
Hostile behavior can be predicted.
Attack tree analysis has long been used in critical aerospace, intelligence and defense applications. Although the attack tree approach is well suited to assessing risk in commercial IT, OT and embedded applications, there were barriers to its adoption in those fields. A lack of awareness in attack tree analysis techniques left analysts unsure of how to build and analyze attack trees. Attempts to build attack tree models using conventional drawing tools quickly demonstrated they are ill suited to the task.
Amenaza's SecurITree® modeling software was purpose built for the task. Capable of analyzing hundreds of thousands (or millions) of attack scenarios, SecurITree's powerful analytic capabilities make analysis practical. Its ability to gauge the effect of countermeasures before implementation is game changing. Amenaza's onsite training courses allow analysts to feel confident that the models they create accurately reflect the systems they are charged with protecting.
If you can't see what lies ahead, you may get eaten!


When getting attacked is just not an option – you've got to get it right!
- Outsmart your adversaries and stay one step ahead.
- SecurITree is the leading choice for predictive threat modeling of critical systems.
- SecurITree's threat models enable predictive Security Posture Management (SPM).
- Amenaza believes that cyber attacks can be predicted – and that a savvy defender can use that knowledge to prevent the attack from ever happening (or mitigate the effects thereof).
Beyond the Top 20
Organizations getting started with a cybersecurity program quickly discover the various Top 20 (or some other number) checklists. No one disagrees that these checklists are a great starting point -- but that is exactly what they are -- a starting point. For organizations that lack depth and expertise in cybersecurity they are a good way of addressing the low hanging fruit of attack vectors. But with today's sophisticated adversaries checklist security simply isn't enough. Most of the large organizations that make the news after being hacked were probably doing the basics.
Organizations with high asset value (or whose systems potentially affect safety) are high value targets for adversaries. Such organizations must move beyond checklists. Amenaza's attack tree analysis methodology lends much deeper understanding into an organization's resilience. SecurITree allows defenders to see their systems from the point of view of their attackers, and understand which controls are appropriate (and how and where to deploy them).

When Security Really Matters
Amenaza's Predictive SPM modeling technology is used by leaders in:

Aerospace

Embedded and IoT Devices

Medical Devices

Operational Technology

Infrastructure / Nuclear Power

Auto Manufacturing

Information Technology

Transportation
When Security Really Matters
Amenaza's PSPM modeling
technology is used by leaders in:

Aerospace

Embedded and IoT Devices

Medical Devices

Operational Technology

Infrastructure / Nuclear Power

Auto Manufacturing

Information Technology

Transportation
available tool for security risk
assessments on our military programs.



Praemonitus, Praemunitus
An ancient Latin proverb counseled that forewarned is forearmed.
The behavior of adversaries can be predicted. Such knowledge enables defenders to prevent attacks from ever happening.
Amenaza's attack tree-based SecurITree threat modeling software makes this possible and practical.
Amenaza in the News

Security risk analysis using attack trees with Terry Ingoldsby
(Caffeinated Risk - McCreight & Leece)
Listen >