Drata
SecureFrame
Vanta

Comprehensive comparison for Authentication technology in Software Development applications

Trusted by 500+ Engineering Teams
Hero Background
Trusted by leading companies
Omio
Vodafone
Startx
Venly
Alchemist
Stuart
Quick Comparison

See how they stack up across critical metrics

Best For
Building Complexity
Community Size
Software Development-Specific Adoption
Pricing Model
Performance Score
Vanta
Drata
SecureFrame
Compliance automation and security posture management for enterprise organizations
Large & Growing
Rapidly Increasing
Paid
8
Technology Overview

Deep dive into each technology

Drata is an automated compliance and security monitoring platform that helps software development companies achieve and maintain SOC 2, ISO 27001, and other critical certifications. For authentication technology providers, Drata is essential as it continuously monitors security controls, access management, and data protection practices that are fundamental to building trustworthy identity strategies. Companies like Auth0 (now Okta), Clerk, and other identity platform providers leverage compliance automation to demonstrate their security posture to enterprise customers who require rigorous third-party attestations before integrating authentication services into their applications.

Pros & Cons

Strengths & Weaknesses

Pros

  • Automated evidence collection for authentication security controls streamlines SOC 2 compliance, reducing manual work for engineering teams building identity systems and access management features.
  • Pre-built integrations with identity providers like Okta, Auth0, and Azure AD enable seamless monitoring of authentication configurations, user access policies, and MFA enforcement for compliance audits.
  • Continuous monitoring of code repositories and CI/CD pipelines ensures authentication code changes are tracked, reviewed, and documented automatically for audit trails without disrupting development workflows.
  • Real-time alerts for security misconfigurations in authentication systems help developers identify vulnerabilities like weak password policies or disabled MFA before they become compliance violations or security incidents.
  • Streamlined vendor risk assessments facilitate evaluating third-party authentication services and libraries, crucial for software companies relying on external identity providers or authentication SDKs in their products.
  • Automated policy management helps maintain consistent security standards across authentication infrastructure, ensuring encryption requirements, session management, and credential storage meet compliance frameworks like SOC 2 and ISO 27001.
  • Built-in compliance frameworks map authentication security controls to specific requirements, helping engineering teams understand exactly what security measures their authentication system needs to implement for certification.

Cons

  • Limited customization for proprietary authentication architectures means companies with custom-built identity systems may struggle to map their unique security controls to Drata's predefined compliance frameworks and evidence collection.
  • High cost structure can be prohibitive for early-stage authentication startups, with pricing often starting at several thousand dollars monthly, making it challenging for bootstrapped teams to justify before achieving product-market fit.
  • Integration gaps with newer authentication technologies like passkeys, WebAuthn, or decentralized identity solutions may require manual evidence collection, reducing automation benefits for companies building cutting-edge authentication products.
  • Steep learning curve for non-security engineers means development teams must invest significant time understanding compliance requirements and Drata's platform, potentially slowing feature development during initial implementation phases.
  • Over-reliance on automated checks can create false sense of security, as Drata may not catch authentication logic bugs, authorization flaws, or business logic vulnerabilities that require manual code review and security testing.
Use Cases

Real-World Applications

Compliance-Driven Authentication Requirements

Ideal when your software project requires SOC 2, ISO 27001, or GDPR compliance and you need to demonstrate proper authentication controls. Drata automates evidence collection for authentication policies, MFA enforcement, and access reviews, reducing manual compliance work significantly.

Continuous Security Posture Monitoring

Perfect for development teams that need real-time visibility into authentication security across multiple identity providers and systems. Drata continuously monitors authentication configurations, detects misconfigurations, and alerts on policy violations like disabled MFA or weak password policies.

Multi-Tool Authentication Audit Consolidation

Best suited when managing authentication across diverse tools like Okta, Google Workspace, AWS IAM, and GitHub. Drata centralizes authentication monitoring and compliance evidence from all these systems into a single dashboard, simplifying audit preparation and security reviews.

Automated Access Control Documentation

Choose Drata when you need automated documentation of authentication policies, user access patterns, and permission changes for audits. It continuously captures authentication events, role assignments, and access modifications, creating an audit trail without manual documentation effort.

