+
+

Related Products

  • Innoslate
    86 Ratings
    Visit Website
  • Process Street
    1,106 Ratings
    Visit Website
  • Jama Connect
    374 Ratings
    Visit Website
  • SOCRadar Extended Threat Intelligence
    101 Ratings
    Visit Website
  • Reflectiz
    18 Ratings
    Visit Website
  • Chainguard
    49 Ratings
    Visit Website
  • Jscrambler
    38 Ratings
    Visit Website
  • cside
    25 Ratings
    Visit Website
  • RealEstateAPI (REAPI)
    45 Ratings
    Visit Website
  • A10 Defend Threat Control
    41 Ratings
    Visit Website

About

From assets to countermeasures, factoids to personas, and requirements to architectural components, enter or import a wide range of security, usability, and requirements data to find new insights ranging from interconnections between requirements and risks, to the justification behind persona characteristics. No single view captures a complex system, so automatically generate 12 different views of your emerging design from perspectives ranging from people, risks, requirements, architecture, and even physical location. Automatically generate threat models such as Data Flow Diagrams (DFDs) as your early stage design evolves. Leverage open source intelligence about potential attacks and candidate security architectures to measure your attack surface. Show all the security, usability, and design elements associated with your product's risks.

About

Ease of use, common taxonomies, flexible output. It's all here. The Tutamen Threat Model Automator is designed to enable security at the architectural stage, where the cost of fixing flaws is the lowest. Reduce human error and inconsistencies with single input of variables. Make a living threat model that changes when the design changes. The Tutamen Threat Model Automator has the ability to generate multiple reports for different stakeholder groups in your company, not just on your project. You already know how to use it. There is no new software to learn. The Tutamen Threat Model Automator allows you to enter threat data using tools you already know, like Microsoft Visio and Excel.

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Audience

Requirements Management solution for companies

Audience

Threat Modeling solution for organizations

Support

Phone Support
24/7 Live Support
Online

Support

Phone Support
24/7 Live Support
Online

API

Offers API

API

Offers API

Screenshots and Videos

Screenshots and Videos

Pricing

Free
Free Version
Free Trial

Pricing

No information available.
Free Version
Free Trial

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Training

Documentation
Webinars
Live Online
In Person

Training

Documentation
Webinars
Live Online
In Person

Company Information

CAIRIS
cairis.org

Company Information

Tutamantic Sec
Founded: 2015
United Kingdom
www.tutamantic.com

Alternatives

SD Elements

SD Elements

Security Compass

Alternatives

Fork

Fork

VerSprite Cybersecurity
Devici

Devici

Security Compass
Devici

Devici

Security Compass
Fork

Fork

VerSprite Cybersecurity

Categories

Categories

Integrations

Microsoft Excel
Microsoft Visio

Integrations

Microsoft Excel
Microsoft Visio
Claim CAIRIS and update features and information
Claim CAIRIS and update features and information
Claim Tutamen Threat Model Automator and update features and information
Claim Tutamen Threat Model Automator and update features and information