AttackTreeIsograph
|
CryptoSentrySentryBay
|
|||||
Related Products
|
||||||
About
Model system vulnerability, identify weakspots and improve security using threat analysis and attack trees. Construct graphical representations of measures designed to reduce the consequences of a successful attack with mitigation trees. AttackTree allows users to define consequences and attach them to any gate within the attack tree. In this way, it is possible to model the consequences of successful attacks on the target system. Mitigation trees may be used to model the effects of mitigating measures on the consequences resulting from a successful attack. Our software has been in continuous development since the 1980s and is the recognized standard for safety and reliability professionals. Analyze threats according to standards such as ISO 26262, ISO/SAE 21434 and J3061. Identify where your system is vulnerable to an attack. Improve the security of your assets and IT systems. Model consequence mitigation.
|
About
CryptoSentry stops ransomware. Once installed on your employees’ devices, it will constantly monitor for suspicious encryption activity. Ransomware is the fastest growing cyber threat in recent years and it will affect your business unless you take action to stop the encryption of files before you are targeted. News headlines are frequently dominated by the damaging consequences of the latest ransomware attack from WannaCry, Petya and CryptoWall to CryptoLocker and Locky, and other less known variants which have had a significant impact on productivity and finance. Because ransomware is an attack on the availability of data, our CryptoSentry solution is designed to prevent it from getting access to data so it can encrypt files. Once installed on your employees’ devices, it will constantly monitor for suspicious encryption activity. If its algorithms determine a threat, it will proactively prevent file encryption.
|
|||||
Platforms Supported
Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook
|
Platforms Supported
Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook
|
|||||
Audience
Companies that want to check for vulnerabilities and improve security using attack trees
|
Audience
Individuals, businesses and companies requiring a tool to monitor for suspicious encryption activity
|
|||||
Support
Phone Support
24/7 Live Support
Online
|
Support
Phone Support
24/7 Live Support
Online
|
|||||
API
Offers API
|
API
Offers API
|
|||||
Screenshots and Videos |
Screenshots and Videos |
|||||
Pricing
No information available.
Free Version
Free Trial
|
Pricing
No information available.
Free Version
Free Trial
|
|||||
Reviews/
|
Reviews/
|
|||||
Training
Documentation
Webinars
Live Online
In Person
|
Training
Documentation
Webinars
Live Online
In Person
|
|||||
Company InformationIsograph
Founded: 1986
United Kingdom
www.isograph.com/software/attacktree/
|
Company InformationSentryBay
Founded: 2002
United Kingdom
www.sentrybay.com/products/cryptosentry
|
|||||
Alternatives |
Alternatives |
|||||
|
|
||||||
|
|
|
|||||
|
|
|
|||||
|
|
||||||
Categories |
Categories |
|||||
Vulnerability Management Features
Asset Discovery
Asset Tagging
Network Scanning
Patch Management
Policy Management
Prioritization
Risk Management
Vulnerability Assessment
Web Scanning
|
||||||
Integrations
No info available.
|
Integrations
No info available.
|
|||||
|
|
|