Skip to main content
ESCRYPT CycurRISK

Software tool for threat analysis and risk assessment

A woman engineer is reviewing a 3D model of a car on her laptop.  She appears to be analyzing the car's design and technical specifications.

ESCRYPT CycurRISK enables you to uncover and evaluate potential attack surfaces in your automotive systems.

It allows you to systematically identify and analyze threats using attack trees, while damage scenarios show the impact on road users and your business. Moreover, the tool provides a structured documentation, allowing comparability and reuse of knowledge from previous analyses.

Your benefits

Established and reliable

Widely used solution with professional maintenance, support, and frequent updates.

Fully compliant

Compliant with the requirements of ISO/SAE 21434 and UN R 155.

Highly flexible

Fully configurable report templates and methodologies.

Features

The graphic shows the official CycurRISK icon: a shield on squares in a circle.

Newly available: Automotive Threat Matrix

The Automotive Threat Matrix (ATM) is now freely available as a threat library in ESCRYPT CycurRISK. It lists adversary tactics and supporting techniques specifically tailored to the automotive industry. The matrix is built on real-world observations, validated automotive attacks, and peer-reviewed, reproducible automotive exploit research. You can leverage the ATM as a starting point for robust threat modeling.

> 600 TARA projects

500+ experts at a major Tier1 manage on more than 600 TARA projects in CycurRISK per year.

The image shows two professionals working together at a computer, looking at a screen. One points at the monitor while the other closely observes. A shield icon in the background signifies security, symbolizing threat analysis and risk assessment activities in a cybersecurity context

ETAS service: uncover the vulnerable points of your automotive systems

Long product lifecycles often require you to respond to new demands and security risks even if development is already advanced. Our ESCRYPT threat analysis and risk assessment service supports you during the whole TARA process for embedded products. At ETAS we help you determine the data and functions to be protected, identify potential attacks, and define appropriate protection requirements.

All news

Next events

Contact us

Do you have any questions? Feel free to send us a message. We will be more than happy to help.

Contact us today!