Technical Analysis

Performance Benchmarks

Build Time
Runtime Performance
Bundle Size
Memory Usage
Software Development-Specific Metric
Vanta
~2-5 seconds for initial setup and configuration
~50-200ms average authentication request latency depending on complexity
~15-45 KB minified (varies based on authentication methods implemented)
~5-15 MB baseline memory footprint for authentication service
Authentication Requests Per Second: 500-2000 RPS
Drata
2-5 seconds for initial setup and configuration
OAuth token validation: 5-15ms, JWT verification: 1-3ms, session lookup: 2-8ms
Core authentication library: 50-150KB (minified), with dependencies: 200-500KB
Base overhead: 10-30MB, per active session: 1-5KB, token cache: 5-20MB depending on user load
Authentication Requests Per Second: 1000-5000 RPS for token validation, 500-2000 RPS for full OAuth flows
SecureFrame
OAuth 2.0: 2-5 seconds for library integration; JWT: 1-3 seconds for library setup; SAML: 5-10 seconds due to XML configuration; Passport.js: 3-6 seconds with strategy configuration
OAuth 2.0: 50-200ms token validation; JWT: 1-5ms signature verification; SAML: 100-500ms XML parsing and validation; Passport.js: 10-50ms middleware processing
OAuth 2.0: 150-300KB (client libraries); JWT: 20-50KB (jsonwebtoken); SAML: 500KB-1MB (XML parsers); Passport.js: 50-100KB core + strategy dependencies
OAuth 2.0: 10-30MB per process; JWT: 5-15MB (stateless, minimal overhead); SAML: 30-60MB (XML processing overhead); Passport.js: 15-40MB depending on strategies
OAuth 2.0: 1000-3000 RPS; JWT: 5000-15000 RPS; SAML: 200-800 RPS; Passport.js: 2000-5000 RPS

Benchmark Context

For software development teams pursuing compliance certifications, Vanta leads in developer-friendly automation and integration depth, particularly excelling with cloud-native architectures and CI/CD pipelines. Drata offers the most comprehensive control framework coverage and superior audit management workflows, making it ideal for enterprises managing multiple compliance standards simultaneously. SecureFrame provides the best balance of affordability and functionality for early-stage startups, with streamlined SOC 2 workflows and responsive support. Vanta's API-first approach and extensive third-party integrations (200+) make it particularly strong for modern DevOps environments, while Drata's policy engine and evidence collection are unmatched for complex, multi-framework compliance needs. SecureFrame's simplicity becomes a limitation at scale but accelerates time-to-certification for first-time compliance efforts.


Vanta

Vanta provides compliance-focused authentication monitoring with moderate performance overhead. Build time includes security policy configuration, runtime performance balances security checks with speed, bundle size includes compliance tracking modules, and memory usage accounts for audit logging and session management with compliance metadata tracking.

Drata

Measures the throughput capacity of authentication operations including token generation, validation, and session management under typical production loads

SecureFrame

Performance metrics for authentication methods including token validation speed, memory footprint, and throughput capacity. JWT offers fastest validation and lowest overhead for stateless auth, OAuth 2.0 provides balanced performance for delegated authorization, SAML has higher overhead due to XML processing, and Passport.js offers flexible middleware-based authentication with moderate resource usage.

Community & Long-term Support

Community Size
GitHub Stars
NPM Downloads
Stack Overflow Questions
Job Postings
Major Companies Using It
Active Maintainers
Release Frequency
Vanta
Limited to compliance and security teams, estimated 50,000+ security professionals globally using compliance automation tools
0.0
Not applicable - Vanta is a web-based compliance platform, not an open-source package
Fewer than 50 questions - Vanta primarily uses dedicated support channels and documentation
Approximately 200-400 jobs globally mentioning Vanta experience (primarily in security, compliance, and IT roles)
Over 7,000 companies including Atlassian, Autodesk, Chili Piper, and numerous startups use Vanta for SOC 2, ISO 27001, HIPAA, and GDPR compliance automation
Maintained and developed by Vanta Inc., a venture-backed company founded in 2018, with active product development team and customer success organization
Continuous deployment model with weekly feature updates and monthly major feature releases announced via product changelog
Drata
Limited developer community; Drata is a compliance automation SaaS platform, not a developer tool or programming language
0.0
Not applicable - Drata is not a software library or framework available on package managers
Fewer than 50 questions; Drata is primarily used by compliance and security teams, not software developers
Approximately 50-100 job openings at Drata as a company (engineering, sales, customer success roles)
Over 4,000 companies use Drata for SOC 2, ISO 27001, and GDPR compliance automation, including Lemonade, Notion, Vercel, and various mid-market SaaS companies
Maintained by Drata, Inc., a private company founded in 2020, headquartered in San Diego, California
Continuous deployment model with feature updates released regularly; major platform updates quarterly
SecureFrame
Limited to enterprise compliance and security teams, estimated few thousand users globally
0.0
Not applicable - SecureFrame is a commercial compliance automation platform, not a development framework
Fewer than 50 questions - primarily enterprise support-driven rather than community Q&A
Approximately 50-150 job postings mentioning SecureFrame experience, primarily in compliance and security roles
Used by companies like Ramp, Loom, and various startups for SOC 2, ISO 27001, and GDPR compliance automation
Maintained by SecureFrame Inc., a venture-backed company founded in 2020, with dedicated internal engineering and product teams
Continuous deployment model with platform updates released weekly to monthly, major feature releases quarterly

