AttackTreeIsograph
|
||||||
Related Products
|
||||||
About
Model system vulnerability, identify weakspots and improve security using threat analysis and attack trees. Construct graphical representations of measures designed to reduce the consequences of a successful attack with mitigation trees. AttackTree allows users to define consequences and attach them to any gate within the attack tree. In this way, it is possible to model the consequences of successful attacks on the target system. Mitigation trees may be used to model the effects of mitigating measures on the consequences resulting from a successful attack. Our software has been in continuous development since the 1980s and is the recognized standard for safety and reliability professionals. Analyze threats according to standards such as ISO 26262, ISO/SAE 21434 and J3061. Identify where your system is vulnerable to an attack. Improve the security of your assets and IT systems. Model consequence mitigation.
|
About
For the last 10 years, our focus has been on ensuring we obliterate waste in document-driven processes. So you can spend less time shuffling paper, looking for lost documents, killing trees, and doing things the hard way. We believe that not all ideas are great ideas, and that it’s our duty to speak up when we hear one that’s not in your best interests. So you have happy, constructive and positive people to work with. We’re not interested in short-term decisions/strategies, no matter the potential payoff. The process of transferring information from paper to computer is often error-prone, simply because we’re human. Unfortunately, the second it takes to make a mistake requires a significantly longer time to unravel, and can result in serious financial consequences to your business. With 100% visibility of your AP function, you have a new era of control and security across your entire AP process – no matter where your team is working from.
|
|||||
Platforms Supported
Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook
|
Platforms Supported
Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook
|
|||||
Audience
Companies that want to check for vulnerabilities and improve security using attack trees
|
Audience
Document Management platform for companies
|
|||||
Support
Phone Support
24/7 Live Support
Online
|
Support
Phone Support
24/7 Live Support
Online
|
|||||
API
Offers API
|
API
Offers API
|
|||||
Screenshots and Videos |
Screenshots and Videos |
|||||
Pricing
No information available.
Free Version
Free Trial
|
Pricing
$500 one-time payment
Free Version
Free Trial
|
|||||
Reviews/
|
Reviews/
|
|||||
Training
Documentation
Webinars
Live Online
In Person
|
Training
Documentation
Webinars
Live Online
In Person
|
|||||
Company InformationIsograph
Founded: 1986
United Kingdom
www.isograph.com/software/attacktree/
|
Company InformationRedmap
Founded: 1998
Australia
www.redmap.com
|
|||||
Alternatives |
Alternatives |
|||||
|
|
|
|||||
|
|
|
|||||
|
|
|
|||||
|
|
||||||
Categories |
Categories |
|||||
Vulnerability Management Features
Asset Discovery
Asset Tagging
Network Scanning
Patch Management
Policy Management
Prioritization
Risk Management
Vulnerability Assessment
Web Scanning
|
Document Management Features
Access Controls
Archiving & Retention
Collaboration Tools
Compliance Tracking
Document Archiving
Document Assembly
Document Capture
Document Conversion
Document Delivery
Document Indexing
Document Retention
Electronic Signature
Email Management
File Recovery
File Type Conversion
Forms Management
Full Text Search
Offline Access
Optical Character Recognition
Print Management
Version Control
|
|||||
Integrations
No info available.
|
Integrations
No info available.
|
|||||
|
|
|