Model threats to your system using threat analysis and attack trees. Construct graphical representations of measures designed to reduce the consequences of a successful attack with mitigation trees.

  • Quickly build models using AttackTree
  • Analyze Threats according to standards such as ISO 26262 and J3061
  • Model consequence mitigation
  • Import/export facilities to databases and spreadsheets

Our software has been in continuous development since the 1980s and is the recognized standard for safety and reliability professionals.

Why choose AttackTree

There are many reasons to choose AttackTree – here are
just a few:

Consequence Driven AttackTrees

AttackTree allows users to define consequences and attach them to any gate within the attack tree. In this way, it is possible to model the consequences of successful attacks on the target system Read More...

Threat Analysis and Risk Assessment

Perform threat analysis and risk assessment according to well-known standards such as J3061 and ISO-26262. Read More...

Mitigation Trees

Mitigation trees may be used to model the effects of mitigating measures on the consequences resulting from a successful attack Read More...

Contact Sales | Download Now