Skip to main content

Deployment Options

ThreatWeaver supports two deployment models to meet different security, compliance, and operational requirements.


Deployment Comparison​

SaaS (Cloud-Hosted)On-Premises (Dedicated)
Hosted byBluCypher (managed infrastructure)Customer's infrastructure
Setup timeSame day -- account provisioned in minutes1--2 weeks (infrastructure + configuration)
Data locationBluCypher-managed cloud (Render + Supabase)Customer's own data center or private cloud
UpdatesAutomatic -- always on the latest versionCustomer-managed update schedule
Multi-tenantYes -- schema-per-tenant isolationSingle-tenant (one customer per instance)
Infrastructure managementNone -- BluCypher handles everythingCustomer manages servers, database, backups
Ideal forMost organizations, MSSPs, fast deploymentRegulated industries, government, air-gapped networks, strict data residency
DatabasePostgreSQL (Supabase, managed)PostgreSQL (customer-managed)
Cost modelSubscription (predictable monthly/annual)License fee + customer infrastructure costs

The SaaS deployment is the fastest path to value. BluCypher manages all infrastructure, and customers access ThreatWeaver through a web browser.

What Is Included​

  • Full platform access -- all modules based on license tier
  • Managed infrastructure -- backend, database, caching, and AI services
  • Automatic updates -- new features and security patches deployed continuously
  • Multi-tenant isolation -- each customer gets a dedicated database schema with row-level security
  • 99.9% uptime SLA (Enterprise tier)
  • Encrypted data at rest and in transit -- AES-256 and TLS 1.2+

Setup Timeline​

StepDuration
Account provisioningMinutes
Tenant configuration (modules, users, branding)1--2 hours
Tenable.io sync setup (if using Exposure Management)30 minutes
First AppSec scan15 minutes after target configuration
Full onboarding with training1--2 business days

Data Residency​

SaaS data is hosted in the BluCypher cloud environment. For customers with specific data residency requirements (EU, Australia, specific regions), on-premises deployment provides full control over data location.


On-Premises Deployment (Dedicated)​

The on-premises option deploys ThreatWeaver entirely within the customer's infrastructure. All data stays inside their network boundary.

What Is Required​

ComponentRequirement
ServerLinux server (Ubuntu 20.04+ or equivalent) with 4+ CPU cores, 16+ GB RAM
DatabasePostgreSQL 14+
RuntimeNode.js 18+
NetworkOutbound HTTPS for AI features (optional) and license validation
DockerRequired for distributed scan sensors

Setup Timeline​

StepDuration
Infrastructure provisioning2--5 business days (customer responsibility)
ThreatWeaver installation and configuration1--2 business days (BluCypher engineering support)
Database migration and seeding1--2 hours
Tenable.io integration setup30 minutes
User provisioning and SSO configuration1--2 hours
Training and validation1--2 business days
Total1--2 weeks

Offline Capabilities​

  • All scanning, vulnerability management, and reporting functions work without internet
  • AI Labs features (fix plans, executive summaries) require outbound access to an LLM provider (Anthropic or OpenAI) -- or a locally-hosted LLM (roadmap)
  • License validation requires periodic outbound connectivity

Distributed Scan Sensors​

Both deployment models support distributed scan sensors for testing applications inside private networks.

How It Works​

  • Sensors deploy as Docker containers inside the customer's network
  • Communication is outbound-only via encrypted WebSocket tunnels (port 443)
  • No inbound firewall rules or VPN required
  • Sensors receive scan instructions from the platform and return results
  • Enrollment uses cryptographically signed tokens with per-tenant scoping

Sensor Use Cases​

ScenarioHow Sensors Help
Scanning staging environmentsDeploy a sensor in the staging VPC; scan pre-production apps before release
Private API testingTest internal APIs that are not internet-accessible
MSSP client scanningEach MSSP client gets a dedicated sensor in their network
Compliance-driven scanningData never leaves the customer's network -- only finding metadata is transmitted

Support Tiers​

StarterProEnterprise
Email supportBusiness hoursBusiness hours24/7
Response time (critical)24 hours8 hours2 hours
Response time (standard)72 hours24 hours8 hours
Dedicated CSMNoNoYes
Onboarding assistanceDocumentationGuided setup callDedicated onboarding engineer
TrainingSelf-service docs2 training sessionsUnlimited training sessions
SLABest effort99.5% uptime99.9% uptime
Custom integrationsNot includedLimitedIncluded
Quarterly business reviewsNoNoYes

Integration Options​

ThreatWeaver integrates with existing security and IT operations tooling.

Vulnerability Data Sources​

IntegrationDirectionPurpose
Tenable.ioInbound syncAsset and vulnerability data import

Ticketing and Workflow​

IntegrationDirectionPurpose
JiraBi-directionalCreate and track remediation tickets
ServiceNowBi-directionalCreate and track remediation tickets

Notification and Alerting​

IntegrationDirectionPurpose
SlackOutboundScan completion and finding alerts
Microsoft TeamsOutboundScan completion and finding alerts
PagerDutyOutboundCritical vulnerability escalation
Email (SMTP)OutboundNotification delivery
Custom WebhooksOutboundAny HTTP endpoint for event-driven automation

CI/CD Pipeline​

IntegrationDirectionPurpose
GitHub ActionsBi-directionalTrigger scans, receive results, gate pipelines
GitLab CIOutboundPipeline correlation
Generic CI/CDOutboundWebhook-based scan triggering

Identity Providers​

IntegrationDirectionPurpose
SAML/SSOInboundSingle sign-on authentication
Active DirectoryInboundIdentity risk assessment (Identity Security module)
Entra ID (Azure AD)InboundIdentity risk assessment
OktaInbound (planned Q3 2026)Identity risk assessment
Google WorkspaceInbound (planned Q3 2026)Identity risk assessment

Export Formats​

FormatUse Case
PDFExecutive reports, compliance documentation
HTMLStyled reports for stakeholder distribution
JSONMachine-readable data for custom tooling
SARIF 2.1.0GitHub Code Scanning integration
CSVSpreadsheet analysis and custom reporting

Frequently Asked Questions​

Q: Can we start with SaaS and move to on-premises later? Yes. Your data can be exported and migrated to an on-premises instance. BluCypher provides migration assistance for Enterprise customers.

Q: Can scan sensors work without internet access? Sensors need outbound connectivity to the ThreatWeaver platform (SaaS or on-premises instance). They do not need direct internet access -- only access to the ThreatWeaver backend endpoint.

Q: What happens if the SaaS platform is down? Scan sensors continue queued work locally and sync results when connectivity is restored. Enterprise tier includes a 99.9% uptime SLA.

Q: Can we host in our own cloud (AWS/Azure/GCP)? Yes. The on-premises deployment option supports customer-managed cloud infrastructure. BluCypher provides deployment documentation and engineering support.

Q: What is the minimum deployment for evaluation? SaaS deployment with a Pro trial -- fully functional, no infrastructure setup required, available same day.