modeling, reporting and analyzing, based on the CIA triad
(Confidentiality, Integrity and Availability)