Resolve product security risks early with AI

Use Remy to discover upcoming engineering work, perform automatic triage and speed up your design reviews.

Book a demo
1. Updating Auth Methods: Disabling Old, Enabling New in Relevant Tables
Sent

Along with this, their previous auth methods will be marked enabled = 0 . 
For password based methods, it will be in authpassword table. For SSO/ SAML based methods, it will be in authaccount table.

AI Generated
Olivier Pomel
CEO, Datadog
Olivier Pomel
CEO, Datadog

Reduce cost, risk, and time with AI for security design reviews

Reduce cost by avoiding
 late remediations
Reduce risk with full visibility of engineering work being planned
Save time on back-and-forth with your developers

“Before Remy, we struggled to keep track of all the engineering projects that could potentially introduce risk. Remy provides us full visibility. The platform's ability to automatically identify and triage the highest-impact engineering proposals is allowing us to focus on mitigating risk in the design phase.”

Matthew Sullivan
Staff Security Engineer , 🥕 Instacart

Augment and scale
your product security team

Capabilities
Discover and triage
engineering plans

Manually tracking all risky engineering plans is overwhelming. This results in overlooked reviews and security flaws in production. Remy automatically discovers and triages engineering plans across your organization, guaranteeing early review coverage of risky engineering plans.

1. Updating Auth Methods: Disabling Old, Enabling New in Relevant Tables
Sent

Along with this, their previous auth methods will be marked enabled = 0 . 
For password based methods, it will be in authpassword table. For SSO/ SAML based methods, it will be in auth account table.

AI Generated
2. Marked enabled = 0
Sent

Along with this, their previous auth methods will be marked enabled = 0.

AI Generated
3. Password based methods
Sent

For password based methods, it will be in authpassword table. For SSO/ SAML based methods, it will be in authaccount table.

AI Generated
5 replies
Last reply today at 10:00 AM
1. Updating Auth Methods: Disabling Old, Enabling New in Relevant Tables
Sent

Along with this, their previous auth methods will be marked enabled = 0 . 
For password based methods, it will be in authpassword table. For SSO/ SAML based methods, it will be in auth account table.

AI Generated
2. Marked enabled = 0
Sent

Along with this, their previous auth methods will be marked enabled = 0.

AI Generated
3. Password based methods
Sent

For password based methods, it will be in authpassword table. For SSO/ SAML based methods, it will be in authaccount table.

AI Generated
5 replies
Last reply today at 10:00 AM
1. Updating Auth Methods: Disabling Old, Enabling New in Relevant Tables
Sent

Along with this, their previous auth methods will be marked enabled = 0 . 
For password based methods, it will be in authpassword table. For SSO/ SAML based methods, it will be in auth account table.

AI Generated
2. Marked enabled = 0
Sent

Along with this, their previous auth methods will be marked enabled = 0.

AI Generated
3. Password based methods
Sent

For password based methods, it will be in authpassword table. For SSO/ SAML based methods, it will be in authaccount table.

AI Generated
5 replies
Last reply today at 10:00 AM
Reduce back-and-forth to streamline reviews

Manually starting reviews is prone to delays and miscommunication. This leads to slow response times and insufficient documentation to start reviews. Remy automates review initiation and sends dynamic kick-off questions to engineering teams, ensuring streamlined review and speed SLAs.

1. Updating Auth Methods: Disabling Old, Enabling New in Relevant Tables
Sent

Along with this, their previous auth methods will be marked enabled = 0 . 
For password based methods, it will be in authpassword table. For SSO/ SAML based methods, it will be in auth account table.

AI Generated
2. Marked enabled = 0
Sent

Along with this, their previous auth methods will be marked enabled = 0.

AI Generated
3. Password based methods
Sent

For password based methods, it will be in authpassword table. For SSO/ SAML based methods, it will be in authaccount table.

AI Generated
5 replies
Last reply today at 10:00 AM
1. Updating Auth Methods: Disabling Old, Enabling New in Relevant Tables
Sent

Along with this, their previous auth methods will be marked enabled = 0 . 
For password based methods, it will be in authpassword table. For SSO/ SAML based methods, it will be in auth account table.

AI Generated
2. Marked enabled = 0
Sent

Along with this, their previous auth methods will be marked enabled = 0.

