Do you still rely on Excel to do your TARAs?

YouTube

Mit dem Laden des Videos akzeptieren Sie die Datenschutzerklärung von YouTube.
Mehr erfahren

Video laden

Get to know ISAT 4.0:

the complete analysis and concept phase of security development in one tool –

Clearly arranged, application-related, reliable.

Download German OnePager
Download English OnePager
Get in Touch or Book Your Trial

Do you still rely on Excel to do your TARAs?

YouTube

Mit dem Laden des Videos akzeptieren Sie die Datenschutzerklärung von YouTube.
Mehr erfahren

Video laden

Get to know ISAT 4.0:

the complete analysis and concept phase of security development in one tool –

Clearly arranged, application-related, reliable.

Download German OnePager
Download English OnePager
Get in Touch or Book Your Trial

High-quality, reliable and process-oriented security assessments are an essential part of the development process of cyber-physical systems.

The necessary Threat Analysis and Risk Assessments (TARAs) are very complex, time consuming and possibly nerve-racking to perform, even for security experts.

In this context, clarity, reusability as well as process and standard conformity are characteristics that lead to efficiency and quality improvements.

With ISAT 4.0, the INVENSITY Security Assessment Tool, we integrate these requirements and make it easier for you to carry out your security analyses.

Reusablitiy of data

It saves you time and money – and ensures the quality of your security analysis: ISAT 4.0 allows you to reuse partial results or even entire security analysis projects. Individual parts, for example of an attack tree, as well as entire structures can be copied and used within a project or even across projects. ISAT 4.0 thus not only ensures consistency and reduces the susceptibility to errors, but experience has shown that it saves you up to 30% of the time and associated costs that you would normally need for a security analysis.

Daten wiederverwenden bei Cybersecurity Analyse

Reusability of data

Daten wiederverwenden bei Cybersecurity Analyse

It saves you time and money – and ensures the quality of your security analysis: ISAT 4.0 allows you to reuse partial results or even entire security analysis projects. Individual parts, for example of an attack tree, as well as entire structures can be copied and used within a project or even across projects. ISAT 4.0 thus not only ensures consistency and reduces the susceptibility to errors, but experience has shown that it saves you up to 30% of the time and associated costs that you would normally need for a security analysis.

Prozesskonforme Sicherheitsargumentation ISO21434

Process conformity with ISO21434 & ISO2700x

Step by step: ISAT 4.0 guides you through your security argumentation. If you forget important steps, the tool immediately shows you which information is missing to complete your security analysis. ISAT 4.0 thus prevents individual process steps from being forgotten.

Process conformity with ISO21434 & ISO2700x

Prozesskonforme Sicherheitsargumentation ISO21434

Step by step: ISAT 4.0 guides you through your security argumentation. If you forget important steps, the tool immediately shows you which information is missing to complete your security analysis. ISAT 4.0 thus prevents individual process steps from being forgotten.

Overview of the points of attack

No more days of having to deal with confusing Excel wallpapers: even with a high number of attack elements in a security analysis, ISAT 4.0 offers a clear overview. By visualizing an analysis as a tree, it becomes quickly apparent from which point of attack the highest risks result and which risks have the strongest impact on the system.

Übersichtliche und einfachere Security Analysen

Overview of the points of attack

Übersichtliche und einfachere Security Analysen

No more days of having to deal with confusing Excel wallpapers: even with a high number of attack elements in a security analysis, ISAT 4.0 offers a clear overview. By visualizing an analysis as a tree, it becomes quickly apparent from which point of attack the highest risks result and which risks have the strongest impact on the system.

Übersichtliches und vereinfachtes Management-Reporting für Risk Assessments

Improved management reporting

Management reporting made easy: ISAT 4.0 comes with a management reporting matrix that works like a traffic light. This means that your management does not have to consist of security experts in order to understand which effects can occur, how likely they are to occur and which countermeasures can turn red areas into green areas.

