AttackTree

AttackTree

Isograph
+
+

Related Products

  • Reflectiz
    18 Ratings
    Visit Website
  • Criminal IP ASM
    18 Ratings
    Visit Website
  • Guardz
    109 Ratings
    Visit Website
  • ManageEngine Endpoint Central
    2,683 Ratings
    Visit Website
  • ESET PROTECT Advanced
    2,249 Ratings
    Visit Website
  • SOCRadar Extended Threat Intelligence
    101 Ratings
    Visit Website
  • RaimaDB
    12 Ratings
    Visit Website
  • NinjaOne
    4,573 Ratings
    Visit Website
  • A10 Defend Threat Control
    41 Ratings
    Visit Website
  • Jscrambler
    38 Ratings
    Visit Website

About

Model system vulnerability, identify weakspots and improve security using threat analysis and attack trees. Construct graphical representations of measures designed to reduce the consequences of a successful attack with mitigation trees. AttackTree allows users to define consequences and attach them to any gate within the attack tree. In this way, it is possible to model the consequences of successful attacks on the target system. Mitigation trees may be used to model the effects of mitigating measures on the consequences resulting from a successful attack. Our software has been in continuous development since the 1980s and is the recognized standard for safety and reliability professionals. Analyze threats according to standards such as ISO 26262, ISO/SAE 21434 and J3061. Identify where your system is vulnerable to an attack. Improve the security of your assets and IT systems. Model consequence mitigation.

About

For the last 10 years, our focus has been on ensuring we obliterate waste in document-driven processes. So you can spend less time shuffling paper, looking for lost documents, killing trees, and doing things the hard way. We believe that not all ideas are great ideas, and that it’s our duty to speak up when we hear one that’s not in your best interests. So you have happy, constructive and positive people to work with. We’re not interested in short-term decisions/strategies, no matter the potential payoff. The process of transferring information from paper to computer is often error-prone, simply because we’re human. Unfortunately, the second it takes to make a mistake requires a significantly longer time to unravel, and can result in serious financial consequences to your business. With 100% visibility of your AP function, you have a new era of control and security across your entire AP process – no matter where your team is working from.

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Audience

Companies that want to check for vulnerabilities and improve security using attack trees

Audience

Document Management platform for companies

Support

Phone Support
24/7 Live Support
Online

Support

Phone Support
24/7 Live Support
Online

API

Offers API

API

Offers API

Screenshots and Videos

Screenshots and Videos

Pricing

No information available.
Free Version
Free Trial

Pricing

$500 one-time payment
Free Version
Free Trial

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Training

Documentation
Webinars
Live Online
In Person

Training

Documentation
Webinars
Live Online
In Person

Company Information

Isograph
Founded: 1986
United Kingdom
www.isograph.com/software/attacktree/

Company Information

Redmap
Founded: 1998
Australia
www.redmap.com

Alternatives

ReliaSoft

ReliaSoft

Hottinger Brüel & Kjær (HBK)

Alternatives

Road Warrior

Road Warrior

Mobile At Work
vRx

vRx

Vicarius
T-Recs

T-Recs

Trintech
Tenable One

Tenable One

Tenable
PaperCut

PaperCut

PaperCut Software

Categories

Categories

Vulnerability Management Features

Asset Discovery
Asset Tagging
Network Scanning
Patch Management
Policy Management
Prioritization
Risk Management
Vulnerability Assessment
Web Scanning

Document Management Features

Access Controls
Archiving & Retention
Collaboration Tools
Compliance Tracking
Document Archiving
Document Assembly
Document Capture
Document Conversion
Document Delivery
Document Indexing
Document Retention
Electronic Signature
Email Management
File Recovery
File Type Conversion
Forms Management
Full Text Search
Offline Access
Optical Character Recognition
Print Management
Version Control

Integrations

No info available.

Integrations

No info available.
Claim AttackTree and update features and information
Claim AttackTree and update features and information
Claim Redmap and update features and information
Claim Redmap and update features and information