AI Generated
3. Password based methods
Sent

For password based methods, it will be in authpassword table. For SSO/ SAML based methods, it will be in authaccount table.

AI Generated
5 replies
Last reply today at 10:00 AM
1. Updating Auth Methods: Disabling Old, Enabling New in Relevant Tables
Sent

Along with this, their previous auth methods will be marked enabled = 0 . 
For password based methods, it will be in authpassword table. For SSO/ SAML based methods, it will be in auth account table.

AI Generated
2. Marked enabled = 0
Sent

Along with this, their previous auth methods will be marked enabled = 0.

AI Generated
3. Password based methods
Sent

For password based methods, it will be in authpassword table. For SSO/ SAML based methods, it will be in authaccount table.

AI Generated
5 replies
Last reply today at 10:00 AM
Use AI-generated questions and recommendations to save time

Manually coming up with questions is time consuming and inconsistent, leading to risk coverage gaps. Remy automatically generates pertinent questions based on context from your internal guidelines and policies to perform tailored, comprehensive and quick reviews every time.

1. Updating Auth Methods: Disabling Old, Enabling New in Relevant Tables
Sent

Along with this, their previous auth methods will be marked enabled = 0 . 
For password based methods, it will be in authpassword table. For SSO/ SAML based methods, it will be in auth account table.

AI Generated
2. Marked enabled = 0
Sent

Along with this, their previous auth methods will be marked enabled = 0.

AI Generated
3. Password based methods
Sent

For password based methods, it will be in authpassword table. For SSO/ SAML based methods, it will be in authaccount table.

AI Generated
5 replies
Last reply today at 10:00 AM
1. Updating Auth Methods: Disabling Old, Enabling New in Relevant Tables
Sent

Along with this, their previous auth methods will be marked enabled = 0 . 
For password based methods, it will be in authpassword table. For SSO/ SAML based methods, it will be in auth account table.

AI Generated
2. Marked enabled = 0
Sent

Along with this, their previous auth methods will be marked enabled = 0.

AI Generated
3. Password based methods
Sent

For password based methods, it will be in authpassword table. For SSO/ SAML based methods, it will be in authaccount table.

AI Generated
5 replies
Last reply today at 10:00 AM
1. Updating Auth Methods: Disabling Old, Enabling New in Relevant Tables
Sent

Along with this, their previous auth methods will be marked enabled = 0 . 
For password based methods, it will be in authpassword table. For SSO/ SAML based methods, it will be in auth account table.

AI Generated
2. Marked enabled = 0
Sent

Along with this, their previous auth methods will be marked enabled = 0.

AI Generated
3. Password based methods
Sent

For password based methods, it will be in authpassword table. For SSO/ SAML based methods, it will be in authaccount table.

AI Generated
5 replies
Last reply today at 10:00 AM

Book a demo to learn more

Book a demo

Get clear metrics and audit trails

See the review coverage and risk profile of every team

Manual reviews processes don’t generate data-driven insights. This leads to a failure in recognizing patterns and showing review value at scale. Remy uses its comprehensive data to offer insights allowing product security teams to learn from past reviews and clearly demonstrate their business value.

Track every communication and action

It's difficult to perform root cause analysis on incidents without clear review records. This prevents you from learning from incidents and providing review evidence. By maintaining comprehensive audit records, Remy enables clear retrospectives to serve as evidence for incident response or compliance audits.

1. Updating Auth Methods: Disabling Old, Enabling New in Relevant Tables
Sent

Along with this, their previous auth methods will be marked enabled = 0 . 
For password based methods, it will be in authpassword table. For SSO/ SAML based methods, it will be in auth account table.

AI Generated
2. Marked enabled = 0
Sent

Along with this, their previous auth methods will be marked enabled = 0.

AI Generated
3. Password based methods
Sent

For password based methods, it will be in authpassword table. For SSO/ SAML based methods, it will be in authaccount table.

AI Generated
5 replies
Last reply today at 10:00 AM
1. Updating Auth Methods: Disabling Old, Enabling New in Relevant Tables
Sent

Along with this, their previous auth methods will be marked enabled = 0 . 
For password based methods, it will be in authpassword table. For SSO/ SAML based methods, it will be in auth account table.

AI Generated
2. Marked enabled = 0
Sent

Along with this, their previous auth methods will be marked enabled = 0.