Improved management reporting

Übersichtliches und vereinfachtes Management-Reporting für Risk Assessments

Management reporting made easy: ISAT 4.0 comes with a management reporting matrix that works like a traffic light. This means that your management does not have to consist of security experts in order to understand which effects can occur, how likely they are to occur and which countermeasures can turn red areas into green areas.

Customized features

Create together with us: in coordination with the ISAT 4.0 tool developers, you can integrate your specific requirements into the tool. INVENSITY responds to your needs in the best possible way.

Customized Features

Customized features

Customized Features

Create together with us: in coordination with the ISAT 4.0 tool developers, you can integrate your specific requirements into the tool. INVENSITY responds to your needs in the best possible way.

Additional features

Intellectual Property

Export as Excel files

Traceability of changes and argumentation chains

Location-independent, web-based environment

Datensicherheit nach DSGVO
Tool-Export dank
Nachverfolgbarkeit von
Webbasiertes Security Assessment Tool

Stay in control of your data – you host ISAT 4.0 and remain the sole owner of your data. No external company, including INVENSITY, have access to it because of your use of ISAT 4.0.

Share your analysis results: the Excel export function allows you to export all data of your attack tree and save it locally. This allows you to share the results of your security analysis with your customers or export data to other tools.

Maximum transparency for your project result: each node in the analysis tree has its own ID, which allows identified requirements to be mapped directly to it. With the log function, changes in the attack tree can be tracked at any time and can be traced back to individual users. Thus, old work states can be restored if necessary. Also, the tree structure makes it easy to trace logical chains of argumentation.

Greatest possible independence: as a web-based assessment tool, ISAT 4.0 enables several people to work on the same or on different projects simultaneously and from different locations. In addition, the tool is independent of the operating system – all you need is a web browser.

Additional Features:

Intellectual Property

Datensicherheit nach DSGVO

Stay in control of your data – you host ISAT 4.0 and remain the sole owner of your data. No external company, including INVENSITY, have access to it because of your use of ISAT 4.0.

Export as Excel files

Tool-Export dank

Share your analysis results: the Excel export function allows you to export all data of your attack tree and save it locally. This allows you to share the results of your security analysis with your customers or export data to other tools.

Traceability of changes and argumentation chains

Nachverfolgbarkeit von

Maximum transparency for your project result: each node in the analysis tree has its own ID, which allows identified requirements to be mapped directly to it. With the log function, changes in the attack tree can be tracked at any time and can be traced back to individual users. Thus, old work states can be restored if necessary. Also, the tree structure makes it easy to trace logical chains of argumentation.

Location-independent, web-based environment

Webbasiertes Security Assessment Tool

Greatest possible independence: as a web-based assessment tool, ISAT 4.0 enables several people to work on the same or on different projects simultaneously and from different locations. In addition, the tool is independent of the operating system – all you need is a web browser.

Benefit from our experience & expertise

  • From security experts for security experts
  • Experience from five years of application
  • Continuous development with our customers: ISAT 4.0 is based on feedback from more than 60 customer projects in the following industries:
Autootive and Transportation

Automotive & Transportation

Energietechnik und Gebäudetechnik

Energy & Building Technology

Medizintechnik

Medical Devices & Life Sciences

Verteidigung und Rüstung

Defense

Technische Prüfgesellschaften

Technical audit companies

Benefit from our experience & expertise

  • From security experts for security experts
  • Experience from five years of application
  • Continuous development with our customers: ISAT 4.0 is based on feedback from more than 60 customer projects in the following industries:
Autootive and Transportation

Automotive & Transportation

Energietechnik und Gebäudetechnik

Energy & Building Technology

Medizintechnik

Medical Devices & Life Sciences

Verteidigung und Rüstung

Defense

Technische Prüfgesellschaften

Technical audit companies

Step 1: Test the ISAT 4.0 trial version

Kontaktieren Sie uns für ein kostenlose Demversion von ISAT 4.0

1. Get in touch with us by phone, e-mail or contact form

Wir vereinbaren

2. We will arrange an appointment with you.

 

Wir stellen ihnen ISAT 4.0 in einer Live-Demonstration vor

3. In this meeting, we will introduce ISAT 4.0 in a live demonstration.

 

Sie testen unsere kostenlose Trial Version für 2 Wochen

4. You will get access to a 2-week trial version. During this time, you can get to know the tool and test it extensively.

