Threat Modeling Revised

Security by Design with Thremo.



Threat Modeling with Thremo

Thremo is designed to offer a different approach to how security is handled in software projects.

Security Expert

Thremo's main goal is to offer a software based security expert at a low cost, making IT security accessible to teams and projects of any size.

Planning Tool

Security is easier to implement when thought about from the get-go. Thremo can be used as a planning tool for your next software project.

Online and Offline

Thremo is available as a cloud based service. Because software architecture can be a sensitive topic, we will also offer a version available for offline and firm internal use.

Project Management

Thremo makes it possible to collaborate with others in the design and analysis of complex architecture. In the future, it will also be able to connect to project managament tools, such as Jira.

Security Revised

Thremo presents the security aspects of your system in a straightforward manner - making security accessible to anyone.

Security by Design

Integrate Thremo into your development process from the beginning, to make security a key pillar of your project.

Security with Tempo

Thremo not only finds threats you might miss when looking at components individually - it does so way quicker than any human expert could.


Thremo Workflow

Thremo follows a very straightforward, linear workflow pattern.


Data Flow Diagram Creation

Any system can be broken down into three types of sub-components - processes, data stores, and external interactors.

Thremo follows this concept and lets you model systems of any complexity in a simple and straightforward manner. Simply drag & drop the elements on the workspace and connect them with data flows.


Element Specification

Thremo lets you specify each element. Properties such as the trust and privilege level not only help you think about your systems security status, but also improve the analysis.

Besides these high-level properties, you can specify software products on your elements. Thremo knows about more than 300.000 different software products, to ensure you can correctly model your system.


Model Analysis

After you created a model, Thremo analyzes the data flow between each element for potential weaknesses.

Found threats describe potential risks your system might face and are meant to give you hints on which security aspects you have to think about during development. If you have specified certain software used by the elements, Thremo also returns known concrete vulnerabilities. Currently, more than 70.000 vulnerabilities are known by Thremo.


Model Storage

Thremo lets you store your work at any time.

Switch between different models with the click of a mouse. By making it possible to work on an unlimited amount of models, you can use Thremo for all of your projects.



Create projects to collaborate with others! Any model linked to a project can be accessed by its members.

In the future, Thremo will be able to connect to project management tools like Jira. Keep an eye out for updates!


Contact us!

If you have any questions, let us know! We are also looking for possible cooperations - if that sounds like something you might be interested in, we would love to get in touch with you.