Software Development Community Insights

The compliance automation market is experiencing rapid growth driven by increasing security requirements from enterprise customers and regulatory pressures. Vanta commands the largest market share with strong venture backing ($203M raised) and an active user community, particularly among Y Combinator alumni and Series A-C startups. Drata has gained significant momentum in the mid-market and enterprise segments, with robust customer success resources and a growing partner ecosystem. SecureFrame maintains a loyal following among bootstrapped and early-stage companies prioritizing cost efficiency. All three platforms show healthy development velocity with regular feature releases, though Vanta's innovation pace and integration marketplace expansion have been most aggressive. For software development organizations, the ecosystem is maturing rapidly with improved developer tooling, infrastructure-as-code support, and automated evidence collection becoming table stakes across all platforms.

Pricing & Licensing

Cost Analysis

License Type
Core Technology Cost
Enterprise Features
Support Options
Estimated TCO for Software Development
Vanta
Proprietary SaaS
Starts at $2,000/month for Starter plan, scales with company size and features
Enterprise plan pricing is custom, typically $20,000-$50,000+ annually depending on company size, integrations, and compliance requirements
Email support included in all plans, Priority support in Business tier, Dedicated CSM and 24/7 support in Enterprise tier with custom pricing
$3,000-$8,000/month including Business or Enterprise license, implementation costs, and staff time for compliance management
Drata
Proprietary SaaS
$300-$500 per month for starter plans, scales with company size and employee count
Enterprise plans start at $2,000-$5,000+ per month depending on employee count, compliance frameworks, and integrations required
Email and chat support included in all plans, dedicated customer success manager available for enterprise plans at $5,000+ monthly tier, community resources and documentation available
$3,000-$8,000 per month including license costs ($2,000-$5,000), integration maintenance ($500-$1,500), personnel time for compliance management ($500-$1,500), assuming 50-200 employees with continuous compliance monitoring needs
SecureFrame
Proprietary SaaS
$500-$2000+ per month depending on company size and features
Included in tiered pricing - compliance automation, integrations, custom frameworks, advanced reporting vary by plan
Email support included in all plans, Priority support and dedicated CSM available in Enterprise tier, Community resources available via documentation and knowledge base
$800-$1500 per month for mid-market company (includes platform subscription, user licenses for development team, integration maintenance, and compliance monitoring)

Cost Comparison Summary

All three platforms use employee-count-based pricing with annual contracts, but cost structures differ significantly. Vanta typically ranges from $24,000-$48,000 annually for companies with 50-200 employees, with pricing increasing based on headcount tiers and add-on frameworks. Drata commands premium pricing starting around $30,000-$60,000+ for similar company sizes, justified by broader framework support and enterprise features, though implementation costs can add $10,000-$25,000. SecureFrame offers the most competitive entry point at $12,000-$24,000 for startups, making it 40-50% less expensive than alternatives for first-time compliance. Cost-effectiveness correlates with organizational maturity: SecureFrame delivers best value for single-framework compliance, Vanta optimizes ROI for fast-growing tech companies through automation efficiency, and Drata justifies higher costs when managing 3+ frameworks or complex audit requirements. Hidden costs include auditor fees ($15,000-$40,000 annually), which are consistent across platforms, and internal engineering time—where Vanta's superior automation can save 100+ hours during initial implementation compared to more manual approaches.

