Concept - The securiCAD Approach to IT Security Analysis

Threat Modeling and Attack Simulation

First create a model of your IT environment, then run attack simulations on it

Running attack simulations on a model of your IT environment allows you to investigate your security situation without touching your environment.

Attack simulations will show how an attacker would crawl your architecture.

By comparing simulations run on different models or variations of a model, you can evaluate security changes and architectural alternatives to gain decision support before introducing them for real.