Apiiro Releases Software Graph Visualization
April 28, 2025

Apiiro announced Software Graph Visualization, an interactive map that enables users to visualize their software architectures across all components, vulnerabilities, toxic combinations, blast radius, data exposure and material changes in real time.

By replacing static, manual self-attestation reports with autonomous, clear, contextual insights and analysis, this new visualization feature helps security teams understand their fast changing software architecture and pinpoint threats with a visual inventory of critical software components.

"Without a continuous view of software architecture across design, development, and runtime, it’s impossible to effectively identify, prioritize, remediate and prevent application risks,” said Idan Plotnik, co-founder and CEO of Apiiro. “Apiiro is committed to equipping customers with security insights that are intuitive, actionable, and focused, rather than overwhelming. Software Graph Visualization eliminates the need to interview developers or use self-based attestation questionnaires that make it hard to identify how software components connect and where security risks emerge. By using AI agents to generate a visual map of the entire software inventory—along with contextual security review questions and threat model stories—security teams can quickly identify, prioritize, remediate, and communicate risks, all backed by clear, data-driven insights that support faster, more informed decisions.”

Software Graph Visualization delivers question-driven, dynamic graphs that map risk exposure, attack surfaces, and sensitive data flow in an intuitive, real-time format. It is automatically and continuously updated, using deep code analysis to analyze the context and relationships of software components in real time to uncover risk exposure, enabling customers to address the following use cases:

- Threat modeling: Achieve the visibility to proactively assess risk and vulnerabilities in designs and evaluate how sensitive data moves across boundaries, ensuring all communication and access points are secure and appropriately guarded.

- Pen-test scoping: Attain comprehensive understanding of attack surfaces to successfully scope tests. The graph visualizes API architecture and data flow, highlighting risky entry points, potential vulnerabilities, and business critical areas of the system that are more prone to exploitation, allowing security teams to focus efforts on the most vulnerable parts of the system and ensure a more targeted and effective pen-test.

- Change impact assessment: Effectively assess risk introduced by new code changes by comparing pre-release and post-release states of the application. By showing how material changes affect systems over time, the graph highlights new technologies, exit points, endpoints, dependencies, and sensitive data added. This enables security teams to ask smarter, more in-depth questions about the specific changes that occurred, moving beyond self-attestation and ensuring new risks are identified and addressed with greater precision.

- Privacy review: Streamline the identification of privacy risks with sensitive data, allowing users to track where personal and confidential data is moving and whether it’s being shared or exposed. Key questions like “Am I sending PII to GenAI?” or “Should I obfuscate this data?” are addressed through the graph, offering a clear overview of potential privacy risks.

- Blast radius analysis: Ability to measure potential spread and impact of security breaches. The graph visualizes not just where sensitive data is used, but also the dependencies within open-source software and infrastructure, enabling assessment of the wider impact and scope of security incidents, helping users prioritize risk mitigation efforts effectively.

- Toxic combinations: Effectively identify dangerous combinations across the application.

- Vulnerability management: Efficiently prioritize and remediate vulnerabilities with complete context.

Share this

Industry News

June 02, 2025

Pegasystems introduced Pega Agentic Process Fabric™, a service that orchestrates all AI agents and systems across an open agentic network for more reliable and accurate automation.

June 02, 2025

Fivetran announced that its Connector SDK now supports custom connectors for any data source.

June 02, 2025

Copado announced that Copado Robotic Testing is available in AWS Marketplace, a digital catalog with thousands of software listings from independent software vendors that make it easy to find, test, buy, and deploy software that runs on Amazon Web Services (AWS).

May 29, 2025

Sauce Labs announced the general availability of iOS 18 testing on its Virtual Device Cloud (VDC).

May 29, 2025

Infragistics announced the launch of Infragistics Ultimate 25.1, the company's flagship UX and UI product.

May 29, 2025

CIQ announced the creation of its Open Source Program Office (OSPO).

May 28, 2025

Check Point® Software Technologies Ltd.(link is external) announced the launch of its next generation Quantum(link is external) Smart-1 Management Appliances, delivering 2X increase in managed gateways and up to 70% higher log rate, with AI-powered security tools designed to meet the demands of hybrid enterprises.

May 28, 2025

Salesforce and Informatica have entered into an agreement for Salesforce to acquire Informatica.

May 28, 2025

Red Hat and Google Cloud announced an expanded collaboration to advance AI for enterprise applications by uniting Red Hat’s open source technologies with Google Cloud’s purpose-built infrastructure and Google’s family of open models, Gemma.

May 28, 2025

Mirantis announced Mirantis k0rdent Enterprise and Mirantis k0rdent Virtualization, unifying infrastructure for AI, containerized, and VM-based workloads through a Kubernetes-native model, streamlining operations for high-performance AI pipelines, modern microservices, and legacy applications alike.

May 28, 2025

Snyk launched the Snyk AI Trust Platform, an AI-native agentic platform specifically built to secure and govern software development in the AI Era.

May 28, 2025

Bit Cloud announced the general availability of Hope AI, its new AI-powered development agent that enables professional developers and organizations to build, share, deploy, and maintain complex applications using natural language prompts, specifications and design files.

May 27, 2025

AI-fueled attacks and hyperconnected IT environments have made threat exposure one of the most urgent cybersecurity challenges facing enterprises today. In response, Check Point® Software Technologies Ltd.(link is external) announced a definitive agreement to acquire Veriti Cybersecurity, the first fully automated, multi-vendor pre-emptive threat exposure and mitigation platform.

May 27, 2025

LambdaTest announced the launch of its Automation MCP Server, a solution designed to simplify and accelerate the process of triaging test failures.