In order to cut off attackers, cybersecurity solutions need to capture detailed blueprints of cyber-physical infrastructure, threats and attacks, and provide defenders with interactive visualizations for exploration and answers to questions which require an understanding of how everything is connected.
CTI white paper
Learn how to model a complete identity and access management system, and use inference to simplify queries.
IAM white paper
How to define and query an extensible data model for managing permissions with a IAM platform built on TypeDB.
Join this webinar to learn more about modeling IAM data in TypeDB, and see a live demo of managing permissions.
Cybersecurity platforms and tools must be able to model and process every aspect of a company's cyber-physical presence and interactions, especially as digital infrastructure becomes more expansive and potential threats more sophisticated.
Attack Surface Management (ASM)
Map and reduce an attack surface whose size and complexity is growing as a result of the cloud, the Internet of Things (IoT) and hybrid work models.
Threat Detection and Response (TDR)
Reduce exposure time by identifying threats via signature and behavior detection and automating remediation, even advanced persistent attacks and evasive threats.
Cyber Threat Intelligence (CTI)
Aggregate information on indicators of compromise and the tactics, techniques and procedures used in cyberattacks, even as attackers continue to evolve them.
Identity and Access Management (IAM)
Protect sensitive information and ensure compliance with data privacy laws by restricting access to resources and applications, whether by humans or machines.
It's getting harder for security teams to keep up with change, whether it's the adoption of emerging technologies or the sudden shift to remote working – as is detecting attacks and identifying potential targets in increasingly interconnected environments.
It's difficult to incorporate new types of infrastructure, vulnerabilities and users on fly because relational databases are not well suited to evolving applications.
As cybersecurity models expand to capture digital, physical and social attack surfaces and threats, relational databases fail to capture the relationships between them.
The knowledge contained in a complete cybersecurity data model is critical to security operations, but relational databases are unable to help surface it.
All too often cybersecurity data is stored in different databases or schemas, one per tool, making it impossible to infer valuable data from both direct and indirect relationships.
TypeDB provides cybersecurity software and teams with a database capable of storing every detail and connection that exists within their domain, both digital and physical, and applying logic and reason to help extrapolate critical information from it.
Extensible type system
Add new types of infrastructure, threats, attacks and users on demand, upon discovery and without having to modify existing queries.
Inheritance and polymorphism
Query on abstract types (e.g., all injection attacks) rather than having to know and specify all possible types (e.g., SQL injection) with joins.
Relations as a core type
Identify the connections between attackers and assets, from assets reachable by a compromised server to the next steps in a complex attack.
Let the reasoning engine traverse relations to find relevant information (e.g., assets a user has indirect access to) without specifying them.
Download sample projects to get up and running in minutes, and check out the latest blogs from our research engineers.
IAM example project
Download a TypeDB Studio project to create an IAM schema, load sample identity data and infer permission conflicts.
IAM modeling blog
Research Engineer James Whiteside explains how to build a flexible type system for modeling real-world permissions.
CTI example project
Download a TypeDB Studio project to create a CTI schema, load sample STIX data and identify threats.