• Close the gap between threat detection and incident response to seconds…

    automated threat-slider
    Discover how Huntsman’s Threat Management solutions are leading the way in slashing your time at risk     >>     Learn More


    Safe Automation In Incident Management

  • Continuous visibility of compliance breaches and risks that simple rule-based filters overlook…

    Tick all the boxes with Huntsman

    Learn More

  • Military grade technology patrolling your bottom line

    Real time threat detection and management

    Learn More

Upcoming Event

31 March 2017

View all up-coming events »

Monitor and combat defence grade cyber attacks

Threat Management
The most advanced intelligent Threat Management solutions protecting your assets
Learn More
A-Grade Compliance
Automation of the Audit & Compliance workflow built to keep you ahead of the game
See How
Business Risk Reduction
Detection and management of issues in real time, as they occur
Read More

Huntsman Security Included in Vendor Landscape: Security Analytics Nov 2016

Paving the way for automated security processes.

Read Report >>

It's all about finding the right solution for your business

Cyber Security Blog

Cyber Security Blog

Huntsman Blog Read our latest blog posts on Cyber Security.
Read more »

Upcoming Events

Upcoming Events

Latest Event: BrisSEC17 is AISA’s annual Brisbane security day.
Visit us @ Booth #12
Read more »

Latest Resource

Latest Resource

Cyber Security was never far from the news in 2016, and that is unlikely to change in 2017…
Read more »

Peter Woollacott, Huntsman Security CEO

Huntsman Analyst Portal: Automated Threat Verification

When it comes to limiting the damage done by inside and outside threats, your time at risk is key. The longer your cyber security risk management system takes to detect, verify and resolve an attack, the greater the risk of financial and reputational loss. Every second counts.

Ponemon Institute’s 2014 Global Report on the Cost of Cyber Crime revealed that it takes an average of 170 days from cyber infection to detection.  That means that organisations remain at risk for up to six months.  This problem is identified again in Verizon’s 2015 Data Breach Investigations Report, where it observes that “99.9% of the exploited vulnerabilities had been compromised more than a year after the associated CVE (Common Vulnerability and Exposures) was published.” And all of this is before the identified threats are verified, investigated and resolved which can take, astonishingly, up to another 200 or more hours per threat.  The result? it is almost impossible for analysts to make rapid security decisions.

The Huntsman® Defence Grade Security Platform  provides cyber security services capability in the crucial Threat Verification stage of the Threat Management process.  The technology collects and contextualises security data in real time, to automatically pinpoint the threats that matter: threat verification in seconds. The result? analysts can focus on investigating the real threats that matter which means an improvement in the organisation’s cyber security risk management.

Huntsman® is the preferred cyber security monitoring technology for an increasing number of law enforcement, defence, intelligence, telecommunications, critical national infrastructure and managed security services organizations. Today the same technology, developed and proven in some of the most demanding environments, is available to reduce the time at risk for your organization.

Defence Grade technology for military grade attacks.