Login will follow soon.

Product

AI Integration via Model Context Protocol (MCP) in Finalization Phase

CYMETRIS is currently finalizing the integration of AI systems into its cyber risk analysis platform via the Model Context Protocol (MCP). This capability enables structured, governed AI support within defined TARA workflow steps—without compromising data sovereignty, traceability, or engineering accountability.  LEARN MORE↗

The MCP interface allows organizations to connect either commercial or self-hosted AI models. AI access is restricted to explicitly approved, structured data within CYMETRIS, and all usage remains fully traceable. Security engineers retain full decision authority at every stage.

AI-supported functions include architecture import and structured modeling, asset identification and CIA classification, impact and damage assessment aligned with ISO/SAE 21434 or IEC 62443, structured attack vector development, and natural language queries across TARA datasets.

Deployment options include cloud, hybrid, or fully on-premise models, with end-to-end encryption, role-based access control, and strict permission governance. The feature is currently in its final refinement stage, with availability depending on release status and product version.

 

Other Latest Updates on CYMETRIS You Might Like

Stay up to date with CYMETRIS and our software platform. We regularly share new features, updates, and practical expert insights on cyber risk assessment and TARA. Browse all our latest posts right here: NEWS

Knowledge

Vertical TARA Integration

How can TARA function across organizational boundaries? Through intelligent nesting. We recently published an expert blog on this topic, available in the Knowledge Hub of the CYEQT Knowledge Base, the leading training platform for automotive cybersecurity. LEARN MORE↗

Knowledge

New Reading Tip: Beyond Excel TARAs: Building Traceable Cybersecurity

Many automotive TARAs remain isolated in Excel, disconnected from development workflows. This CYEQT Knowledge Base article reveals the gaps between risk analysis and implementation, explains TARA integration, and provides actionable steps to achieve genuine traceability across your toolchain. LEARN MORE↗

Product

We heard you: Undo/Redo

Usability first: Our new release (which includes backend stability and scalability improvements along with several interesting features—see the complete overview in the tool) brings undo and redo functionality. If you encounter any bugs, please report them!

TARA in Development: How to Assess Cyber Risks (Methodology Guide)

TARA in Development: How to Assess Cyber Risks (Methodology Guide)

TARA (Threat Analysis and Risk Assessment) provides a powerful methodology for systematically identifying and evaluating cyber risks — throughout product development and across the entire lifecycle.

Our overview page guides you step-by-step through the complete TARA process in line with ISO/SAE 21434: you’ll learn which phases matter, what artifacts play a role, and what truly counts.

What you’ll find here:

  • Clear guidance through all TARA steps
  • Key artifacts presented in modular overview
  • Practical insights on common pitfalls and limitations
  • Special considerations for collaboration between OEMs and suppliers in automotive development

Get started now and dive into the full guide.

Get the latest from CYMETRIS: Let's talk

Our platform continues to evolve with cutting-edge features for intelligent cyber risk modeling/TARA. Want the latest on new capabilities, integrations, and industry developments? Reach out to our team for insights tailored to your needs.

Explore
Drag