AttackTreeIsograph
|
Tree Tracker SoftwareTree Tracker
|
|||||
Related Products
|
||||||
About
Model system vulnerability, identify weakspots and improve security using threat analysis and attack trees. Construct graphical representations of measures designed to reduce the consequences of a successful attack with mitigation trees. AttackTree allows users to define consequences and attach them to any gate within the attack tree. In this way, it is possible to model the consequences of successful attacks on the target system. Mitigation trees may be used to model the effects of mitigating measures on the consequences resulting from a successful attack. Our software has been in continuous development since the 1980s and is the recognized standard for safety and reliability professionals. Analyze threats according to standards such as ISO 26262, ISO/SAE 21434 and J3061. Identify where your system is vulnerable to an attack. Improve the security of your assets and IT systems. Model consequence mitigation.
|
About
Using over 50 years of Urban Forestry experience as consultants, programmers and inventory data collectors, Tree Tracker® software has been developed by professionals who understand the importance of usable inventory software. The cost of inventory software should never be the limiting factor in an urban forestry program. Tree Tracker® has been priced to fit the budget of a township, village, city or any other community with the desire to manage trees. Addresses, Tree and Site attributes, Service Requests, and Work Histories are all on the same screen. There is no need to cycle through menus, browse back and forth, or sift through windows on top of windows to see inventory information. An essential component to managing a tree population is mitigating risk. Tree Tracker® prioritizes tree risk by analyzing size, location, and maintenance data. Tree risk is calculated within an adjustable twenty point system rather that the two to three point hazard priorities of other systems.
|
|||||
Platforms Supported
Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook
|
Platforms Supported
Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook
|
|||||
Audience
Companies that want to check for vulnerabilities and improve security using attack trees
|
Audience
Professionals and organizations in need of a free inventory software
|
|||||
Support
Phone Support
24/7 Live Support
Online
|
Support
Phone Support
24/7 Live Support
Online
|
|||||
API
Offers API
|
API
Offers API
|
|||||
Screenshots and Videos |
Screenshots and Videos |
|||||
Pricing
No information available.
Free Version
Free Trial
|
Pricing
$1800 one-time payment
Free Version
Free Trial
|
|||||
Reviews/
|
Reviews/
|
|||||
Training
Documentation
Webinars
Live Online
In Person
|
Training
Documentation
Webinars
Live Online
In Person
|
|||||
Company InformationIsograph
Founded: 1986
United Kingdom
www.isograph.com/software/attacktree/
|
Company InformationTree Tracker
www.treetrackersoftware.com
|
|||||
Alternatives |
Alternatives |
|||||
|
|
|
|||||
|
|
||||||
|
|
|
|||||
Categories |
Categories |
|||||
Vulnerability Management Features
Asset Discovery
Asset Tagging
Network Scanning
Patch Management
Policy Management
Prioritization
Risk Management
Vulnerability Assessment
Web Scanning
|
Inventory Management Features
Alerts/Notifications
Barcoding / RFID
Forecasting
Inventory Optimization
Kitting
Manufacturing Inventory Management
Mobile Access
Multi-Channel Management
Product Identification
Reorder Management
Reporting/Analytics
Retail Inventory Management
Supplier Management
Warehouse Management
|
|||||
Integrations
No info available.
|
Integrations
No info available.
|
|||||
|
|
|