 

Individuelles Angebot zur Lizenzierung von ISAT 4.0

5. After these two weeks, we will contact you. If you are interested in licensing ISAT 4.0 for your company, we will be happy to propose an individual offer.

 

Wir freuen uns über Ihr Feedback zur Weiterentwicklung von ISAT 4.0

6. We appreciate your feedback – even should you have no interest in ISAT 4.0.

 

Step 2: Licensing of ISAT 4.0

Transparent pricing: the total price for ISAT is made up of a basic package and other options that may be attractive to you.

Basis license package:

  • The licensing of the basic software for 24 months including updates
  • Initial commissioning of the basic configuration by our IT experts in cooperation with contact persons of your IT department
  • The initial training for up to six of your employees
  • Technical support from our IT experts and ISAT 4.0 developers

Additional consulting services:

  • Implementation of Threat Analysis and Risk Assessments (TARAs) by our security experts
  • Customization of the software after initial commissioning
  • Further training for your employees on the application of ISAT 4.0 or the implementation of TARAs (in addition to the training from the basic offer)

Step 3: Implementation of ISAT 4.0

 ISAT 4.0 wird in Ihr System per Docker-Container übertragen

1. Software installation: ISAT 4.0 is transferred to your system via Docker Container. Your internal IT department will then install the on-premise software on your servers.

Wir richten ISAT 4.0 gemeinsam mit Ihnen ein.

2. Initial commissioning: our INVENSITY IT experts arrange an appointment with your IT department to set up ISAT 4.0 together (via MS teams or live on site)

In einem Training schulen wir Sie und Ihr Team im Umgang mit ISAT 4.0.

3. Training: our INVENSITY security experts conduct a training with up to six of your employees and explain the features and functionality of ISAT 4.0.

Step 1: Test the ISAT 4.0 trial version

Kontaktieren Sie uns für ein kostenlose Demversion von ISAT 4.0

1. Get in touch with us by phone, e-mail or contact form

Wir vereinbaren

2. We will arrange an appointment with you.

 

Wir stellen ihnen ISAT 4.0 in einer Live-Demonstration vor

3. In this meeting, we will introduce ISAT 4.0 in a live demonstration.

 

Sie testen unsere kostenlose Trial Version für 2 Wochen

4. You will get access to a 2-week trial version. During this time, you can get to know the tool and test it extensively.

 

Individuelles Angebot zur Lizenzierung von ISAT 4.0

5. After these two weeks, we will contact you. If you are interested in licensing ISAT 4.0 for your company, we will be happy to propose an individual offer.

 

Wir freuen uns über Ihr Feedback zur Weiterentwicklung von ISAT 4.0

6. We appreciate your feedback – even should you have no interest in ISAT 4.0.

 

Step 2: Licensing of ISAT 4.0

Transparent pricing: the total price for ISAT is made up of a basic package and other options that may be attractive to you.

Basis license package:

  • The licensing of the basic software for 24 months including updates
  • Initial commissioning of the basic configuration by our IT experts in cooperation with contact persons of your IT department
  • The initial training for up to six of your employees
  • Technical support from our IT experts and ISAT 4.0 developers

Additional consulting services:

  • Implementation of Threat Analysis and Risk Assessments (TARAs) by our security experts
  • Customization of the software after initial commissioning
  • Further training for your employees on the application of ISAT 4.0 or the implementation of TARAs (in addition to the training from the basic offer)

Step 3: Implementation of ISAT 4.0

 ISAT 4.0 wird in Ihr System per Docker-Container übertragen

1. Software installation: ISAT 4.0 is transferred to your system via Docker Container. Your internal IT department will then install the on-premise software on your servers.

Wir richten ISAT 4.0 gemeinsam mit Ihnen ein.

2. Initial commissioning: our INVENSITY IT experts arrange an appointment with your IT department to set up ISAT 4.0 together (via MS teams or live on site)

In einem Training schulen wir Sie und Ihr Team im Umgang mit ISAT 4.0.

