The Blade RiskManager (BRM), powered by KDM Analytics, is a fully automated risk analysis and risk measurement product provides organization with a top-down operational view of cyber-system risk. It effectively reduces overall life cycle development costs and improves confidence in decisions-making related to cybersecurity risk management and mitigation. It substantially reduces the time and cost of NIST Risk Management Framework (RMF) assessment and shows precisely where to focus risk-assessment resources.

"The USAF benefits from the automated risk management tools by cost-effectively assessing cyber threat, vulnerability, and risk for our Aircraft Systems."

- Cybersecurity Tech Expert/SCA for Aircraft Systems, USAF

Repeatability for Cost Effectiveness & Reporting

Prioritization for Better Resource Management

Automated Analysis of Improved Prioritization

Key Features

  • The BRM automatically, systematically, and comprehensively identifies multi-stage attacks and application vulnerabilities regardless of platforms, assets, systems, or sub-systems.
  • BRM’s operational perspective enables organizations to identify security assessments and risk mitigations to the most critical and risky components of a system. It also makes system-based, bottom-up vulnerability scanning approaches more targeted. This mitigates the ad-hoc nature of cybersecurity and ensures that resources are applied to the most impactful areas.
  • To ensure that threats and vulnerabilities are quantified and prioritized, BRM minimizes human interpretations, which can be influenced by a lack of knowledge, personal bias, errors and omissions, and discretionary misconceptions.

How it Works

The Blade RiskManager (BRM) uses artificial intelligence techniques and leverages a cybersecurity knowledge base of more than ten years. It automated risk analysis and is a one-stop sources to store, manage and trace all evidence regarding operational and system risk.

Specifications

Powered By:

  • Automated RMF Assessment
  • Support for Automated Import Formats
  • Automated Import Validation
  • Support for System Diagrams
  • Support for Safeguards
  • Automated Graphical Attack Tree
  • Automated Risk Computation
  • Automated Risk Distribution
  • Automated Identification of Vulnerabilities
  • Customizable Knowledge Base
  • Support for Manual Adjustments
  • Automated Report Generation

Partner with Acquired Data Solutions