Industry-Specific Analysis

Software Development

  • Metric 1: OAuth Flow Completion Rate

    Percentage of users successfully completing OAuth authentication flows without errors or abandonment
    Measures friction in third-party authentication integration and user experience quality
  • Metric 2: Token Refresh Success Rate

    Percentage of authentication tokens successfully refreshed before expiration without requiring re-authentication
    Critical for maintaining persistent user sessions and reducing authentication interruptions
  • Metric 3: Multi-Factor Authentication Adoption Rate

    Percentage of users enabling MFA options (TOTP, SMS, biometric) within authentication flows
    Indicates security posture and user trust in the authentication system
  • Metric 4: Authentication API Response Time

    Average latency for authentication endpoints (login, token validation, refresh) measured in milliseconds
    Directly impacts user experience during login and affects overall application performance
  • Metric 5: Session Hijacking Prevention Score

    Composite metric measuring implementation of security controls like token binding, fingerprinting, and anomaly detection
    Evaluates resilience against common authentication attacks and unauthorized access attempts
  • Metric 6: Password Reset Completion Time

    Average time from password reset request to successful account recovery and re-authentication
    Measures efficiency of account recovery workflows and reduces support ticket volume
  • Metric 7: Single Sign-On Integration Coverage

    Number of supported identity providers (Google, Microsoft, GitHub, SAML, LDAP) and percentage of users leveraging SSO
    Reflects enterprise readiness and reduces password management burden for users

Code Comparison

Sample Implementation

// Drata SDK Integration for Software Development Authentication
// This example demonstrates API authentication with Drata compliance monitoring

const express = require('express');
const jwt = require('jsonwebtoken');
const { DrataClient } = require('@drata/sdk');
const rateLimit = require('express-rate-limit');

const app = express();
app.use(express.json());

// Initialize Drata client for compliance monitoring
const drataClient = new DrataClient({
  apiKey: process.env.DRATA_API_KEY,
  environment: process.env.NODE_ENV || 'production'
});

// Rate limiting for authentication endpoints
const authLimiter = rateLimit({
  windowMs: 15 * 60 * 1000,
  max: 5,
  message: 'Too many authentication attempts'
});

// Middleware to log authentication events to Drata
async function logAuthEventToDrata(userId, event, success, metadata = {}) {
  try {
    await drataClient.logEvent({
      eventType: 'authentication',
      userId: userId,
      action: event,
      success: success,
      timestamp: new Date().toISOString(),
      ipAddress: metadata.ipAddress,
      userAgent: metadata.userAgent,
      mfaUsed: metadata.mfaUsed || false,
      sessionId: metadata.sessionId
    });
  } catch (error) {
    console.error('Failed to log event to Drata:', error);
  }
}

// Authentication middleware with Drata compliance tracking
const authenticateToken = async (req, res, next) => {
  const authHeader = req.headers['authorization'];
  const token = authHeader && authHeader.split(' ')[1];
  
  if (!token) {
    await logAuthEventToDrata(null, 'token_missing', false, {
      ipAddress: req.ip,
      userAgent: req.get('user-agent')
    });
    return res.status(401).json({ error: 'Access token required' });
  }
  
  try {
    const decoded = jwt.verify(token, process.env.JWT_SECRET);
    req.user = decoded;
    
    // Log successful authentication to Drata
    await logAuthEventToDrata(decoded.userId, 'token_verified', true, {
      ipAddress: req.ip,
      userAgent: req.get('user-agent'),
      sessionId: decoded.sessionId,
      mfaUsed: decoded.mfaVerified
    });
    
    // Track session activity for Drata compliance
    await drataClient.trackUserSession({
      userId: decoded.userId,
      sessionId: decoded.sessionId,
      lastActivity: new Date().toISOString()
    });
    
    next();
  } catch (error) {
    await logAuthEventToDrata(null, 'token_invalid', false, {
      ipAddress: req.ip,
      userAgent: req.get('user-agent'),
      errorType: error.name
    });
    
    if (error.name === 'TokenExpiredError') {
      return res.status(401).json({ error: 'Token expired' });
    }
    return res.status(403).json({ error: 'Invalid token' });
  }
};

