Select Page

THREAT ANALYSIS & RISK ASSESSMENT

ThreatGet
CYBER SECURITY BY DESIGN

NEW REQUIREMENTS, NEW RULES OF THE GAME

IT development processes go through the process from function to system, security analyses follow afterwards. This leads to time-consuming corrections and expensive delays in the Go-2-Market.

Regulations, norms and standards mix up this process

The IEC 62443 series of international standards addresses the cybersecurity of Industrial Automation and Control Systems (IACS), taking a holistic approach that covers the entire life cycle

Industries with security-critical infrastructure are now required by the regulator to have an up-to-date cyber security management system, for example the new European Security Guideline for the Automotive Industry (UNECE WP29 / ISO/SAE-21434).

Comprehensive Consulting
Automated and up-to-date security analysis

GAMECHANGER THREATGET: Cyber Security by Design

Automated threat analysis and risk assessment
With ThreatGet you identify and document the entire system development process for threats, automated and up to date thanks to a scientific, continuously updated threat catalog, developed from the AIT Austrian Institute of Technology.

  • Accompany the entire system development cycle with an outstanding methodology
  • The method for your security assessments remains the same over time, regardless of who from your company carries it out and when.
  • Create the bridge between IT and business department at the customer with cyber security modelling.

The knowledge database of AIT Austrian Institute of Technology

industry icon

Automotive

1‘400+ Cyber Risks

AIT Knowledge Base

feeds on the following sources:

>100

Threats
UNECE WP29

>300

Threats
ETSI

>400

Threats from other
sources

>400

Threats AIT
Analysis

>200

Threats
ITU

industry icon

Industrial

1’100+ Cyber Risks

AIT Knowledge Base Industrial

feeds on the following sources:

iec Logo

>180

Threats
IEC 62443-4-2

 

Global Cyber Security Alliance ogo

>90

Threats
ISA IIoT
62443 Standard

>500

Threats from other
sources

 

>250

Threats AIT
Analysis

 

iec Logo

>90

Threats
IEC 62443-3-3

 

“As Cyber Security and regulatory compliance become the top two biggest concerns of corporate boards, some are adding Cyber Security experts specifically to scrutinize security and risk issues.”
Gartner, April 2021

From Domain to Expertise to Report

$

Automated Threat Analysis

Based on the continuously updated threat catalogue of AIT Austrian Institute of Technology.

$

Traceability

From the identified threat potentials to the system requirements

$

Continuous Process

Integrated in model-based engineering.

Domain knowledge

Cyber Security expertise

Modeling knowhow

Security Property

Systems Model

Automatic
Analysis

Identified threats and consequences

Risk Management support

Threat Get Logo

Results Report

Detected Potential Threats

AWARD WINNING PRODUCT

eAward 2020
Industrie 4.0

for the new cyber security management system “ThreatGet”. The eAward from report.at is one of the most important Austrian IT awards. It honors economical, user-friendly and innovative IT projects of Austrian companies.

Expo
2020 Dubai

(October 2021 to March 2022): Cyber Security Management System “ThreatGet” from AIT Austrian Institute of Technology is a selected exhibition project in the Austria – Pavilion

 

Constantinus
Award 2021

Winner “Digitalization” and “IoT” Category
ThreatGet: Cyber Security by Design, comprehensive consulting for IT professionals in security-critical technology architecture.

Partner with us!

ThreatGet for your comprehensive cyber security consulting

$

Efficient

Your Knowledge Advantage
As ThreatGet partner, you have an outstanding advantage in the market and a knowledge edge: ThreatGet automates risk analyses with an updated threat catalogue from the research of AIT Austrian Institute of Technology.
$

Innovative

An Outstanding Methodologyl
With ThreatGet, you already participate in the system development and thus prevent expensive mistakes at the customer.
$

Winning

Guarantee the highest quality of Consulting
Through the unique methodology and our support, you ensure a high consulting quality in the environment of safety-critical systems.
YOUR CONTACT
Fritz Mehl

Sales & Partner Management
fritz.mehl@threatget.eu

Salomé Wagner

Marketing & Communications
salome.wagner@threatget.eu

Dipl.-Ing. Sonja Mehl MBA

Partner Acquisition &
Support
sonja.mehl@threatget.eu

Just give us a call:

4biz.at Consulting GmbH –
Business Unit ThreatGet

Handelskai 340 Top 5, A-1020 Vienna, Austria
marketing@threatget.eu

The history of ThreatGet

In February 2019, the EU launched an initiative for cyber security. ThreatGet, an Austrian product developed by the AIT Austrian Institute of Technology, exists for this purpose. It supports developers in identifying threats at an early stage and quickly assessing the associated risks. Especially with the introduction of the new European Security Directive according to ECE level (UNECE WP29; EU/ partly in Asia), vehicle manufacturers will in future be required to use a single-certified cyber security management system that takes into account all stages from engineering to documentation.

Industries such as aerospace, defense and the financial industry are also required by the regulator to implement and document such cyber security management systems. Threat analysis are an essential part of this.

To give security the importance it needs to be effective, security must become part of the functionality. The combination of system architecture with ThreatGet enables this novel, holistic approach. Security by Design is nothing less than a game changer in the methodological approach and development of critical systems. ThreatGet automates and formalizes threat analyses as early as the system architecture stage by drawing on the AIT’s updated threat catalog and preventing the defense strategy from lagging behind the attackers and their methods.