TRA-CE
Dashboard
Threats
Attack Graph
Controls
Identities
Exposures
What If
Executive
BC
Configuration
Scenario
Target Event
Interventions
Run Simulation
Results
Configure parameters and run simulation
Chain Comparison