Average Ratings 0 Ratings
Average Ratings 0 Ratings
Description
MITRE ATT&CK® serves as a comprehensive, publicly-accessible repository detailing the tactics and techniques employed by adversaries, grounded in actual observations from the field. This repository acts as a crucial resource for shaping targeted threat models and strategies across various sectors, including private enterprises, government agencies, and the broader cybersecurity industry. By establishing ATT&CK, MITRE is advancing its commitment to creating a safer world through collaborative efforts aimed at enhancing cybersecurity efficacy. The ATT&CK framework is freely available to individuals and organizations alike, making it an invaluable tool for improving security practices. Adversaries often engage in active reconnaissance scans to collect pertinent information that aids in their targeting efforts, utilizing direct network traffic to probe victim infrastructure rather than employing indirect methods. This proactive approach to gathering intelligence underscores the importance of vigilance in cybersecurity to counter such tactics effectively.
Description
Threagile empowers teams to implement Agile Threat Modeling with remarkable ease, seamlessly integrating into DevSecOps workflows. This open-source toolkit allows users to represent an architecture and its assets in a flexible, declarative manner using a YAML file, which can be edited directly within an IDE or any YAML-compatible editor. When the Threagile toolkit is executed, it processes a series of risk rules that perform security evaluations on the architecture model, generating a comprehensive report detailing potential vulnerabilities and suggested mitigation strategies. Additionally, visually appealing data-flow diagrams are automatically produced, along with various output formats such as Excel and JSON for further analysis. The tool also supports ongoing risk management directly within the Threagile YAML model file, enabling teams to track their progress on risk mitigation effectively. Threagile can be operated through the command line, and for added convenience, a Docker container is available, or it can be set up as a REST server for broader accessibility. This versatility ensures that teams can choose the deployment method that best fits their development environment.
API Access
Has API
API Access
Has API
Integrations
AirCISO
Datto EDR
Docker
Filigran
FortiGuard IPS Service
Group-IB Threat Intelligence
JSON
ManageEngine Log360
Microsoft Excel
PQShield
Integrations
AirCISO
Datto EDR
Docker
Filigran
FortiGuard IPS Service
Group-IB Threat Intelligence
JSON
ManageEngine Log360
Microsoft Excel
PQShield
Pricing Details
No price information available.
Free Trial
Free Version
Pricing Details
Free
Free Trial
Free Version
Deployment
Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook
Deployment
Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook
Customer Support
Business Hours
Live Rep (24/7)
Online Support
Customer Support
Business Hours
Live Rep (24/7)
Online Support
Types of Training
Training Docs
Webinars
Live Training (Online)
In Person
Types of Training
Training Docs
Webinars
Live Training (Online)
In Person
Vendor Details
Company Name
MITRE ATT&CK
Country
United States
Website
attack.mitre.org
Vendor Details
Company Name
Threagile
Website
threagile.io