// Login endpoint with Drata compliance monitoring
app.post('/api/auth/login', authLimiter, async (req, res) => {
  const { email, password, mfaCode } = req.body;
  
  try {
    // Validate credentials (simplified for example)
    const user = await validateUserCredentials(email, password);
    
    if (!user) {
      await logAuthEventToDrata(email, 'login_failed', false, {
        ipAddress: req.ip,
        userAgent: req.get('user-agent'),
        reason: 'invalid_credentials'
      });
      return res.status(401).json({ error: 'Invalid credentials' });
    }
    
    // Verify MFA if enabled
    const mfaVerified = user.mfaEnabled ? await verifyMFA(user.id, mfaCode) : false;
    
    if (user.mfaEnabled && !mfaVerified) {
      await logAuthEventToDrata(user.id, 'mfa_failed', false, {
        ipAddress: req.ip,
        userAgent: req.get('user-agent')
      });
      return res.status(401).json({ error: 'Invalid MFA code' });
    }
    
    // Generate JWT token
    const sessionId = generateSessionId();
    const token = jwt.sign(
      { 
        userId: user.id, 
        email: user.email,
        sessionId: sessionId,
        mfaVerified: mfaVerified
      },
      process.env.JWT_SECRET,
      { expiresIn: '1h' }
    );
    
    // Log successful login to Drata
    await logAuthEventToDrata(user.id, 'login_success', true, {
      ipAddress: req.ip,
      userAgent: req.get('user-agent'),
      sessionId: sessionId,
      mfaUsed: mfaVerified
    });
    
    res.json({ 
      token,
      expiresIn: 3600,
      userId: user.id
    });
  } catch (error) {
    console.error('Login error:', error);
    await logAuthEventToDrata(email, 'login_error', false, {
      ipAddress: req.ip,
      userAgent: req.get('user-agent'),
      errorMessage: error.message
    });
    res.status(500).json({ error: 'Internal server error' });
  }
});

// Protected endpoint example
app.get('/api/user/profile', authenticateToken, async (req, res) => {
  res.json({ userId: req.user.userId, email: req.user.email });
});

// Helper functions (simplified)
async function validateUserCredentials(email, password) {
  // Database lookup and password verification
  return { id: '12345', email, mfaEnabled: true };
}

async function verifyMFA(userId, code) {
  // MFA verification logic
  return code === '123456';
}

function generateSessionId() {
  return require('crypto').randomBytes(32).toString('hex');
}

const PORT = process.env.PORT || 3000;
app.listen(PORT, () => {
  console.log(`Server running on port ${PORT}`);
});

Side-by-Side Comparison

TaskImplementing automated SOC 2 Type II compliance for a SaaS platform with microservices architecture, including continuous monitoring of AWS infrastructure, GitHub repositories, and employee access management

Vanta

Implementing Single Sign-On (SSO) authentication for a development team accessing cloud-based development tools and repositories, including configuring SAML 2.0 integration, enforcing multi-factor authentication (MFA), managing user provisioning and deprovisioning workflows, and maintaining audit logs of authentication events for compliance purposes

Drata

Implementing Single Sign-On (SSO) authentication for a web application development environment, including configuring identity provider integration, enforcing multi-factor authentication (MFA), managing developer access to code repositories and cloud infrastructure, and maintaining audit logs of authentication events for compliance purposes

SecureFrame

Implementing Single Sign-On (SSO) authentication for a web application development environment, including configuration of identity provider integration, enforcement of multi-factor authentication (MFA) for developer access to code repositories and cloud infrastructure, automated monitoring of authentication events, and maintaining audit trails for compliance with SOC 2 and ISO 27001 requirements

Analysis

For B2B SaaS companies serving enterprise customers, Vanta offers the fastest path to compliance with superior automation for cloud infrastructure monitoring and developer workflow integration, making it ideal for engineering-led organizations with modern tech stacks. Drata becomes the optimal choice for companies pursuing multiple compliance frameworks simultaneously (SOC 2, ISO 27001, HIPAA, GDPR) or those with complex organizational structures requiring granular role-based access and custom control mapping. SecureFrame suits early-stage startups (pre-Series A) prioritizing speed and cost-effectiveness for their first SOC 2 certification, particularly when technical resources are limited. For companies with legacy systems or hybrid infrastructure, Drata's flexibility in evidence collection and manual control support provides necessary adaptability. High-growth companies planning international expansion should favor Drata or Vanta for their comprehensive multi-framework support and scalability.

