To customers who cannot avoid the labor of security risk analysis: We can significantly reduce the effort required for the tedious task of creating security risk analysis reports through automation.
The analysis method complies with the "Security Risk Analysis Guide for Control Systems" published by the IPA (Information-technology Promotion Agency) and can achieve up to 90% efficiency improvement. It automatically generates asset-based risk analysis sheets and business impact-based risk analysis sheets used in the above guide. By inputting the assets to be analyzed, their characteristics, connection information, and data flow, it automatically determines dangerous attack trees.
Inquire About This Product
basic information
The Pro version of the risk analysis tool has the following features: • The maximum number of assets that can be analyzed is up to 40 (the standard version allows up to 15). • Customization of evaluation parameters (you can customize the weights of the pathways for business damage-based analysis). • Customization of the definitions of functions and threat responses. * A free version with limited features is also available.
Price information
1 license 41,800 yen (including tax)
Price range
P2
Delivery Time
P1
Applications/Examples of results
It has become the only clear procedure for detailed risk analysis used not only by customers with control systems but also by those with information systems. Please check our company blog for usage examples.
catalog(1)
Download All CatalogsCompany information
Our company offers services focused on cybersecurity risk analysis support in accordance with the IPA "Guidelines for Security Risk Analysis of Control Systems," NIST CSF 2.0, IEC 62443, and others. We have a proven track record in factory risk assessments and risk analysis. Additionally, we provide various services, including video content that summarizes the essential parts of the IPA's comprehensive guide in an easy-to-understand format, free e-learning practice books to review learned content, and seminars on risk analysis in line with the IPA's risk analysis guidelines. These services are particularly suitable for small to medium-sized enterprises seeking reliable cybersecurity measures with minimal burden. We hold the national certification for Information Processing Security Support Specialists. Please feel free to contact us with any inquiries.