Book a demo form

Book a demo

E8 Brochure Campaign Traffic

Resource Download

Contact Us

Signup Form (Blog Page and Resources Page)

Services Signup (MSSP page popup)

MITRE Att@ck Download (SEIM Pages 2021)

Book a demo form

Landing page - free trial form

Book a demo

E8 Brochure Campaign Traffic

Landing page - E8 demo form

Download the SmartCheck Brochure

Request SmartCheck for Ransomware Demo

SmartCheck for Ransomware Demo

SmartCheck Demo LP

SmartCheck Demo LP 2

MITRE ATT@CK Webinar - Jun 2022

Register(Required)
Agree(Required)
you must read and acknowledge our privacy policy
Marketing

July 2022 Landing Page (Brochure Download)

  • This field is for validation purposes and should be left unchanged.

July 2022 Landing Page (Director)

  • This field is for validation purposes and should be left unchanged.

Insurance - 25 Minute Q&A

  • This field is for validation purposes and should be left unchanged.

Insurance - Checklist Download

  • This field is for validation purposes and should be left unchanged.

Contact Us (Japan New)

  • お問い合わせフォーム

Dec 22 - eGuide

  • This field is for validation purposes and should be left unchanged.

Dec 22 - No Obligation Demo

  • This field is for validation purposes and should be left unchanged.

Jan 23 - Cyber Gap

  • This field is for validation purposes and should be left unchanged.

Jan 23 - Cyber Gap - Sec Managers (AU)

"*" indicates required fields

Marketing
Consent*
This field is for validation purposes and should be left unchanged.

Jan 23 - E8 Brochure - Directors (AU)

"*" indicates required fields

Receive
Privacy*

Jan 23 - Talk To An Expert - Landing (AU)

"*" indicates required fields

Marketing
Consent*
This field is for validation purposes and should be left unchanged.

Jan 23 - E8 Brochure - Directors (AU) (POPUP)

"*" indicates required fields

Receive
Privacy*

Jan 23 - Cyber Gap - Landing (AU) (POPUP)

"*" indicates required fields

Marketing
Consent*
This field is for validation purposes and should be left unchanged.

Asset_Downloads_Insurance_Campaign_3

"*" indicates required fields

Marketing
Consent*
This field is for validation purposes and should be left unchanged.

Asset_Downloads_Insurance_Campaign_1

"*" indicates required fields

Marketing
Consent*
This field is for validation purposes and should be left unchanged.

Asset_Downloads_Insurance_Campaign_2

"*" indicates required fields

Marketing
Consent*
This field is for validation purposes and should be left unchanged.

Asset_Downloads_Insurance_Campaign_4

"*" indicates required fields

Marketing
Consent*
This field is for validation purposes and should be left unchanged.

eGuide_Insurance_Campaign

  • This field is for validation purposes and should be left unchanged.

Checklist_Insurance_Campaign

  • This field is for validation purposes and should be left unchanged.

Expert_Insurance_Campaign

"*" indicates required fields

Marketing
Consent*
This field is for validation purposes and should be left unchanged.

Webinar - MITRE ATT&CK® work for you - PHT - Mar 23

Agree(Required)
you must read and acknowledge our privacy policy
Marketing

Webinar - MITRE ATT&CK® work for you - AEDT - Mar 23

Agree(Required)
you must read and acknowledge our privacy policy
Marketing
Japan

FierceITSecurity: Huntsman Enters US Market, Brings New Tech for ‘Actionable Intelligence’

|

Huntsman Enters US Market, Brings New Tech for ‘Actionable Intelligence’

16 April 2015 (Source: FierceITSecurity) Huntsman, a subsidiary of Australian IT security company Tier-3, Thursday announced its entrance into the U.S. market where it hopes to challenge entrenched security and event management (SIEM) competitors. Along with the incursion, Huntsman unveiled new tech squarely positioned to capitalize on a trend seeing C-level execs demand more actionable insight regarding IT threats.

With high-profile breaches like Sony and Target creating PR nightmares, C-suite executives are making IT security a top priority. Huntsman CEO Peter Woollacott said in an interview with FierceITSecurity that this shift in prioritization is a “maturation” of the IT security space.

“When I speak to [executives] they tell me that several years ago they knew about IT security threats, but they weren’t that familiar with them, and, more importantly, they weren’t that familiar with the implications,” Woollacott said. “What they want to know is, ‘If there is a security threat, what part of my business is potentially impacted? What are you doing to fix that particular problem? And what do I need to do, relative to the other business risks that I’m facing, to remediate that problem?'”

Medium- to large-sized businesses rely on SIEMs to keep track of security logs and other IT security data. However, as companies expand or acquire other companies, multiple SIEMs can bog down the analysis process, with Woollacott’s research showing that American companies go as long as 170 days on average without recognizing potential threats.

Knowing that, Woollacott and his team are introducing a new tech called the Huntsman Unified Console that consolidates information from existing legacy SIEMs and presents the data in readable dashboards. The idea is to give the company what Woollacott calls “actionable intelligence” or easily evaluated threat vector analysis that analysts–or even execs–can use to make decisions.

Read more