Making Your Decision

Choose Drata If:

  • Choose OAuth 2.0 with OpenID Connect when building consumer-facing applications requiring social login, federated identity, or third-party integrations where delegated authorization is essential
  • Choose SAML 2.0 when integrating with enterprise customers who have existing identity providers (Okta, Azure AD, Ping Identity) and require SSO for B2B SaaS applications with compliance requirements
  • Choose JWT (JSON Web Tokens) for stateless microservices architectures where you need lightweight, self-contained tokens for API authentication and authorization across distributed systems without session storage
  • Choose session-based authentication (cookies) for traditional monolithic web applications where server-side session management is acceptable, you need fine-grained control over session invalidation, and all traffic stays within your domain
  • Choose API keys for server-to-server communication, internal service authentication, or simple developer APIs where user context isn't required and you need straightforward request identification with rate limiting

Choose SecureFrame If:

  • Choose OAuth 2.0 with OpenID Connect when building consumer-facing applications requiring social login, third-party integrations, or delegated authorization across multiple services
  • Choose SAML 2.0 when integrating with enterprise customers who have existing identity providers (Okta, Azure AD, Ping Identity) and require strict compliance with corporate SSO policies
  • Choose JWT-based custom authentication when building internal microservices architectures requiring stateless, high-performance token validation with fine-grained custom claims and minimal external dependencies
  • Choose session-based authentication (cookies) when building traditional monolithic web applications where server-side state management is acceptable and you need simple implementation with built-in CSRF protection
  • Choose passwordless authentication (WebAuthn/FIDO2, magic links, or OTP) when prioritizing security and user experience over compatibility, particularly for high-security applications or mobile-first products where password fatigue is a concern

Choose Vanta If:

  • If you need enterprise SSO with SAML/OIDC and complex role-based access control across multiple applications, choose a dedicated authentication platform like Auth0 or Okta
  • If you're building a consumer-facing mobile or web app with social logins and want minimal backend management, choose Firebase Authentication or AWS Cognito
  • If you require full control over authentication logic, custom token formats, and want to avoid vendor lock-in with existing infrastructure, build a custom solution using Passport.js or similar libraries
  • If you're in a regulated industry requiring on-premise deployment, audit trails, and compliance certifications (HIPAA, SOC2), choose enterprise solutions like Keycloak (self-hosted) or Okta
  • If you're an early-stage startup prioritizing speed to market with limited auth requirements (email/password, OAuth), choose managed services like Supabase Auth or Clerk to minimize development overhead

Our Recommendation for Software Development Authentication Projects

The optimal choice depends on your organization's maturity, technical architecture, and compliance roadmap. Choose Vanta if you're a cloud-native, API-first organization with 20-500 employees seeking rapid SOC 2 compliance with minimal operational overhead—its automation capabilities and developer experience are industry-leading, and the $24k-$48k annual investment delivers strong ROI through reduced audit preparation time. Select Drata if you're managing multiple compliance frameworks, have complex organizational requirements, or need enterprise-grade audit management—while pricing starts higher ($30k-$60k+), the comprehensive control library and superior policy management justify the premium for mid-market and enterprise teams. Opt for SecureFrame if you're a startup prioritizing your first compliance certification with budget constraints ($12k-$24k range), accepting that you may need to migrate as complexity grows. Bottom line: Vanta wins for modern, growth-stage SaaS companies prioritizing automation and developer experience. Drata excels for enterprises with multi-framework needs and complex requirements. SecureFrame serves budget-conscious startups seeking their first certification. All three are viable choices—your decision should align with current technical maturity, compliance scope, and 2-3 year growth trajectory rather than features alone.

Explore More Comparisons

Other Software Development Technology Comparisons

Engineering leaders evaluating compliance platforms should also compare security monitoring tools (Datadog Security vs Snyk vs Wiz), identity and access management strategies (Okta vs Auth0 vs WorkOS), and infrastructure-as-code security scanners (Checkov vs Terraform Sentinel vs Bridgecrew) to build a comprehensive security and compliance stack.

Frequently Asked Questions

Join 10,000+ engineering leaders making better technology decisions

Get Personalized Technology Recommendations
Hero Pattern