We’re expanding the boundaries of scalable cyber risk analysis. In a pilot phase, we’re testing vertical TARA integration that allows damage scenarios from lower-level TARAs to flow directly into vehicle-level attack trees. This approach enables independent assessments while protecting IP, and allows efficient derivation, comparison, and reuse of variants.
Within the CYMETRIS platform, we’re validating how damage scenarios from lower-level TARAs — such as ECU assessments — can be integrated directly as native attack steps into vehicle-level attack trees, making them seamlessly reusable within existing analyses. This approach separates analysis from integration: individual ECUs and components can be assessed independently (even across organizational boundaries!) while aggregation into vehicle-level TARAs remains fluid.
The result? Complex vehicle variants can be derived, compared, and reused with exceptional efficiency. Especially for variant management and reuse across multiple vehicle lines, this delivers a level of scalability that traditional monolithic and isolated TARA approaches simply can’t match. New vehicle configurations can be created with minimal additional effort.
We’re currently refining the UX flow to ensure intuitive accessibility for all user roles. The pilot phase is designed to incorporate early feedback from real-world projects, and we’re exploring additional use cases together with our customers.
Stay up to date with CYMETRIS and our software platform. We regularly share new features, updates, and practical expert insights on cyber risk assessment and TARA. Browse all our latest posts right here: NEWS
CYMETRIS is currently finalizing the integration of AI systems into its cyber risk analysis platform via the Model Context Protocol (MCP). This capability enables structured, governed AI support within defined TARA workflow steps—without compromising data sovereignty, traceability, or engineering accountability.  LEARN MORE↗
We’re expanding our team at CYMETRIS headquarters in Munich! We’re currently seeking Frontend Developers, Backend Developers, and more. Please feel free to reach out with a brief message so we can provide detailed information about our open positions. LEARN MORE↗
Usability first: Our new release (which includes backend stability and scalability improvements along with several interesting features—see the complete overview in the tool) brings undo and redo functionality. If you encounter any bugs, please report them!
TARA (Threat Analysis and Risk Assessment) provides a powerful methodology for systematically identifying and evaluating cyber risks — throughout product development and across the entire lifecycle.
Our overview page guides you step-by-step through the complete TARA process in line with ISO/SAE 21434: you’ll learn which phases matter, what artifacts play a role, and what truly counts.
What you’ll find here:
Get started now and dive into the full guide.
Our platform continues to evolve with cutting-edge features for intelligent cyber risk modeling/TARA. Want the latest on new capabilities, integrations, and industry developments? Reach out to our team for insights tailored to your needs.
Adding {{itemName}} to cart
Added {{itemName}} to cart