AttackTree

AttackTree

Isograph
Tenable One

Tenable One

Tenable
+
+

Related Products

  • Reflectiz
    14 Ratings
    Visit Website
  • NinjaOne
    3,472 Ratings
    Visit Website
  • Guardz
    96 Ratings
    Visit Website
  • Criminal IP
    13 Ratings
    Visit Website
  • Resolver
    265 Ratings
    Visit Website
  • ESET PROTECT Advanced
    2,109 Ratings
    Visit Website
  • Aikido Security
    106 Ratings
    Visit Website
  • Wiz
    1,059 Ratings
    Visit Website
  • Action1
    678 Ratings
    Visit Website
  • DriveLock
    1 Rating
    Visit Website

About

Model system vulnerability, identify weakspots and improve security using threat analysis and attack trees. Construct graphical representations of measures designed to reduce the consequences of a successful attack with mitigation trees. AttackTree allows users to define consequences and attach them to any gate within the attack tree. In this way, it is possible to model the consequences of successful attacks on the target system. Mitigation trees may be used to model the effects of mitigating measures on the consequences resulting from a successful attack. Our software has been in continuous development since the 1980s and is the recognized standard for safety and reliability professionals. Analyze threats according to standards such as ISO 26262, ISO/SAE 21434 and J3061. Identify where your system is vulnerable to an attack. Improve the security of your assets and IT systems. Model consequence mitigation.

About

Tenable One radically unifies security visibility, insight and action across the attack surface, equipping modern organizations to isolate and eradicate priority cyber exposures from IT infrastructure to cloud environments to critical infrastructure and everywhere in between. The world’s only AI-powered exposure management platform. See every asset across your entire attack surface—from cloud environments to operational technologies, infrastructure to containers, and remote workers to modern web-apps with Tenable's market-leading vulnerability management sensors. With more than 20 trillion aspects of threat, vulnerability, misconfiguration and asset information, Tenable’s machine-learning powered predictions reduce remediation efforts by enabling you to focus first on the risks that matter most. Drive improvements required to reduce the probability of a business-impacting cyber event from occurring by communicating objective measures of risk.

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Audience

Companies that want to check for vulnerabilities and improve security using attack trees

Audience

IT security teams

Support

Phone Support
24/7 Live Support
Online

Support

Phone Support
24/7 Live Support
Online

API

Offers API

API

Offers API

Screenshots and Videos

Screenshots and Videos

Pricing

No information available.
Free Version
Free Trial

Pricing

No information available.
Free Version
Free Trial

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Training

Documentation
Webinars
Live Online
In Person

Training

Documentation
Webinars
Live Online
In Person

Company Information

Isograph
Founded: 1986
United Kingdom
www.isograph.com/software/attacktree/

Company Information

Tenable
Founded: 2002
United States
www.tenable.com/products/tenable-one

Alternatives

ReliaSoft

ReliaSoft

Hottinger Brüel & Kjær (HBK)

Alternatives

Tenable One

Tenable One

Tenable
Criminal IP

Criminal IP

AI SPERA
SanerNow

SanerNow

SecPod Technologies
Flexera One

Flexera One

Flexera
Qualys VMDR

Qualys VMDR

Qualys

Categories

Categories

Vulnerability Management Features

Asset Discovery
Asset Tagging
Network Scanning
Patch Management
Policy Management
Prioritization
Risk Management
Vulnerability Assessment
Web Scanning

Integrations

Cisco Meraki
Google Cloud Platform
Helical
Ivanti Neurons for MDM
Jenkins
Longbow
RankedRight
Recovery Point
Red Hat Cloud Suite
Resmo
Sacumen Connector as a Service (CaaS)
SaltStack
ServiceNow
Tenable CIEM
The Respond Analyst
ThreatAware
ThreatConnect Risk Quantifier (RQ)
Tromzo
cloudtamer.io

Integrations

Cisco Meraki
Google Cloud Platform
Helical
Ivanti Neurons for MDM
Jenkins
Longbow
RankedRight
Recovery Point
Red Hat Cloud Suite
Resmo
Sacumen Connector as a Service (CaaS)
SaltStack
ServiceNow
Tenable CIEM
The Respond Analyst
ThreatAware
ThreatConnect Risk Quantifier (RQ)
Tromzo
cloudtamer.io
Claim AttackTree and update features and information
Claim AttackTree and update features and information
Claim Tenable One and update features and information
Claim Tenable One and update features and information