AttackTree

AttackTree

Isograph
vRx

vRx

Vicarius
+
+

Related Products

  • Reflectiz
    15 Ratings
    Visit Website
  • Guardz
    103 Ratings
    Visit Website
  • ManageEngine Endpoint Central
    2,458 Ratings
    Visit Website
  • ESET PROTECT Advanced
    2,188 Ratings
    Visit Website
  • SOCRadar Extended Threat Intelligence
    82 Ratings
    Visit Website
  • RaimaDB
    9 Ratings
    Visit Website
  • NinjaOne
    3,935 Ratings
    Visit Website
  • A10 Defend Threat Control
    32 Ratings
    Visit Website
  • Jscrambler
    33 Ratings
    Visit Website
  • Resolver
    274 Ratings
    Visit Website

About

Model system vulnerability, identify weakspots and improve security using threat analysis and attack trees. Construct graphical representations of measures designed to reduce the consequences of a successful attack with mitigation trees. AttackTree allows users to define consequences and attach them to any gate within the attack tree. In this way, it is possible to model the consequences of successful attacks on the target system. Mitigation trees may be used to model the effects of mitigating measures on the consequences resulting from a successful attack. Our software has been in continuous development since the 1980s and is the recognized standard for safety and reliability professionals. Analyze threats according to standards such as ISO 26262, ISO/SAE 21434 and J3061. Identify where your system is vulnerable to an attack. Improve the security of your assets and IT systems. Model consequence mitigation.

About

Consolidate your software vulnerability assessment with one single vRx agent. Let vRx do the work so you can focus on and remediate the threats that matter most. vRx's prioritization engine using CVSS framework bases prioritization, plus AI of the specific security posture of your organization, and maps your digital environment to help you prioritize critical vulnerabilities for mitigation. vRx maps the potential consequences of a successful exploit within your unique digital infrastructure. CVSS metrics and context-based AI mapping provide the data needed to prioritize and mitigate critical vulnerabilities. For each detected app, OS, or asset vulnerability, vRx provides recommended actions that help you eliminate potential risks and stay resilient.

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Audience

Companies that want to check for vulnerabilities and improve security using attack trees

Audience

IT teams interested in a platform that helps monitor vulnerabilities

Support

Phone Support
24/7 Live Support
Online

Support

Phone Support
24/7 Live Support
Online

API

Offers API

API

Offers API

Screenshots and Videos

Screenshots and Videos

Pricing

No information available.
Free Version
Free Trial

Pricing

$5 per asset per month
Free Version
Free Trial

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Training

Documentation
Webinars
Live Online
In Person

Training

Documentation
Webinars
Live Online
In Person

Company Information

Isograph
Founded: 1986
United Kingdom
www.isograph.com/software/attacktree/

Company Information

Vicarius
Founded: 2016
United States
www.vicarius.io

Alternatives

ReliaSoft

ReliaSoft

Hottinger Brüel & Kjær (HBK)

Alternatives

Mageni

Mageni

Mageni Security
vRx

vRx

Vicarius
Tenable One

Tenable One

Tenable
Qualys VMDR

Qualys VMDR

Qualys
SanerNow

SanerNow

SecPod Technologies
Centraleyezer

Centraleyezer

Sandline

Categories

Categories

Vulnerability Management Features

Asset Discovery
Asset Tagging
Network Scanning
Patch Management
Policy Management
Prioritization
Risk Management
Vulnerability Assessment
Web Scanning

Integrations

No info available.

Integrations

No info available.
Claim AttackTree and update features and information
Claim AttackTree and update features and information
Claim vRx and update features and information
Claim vRx and update features and information