+
+

Related Products

  • ThreatLocker
    502 Ratings
    Visit Website
  • Criminal IP ASM
    18 Ratings
    Visit Website
  • ESET PROTECT Advanced
    2,249 Ratings
    Visit Website
  • SOCRadar Extended Threat Intelligence
    101 Ratings
    Visit Website
  • Criminal IP
    17 Ratings
    Visit Website
  • PowerDMARC
    251 Ratings
    Visit Website
  • Fraud.net
    56 Ratings
    Visit Website
  • ManageEngine EventLog Analyzer
    203 Ratings
    Visit Website
  • A10 Defend Threat Control
    41 Ratings
    Visit Website
  • Omnilert
    26 Ratings
    Visit Website

About

Threat modeling is a core element of the Microsoft Security Development Lifecycle (SDL). It’s an engineering technique you can use to help you identify threats, attacks, vulnerabilities, and countermeasures that could affect your application. You can use threat modeling to shape your application's design, meet your company's security objectives, and reduce risk. The Microsoft Threat Modeling Tool makes threat modeling easier for all developers through a standard notation for visualizing system components, data flows, and security boundaries. It also helps threat modelers identify classes of threats they should consider based on the structure of their software design. We designed the tool with non-security experts in mind, making threat modeling easier for all developers by providing clear guidance on creating and analyzing threat models.

About

Ease of use, common taxonomies, flexible output. It's all here. The Tutamen Threat Model Automator is designed to enable security at the architectural stage, where the cost of fixing flaws is the lowest. Reduce human error and inconsistencies with single input of variables. Make a living threat model that changes when the design changes. The Tutamen Threat Model Automator has the ability to generate multiple reports for different stakeholder groups in your company, not just on your project. You already know how to use it. There is no new software to learn. The Tutamen Threat Model Automator allows you to enter threat data using tools you already know, like Microsoft Visio and Excel.

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Audience

Threat Modeling solution for organizations

Audience

Threat Modeling solution for organizations

Support

Phone Support
24/7 Live Support
Online

Support

Phone Support
24/7 Live Support
Online

API

Offers API

API

Offers API

Screenshots and Videos

Screenshots and Videos

Pricing

No information available.
Free Version
Free Trial

Pricing

No information available.
Free Version
Free Trial

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Training

Documentation
Webinars
Live Online
In Person

Training

Documentation
Webinars
Live Online
In Person

Company Information

Microsoft
Founded: 1975
United States
www.microsoft.com/en-us/securityengineering/sdl/threatmodeling

Company Information

Tutamantic Sec
Founded: 2015
United Kingdom
www.tutamantic.com

Alternatives

Alternatives

Fork

Fork

VerSprite Cybersecurity
Fork

Fork

VerSprite Cybersecurity
Devici

Devici

Security Compass

Categories

Categories

Integrations

IriusRisk
Microsoft Excel
Microsoft Visio
Seeker

Integrations

IriusRisk
Microsoft Excel
Microsoft Visio
Seeker
Claim Microsoft Threat Modeling Tool and update features and information
Claim Microsoft Threat Modeling Tool and update features and information
Claim Tutamen Threat Model Automator and update features and information
Claim Tutamen Threat Model Automator and update features and information