Attack tree analysis has long been used in critical aerospace, intelligence and defense applications. Although the attack tree approach is well suited to assessing risk in commercial IT, OT and embedded applications, there were barriers to its adoption in those fields. A lack of awareness in attack tree analysis techniques left analysts unsure of how to build and analyze attack trees. Attempts to build attack tree models using conventional drawing tools quickly demonstrated they are ill suited to the task.
Amenaza's SecurITree® modeling software was built specifically for use in IT security. However it has found equal or greater adoption in other cybersecurity applications, including those where physical attack vectors are relevant such as OT, IOT and embedded devices. Capable of analyzing hundreds of thousands (or millions) of attack scenarios, SecurITree's powerful analytic capabilities make analysis practical. Its ability to gauge the effect of countermeasures before implementation is game changing. Amenaza's onsite training courses allow analysts to feel confident that the models they create accurately reflect the systems they are charged with protecting.
When getting attacked is just not an option – you've got to get it right!
Stay one step ahead!
available tool for security risk
assessments on our military programs.
When Security Really Matters
Amenaza's Predictive SPM modeling technology is used by leaders in:
Aerospace
Embedded and IoT Devices
Medical Devices
Operational Technology
Infrastructure / Nuclear Power
Auto Manufacturing
Information Technology
Transportation
When Security Really Matters
Amenaza's PSPM modeling
technology is used by leaders in:
Aerospace
Embedded and IoT Devices
Medical Devices
Operational Technology
Infrastructure / Nuclear Power
Auto Manufacturing
Information Technology
Transportation
Dr. Edward Amoroso
Amenaza in the News
Security risk analysis using attack trees with Terry Ingoldsby
(Caffeinated Risk - McCreight & Leece)
Listen >
Engineering-grade OT Security - A Manager's Guide
by Andrew Ginter
See Chapter 6
Get Waterfall book >
Security risk analysis using attack trees with Terry Ingoldsby
(Caffeinated Risk - McCreight & Leece)
Listen >
Engineering-grade OT Security - A Manager's Guide
by Andrew Ginter
See Chapter 6
Get Waterfall book >