3. Training: our INVENSITY security experts conduct a training with up to six of your employees and explain the features and functionality of ISAT 4.0.

Do you have any questions? Are you interested in a trial version?

Please contact us.

Anna Eildermann, Security Expertin bei INVENSITY

Anna Eildermann
ISAT Product Owner

+49 172 6387960
isat@invensity.com

My name is Anna Eildermann and I am the Product Owner of ISAT 4.0. I wish to offer you the best experience with our security tool.

If you have any questions about ISAT 4.0 or are interested in testing the tool in a trial version for two weeks, just contact me. Either fill out the contact form below, call me or send me an e-mail.

I am looking forward to getting to know you and introducing ISAT 4.0 and its features in more detail.

    Do you have any questions? Are you interested in a trial version?
    Please contact us.

    Anna Eildermann, Security Expertin bei INVENSITY

    Anna Eildermann
    ISAT Product Owner

    +49 172 6387960
    isat@invensity.com

    My name is Anna Eildermann and I am the Product Owner of ISAT 4.0. I wish to offer you the best experience with our security tool.

    If you have any questions about ISAT 4.0 or are interested in testing the tool in a trial version for two weeks, just contact me. Either fill out the contact form below, call me or send me an e-mail.

    I am looking forward to getting to know you and introducing ISAT 4.0 and its features in more detail.

      About us

      INVENSITY – We accelerate your development.

      As a technology and innovation consultancy with an international scope, we are driven by the belief that technology has the potential to make the world a better place. And we know that truly great things can only be achieved together as a team.

      That is why we support our customers every day in overcoming their technological challenges – throughout the entire research and development process. We are active mainly in high-tech industries, including optical technologies, automotive and transportation, aerospace, healthcare and life sciences, energy and utilities, telecommunications and electronics, and building and defense.

      With our in-house academy and the INVENSITY Technology Hub, we guarantee lasting top performance. High-quality training and individual support promote the knowledge, talents and skills of our employees who develop methods and competencies in internal departments across projects.

      INVENSITY Center of Excellence Cybersecurity & Data Privacy

      The INVENSITY Center of Excellence Cybersecurity and Data Privacy is the competence center for all questions concerning IT security of embedded systems. Sustainability and traceability are the focus of our work. For us, the systematic analysis of existing systems and the design of security concepts are the starting point for a secure system.

      The systematic identification and evaluation of risks serves as a basis for the definition of suitable measures. When implementing secure systems, we rely on software and systems engineering methods as well as cybersecurity methods such as secure coding or threat modeling.

      About us

      INVENSITY – We accelerate your development.

      As a technology and innovation consultancy with an international scope, we are driven by the belief that technology has the potential to make the world a better place. And we know that truly great things can only be achieved together as a team.

      That is why we support our customers every day in overcoming their technological challenges – throughout the entire research and development process. We are active mainly in high-tech industries, including optical technologies, automotive and transportation, aerospace, healthcare and life sciences, energy and utilities, telecommunications and electronics, and building and defense.

      With our in-house academy and the INVENSITY Technology Hub, we guarantee lasting top performance. High-quality training and individual support promote the knowledge, talents and skills of our employees who develop methods and competencies in internal departments across projects.

      INVENSITY Center of Excellence Cybersecurity & Data Privacy

      The INVENSITY Center of Excellence Cybersecurity and Data Privacy is the competence center for all questions concerning IT security of embedded systems. Sustainability and traceability are the focus of our work. For us, the systematic analysis of existing systems and the design of security concepts are the starting point for a secure system.

      The systematic identification and evaluation of risks serves as a basis for the definition of suitable measures. When implementing secure systems, we rely on software and systems engineering methods as well as cybersecurity methods such as secure coding or threat modeling.

      © Copyright 2007 – 2020   |   All Rights Reserved 

      CONSULTING

      Accelerate your development

      CAREER

      Let’s make things better

      © Copyright 2007 – 2020 All Rights Reserved