AI Generated
3. Password based methods
Sent

For password based methods, it will be in authpassword table. For SSO/ SAML based methods, it will be in authaccount table.

AI Generated
5 replies
Last reply today at 10:00 AM
1. Updating Auth Methods: Disabling Old, Enabling New in Relevant Tables
Sent

Along with this, their previous auth methods will be marked enabled = 0 . 
For password based methods, it will be in authpassword table. For SSO/ SAML based methods, it will be in auth account table.

AI Generated
2. Marked enabled = 0
Sent

Along with this, their previous auth methods will be marked enabled = 0.

AI Generated
3. Password based methods
Sent

For password based methods, it will be in authpassword table. For SSO/ SAML based methods, it will be in authaccount table.

AI Generated
5 replies
Last reply today at 10:00 AM

Enterprise ready

SSO for convenient logins for your employees

We are a team of security nerds, so of course we include SAML 2.0 SSO out of the box.

Ready for a simple 
vendor review process

Between our SOC2 Type II certification, excellent business insurance, and experience procuring software for large enterprises, we will meet your requirements without annoying delays.

Built for scale and customization

We know that no two enterprises are the same, so Remy is built with both scale and configuration top-of-mind to integrate with your existing processes.

FAQ

What’s the benefit of using Remy over taking inbound review requests?

It comes down to coverage. Inbound reviews from relationships with engineers is excellent, but it leaves you without coverage guarantees. With Remy, you will have awareness of every risky engineering project in the pipeline, not just the ones that engineers clue you in on.

Will you sell our data?

No. We will never sell your data, or use your data to train models for other customers.

Is this a threat modeling tool?

It depends on what you mean by threat modeling. We do not believe in pushing complicated and cumbersome data flow diagram requirements on engineering teams, or going through tedious threat modeling frameworks manually. So from that perspective, Remy is not a threat modeling tool.

Instead, Remy works by using the documentation already available, and asking highly specific questions based on that information. So in the basic sense, yes! Remy is a tool that helps you figure out what is being worked on, what could go wrong, what’s being done to prevent it, and how good of a job was done.

How will Remy impact the relationships we’ve built with engineering teams?

Positively, or not at all. Remy is not built to reduce your communications to robotic and transactional workflows. Rather, our goal is to augment your existing relationships and processes by automating only the more rote and tedious parts. Here are some examples for how we maintain personal relationships with engineering teams:

1. You can configure the tone and copy sent by Remy to your heart’s content.
2. If you have existing security leads assigned to different product verticals, we can configure Remy to sign off messages in your name.
3. If you have more rapport with some engineering teams, and less with others, we can ensure Remy is rolled out to just the teams where Remy will be helpful, while staying out of the way where it won’t.

Is there really enough information in tickets and specs to do reviews on?

Yes! Although no two companies are the same, in our experience security teams are often surprised by the level of documentation available that they just never get access to. Still, sometimes there just isn’t enough, and Remy handles that situation too by simply asking follow-up questions to cover the missing information. 

We support most kinds of engineering and product design documents, including:
- PRDs (Product requirements documents)
- ERDs (Engineering requirements documents)
- RFD/Cs (Request for discussion/comments)
- Engineering/feature specifications
- Jira tickets
- ServiceNow epics

In the near future, we will also support architectural diagrams and Figma mockups.

Can Remy replace security architects?

No. Remy is a tool that augments security engineers and architects, but we don’t replace them. Although Remy is highly appropriate for helping product teams self-serve low risk reviews, we reserve high-risk reviews for the experts, and instead ensure Remy is there for support and automating tedium. 

What’s with the meerkats? 🤔

When we founded Remy, we didn’t want to go with the usual iconography of scary watchdogs, towers or shields. We believe security should be a friendly, approachable and cooperative discipline. So we chose an animal known for its vigilance, teamwork and adaptability: the meerkat. 

Did you know that meerkats’ sentinels use different sounds to communicate different kinds of threats to the community, depending on whether it stems from land or air? 

If you want to learn more obscure meerkat facts, get in touch!

Book a Demo to Scale Your Product Security

Remy can be set up in less than
an hour of work in 4 simple steps:

1
Book a call with the founders to set up a pilot
2
Give Remy access to your preferred sources
3
Upload select security policies and guidelines
4
Configure your triage settings
Book a demo