TRUSTED BY

Be on top of your organisation’s cyber security hygiene at all times.

Time

COST & TIME SAVING

with a cost effective, automated out-of-the-box resource

Shield

INFORMED OVERSIGHT FOR RISK MANAGEMENT & COMPLIANCE

know your cyber hygiene and maturity in minutes

screen

AUTOMATION, ACCURACY & VERIFIABILITY

to report on your risk management status against the Essential Eight controls

Why organisations choose Huntsman Security’s Essential 8 Auditor application to

manage compliance & cyber risk

Cost and Time Saving

Cost and Time Saving

Cost-effective, automated out-of-the-box resource

Essential 8 Auditor offers cost and time savings for Security and Risk teams, who typically run their own manual or 3rd party auditor assessment against the Australian Cyber Security Centre (ACSC) Essential Eight controls. It lets you know your cyber maturity rating and what needs to be done – in minutes.

Typically, organisations follow a manual assessment process which can be disruptive and often delivers an inaccurate picture. Teams have the time-consuming task of responding to questionnaires that attempt to identify a range of issues from legacy assets, to unlicensed devices as well as cyber vulnerabilities. Responses to checklists can be subjective, and that is why the Essential 8 Auditor automates and formats this activity into reliable data-driven security reporting in minutes.

Utilising the Essential 8 Auditor application, analysts can easily connect to your organisation’s relevant data sources and endpoints, and within minutes, visualise your cyber maturity score, enabling mitigation by following a simple ‘to-do’ list. Equally importantly, each of the eight control reports highlights the coverage or proportion of the IT assets audited and assessed and any assets excluded from the measurement.

Whether it’s enterprise-scale or a smaller SMB environment the Essential 8 Auditor out-of-the-box software is quick to install and set up – not requiring external staff or specialists for implementation or use. Starting at a $6,500 investment, we find that our customers quickly generate payback on their investment through the regular use of this highly effective cyber security diagnostic and risk assessment application.

Essential 8 Auditor offers cost and time savings for Security and Risk teams, who typically run their own manual or 3rd party auditor assessment against the Australian Cyber Security Centre (ACSC) Essential Eight controls. It lets you know your cyber maturity rating and what needs to be done – in minutes.

Typically, organisations follow a manual assessment process which can be disruptive and often delivers an inaccurate picture. Teams have the time-consuming task of responding to questionnaires that attempt to identify a range of issues from legacy assets, to unlicensed devices as well as cyber vulnerabilities. Responses to checklists can be subjective, and that is why the Essential 8 Auditor automates and formats this activity into reliable data-driven security reporting in minutes.

Utilising the Essential 8 Auditor application, analysts can easily connect to your organisation’s relevant data sources and endpoints, and within minutes, visualise your cyber maturity score, enabling mitigation by following a simple ‘to-do’ list. Equally importantly, each of the eight control reports highlights the coverage or proportion of the IT assets audited and assessed and any assets excluded from the measurement.

Whether it’s enterprise-scale or a smaller SMB environment the Essential 8 Auditor out-of-the-box software is quick to install and set up – not requiring external staff or specialists for implementation or use. Starting at a $6,500 investment, we find that our customers quickly generate payback on their investment through the regular use of this highly effective cyber security diagnostic and risk assessment application.

Easy installation

allows for self-installation, with optional support from Huntsman Security

allows for self-installation, with optional support from Huntsman Security

Your Security Rating, In Minutes

by using the Essential 8 Auditor to avoid time-intensive manual reviews

by using the Essential 8 Auditor to avoid time-intensive manual reviews

ROI within weeks

with the Essential 8 Auditor’s ease of set-up, automation and cost-efficient annual fee

with the Essential 8 Auditor’s ease of set-up, automation and cost-efficient annual fee

Informed Oversight for Risk Management & Compliance

Informed Oversight for Risk Management & Compliance

Know your cyber maturity in minutes

For organisations with growing IT governance obligations or those that simply prioritise risk and cyber security management, the Essential 8 Auditor can be of major assistance in your performance improvement and security uplift program. It provides an evidential trail of performance, and pinpoints any areas of concern, to guide the next steps for both IT and Executive teams. With its comprehensive Attack Surface Management (ASM) capabilities, the Essential 8 Auditor automatically verifies your IT assets, measures vulnerabilities and reports any areas of changing cyber risk.

The Essential 8 Auditor is a quantitative and highly scalable risk measurement solution that delivers an easy-to-follow remediation list and empowers both IT and Executive teams to guide their security strategy with the automated checks and balances that align with the ACSC’s Essential Eight security controls.

For Australian Federal Government departments required to report against the Protective Security Policy Framework (PSPF) or State based departments seeking to assess compliance with their State or Territory’s Information Security Policies, the Essential 8 Auditor is a simple solution to inform improvement and manage compliance.

The full range of readily available reporting ensures that directors, management and staff, can maintain transparency of cyber security information across the entire organisation. This is fully supported from the ground up with verifiable quantitative risk measurement for data-driven security decision making.

For organisations with growing IT governance obligations or those that simply prioritise risk and cyber security management, the Essential 8 Auditor can be of major assistance in your performance improvement and security uplift program. It provides an evidential trail of performance, and pinpoints any areas of concern, to guide the next steps for both IT and Executive teams. With its comprehensive Attack Surface Management (ASM) capabilities, the Essential 8 Auditor automatically verifies your IT assets, measures vulnerabilities and reports any areas of changing cyber risk.

The Essential 8 Auditor is a quantitative and highly scalable risk measurement solution that delivers an easy-to-follow remediation list and empowers both IT and Executive teams to guide their security strategy with the automated checks and balances that align with the ACSC’s Essential Eight security controls.

For Australian Federal Government departments required to report against the Protective Security Policy Framework (PSPF) or State based departments seeking to assess compliance with their State or Territory’s Information Security Policies, the Essential 8 Auditor is a simple solution to inform improvement and manage compliance.

The full range of readily available reporting ensures that directors, management and staff, can maintain transparency of cyber security information across the entire organisation. This is fully supported from the ground up with verifiable quantitative risk measurement for data-driven security decision making.

Full Visibility

of your entire organisation – its servers and endpoints, at any time

of your entire organisation – its servers and endpoints, at any time

Compliance

reporting against Government security policies and controls at all levels

reporting against Government security policies and controls at all levels

Evidential Trail

tracks events for evidential reporting and pinpoints areas of concern

tracks events for evidential reporting and pinpoints areas of concern

Automation, Accuracy & Verifiability

Automation, Accuracy & Verifiability

Report your risk management status against the Essential Eight controls

The Essential 8 Auditor automates and accurately reports on the status of your risk management efforts against the ACSC Essential Eight controls. It provides risk and management teams with visibility into your current cyber posture: the effectiveness of your current controls, any of those controls requiring specific uplift, and the balance or residual risk outstanding.

Executives and Management value the Essential 8 Auditor as it provides reliable evidence of performance on-demand. It identifies cyber vulnerabilities, provides benchmarked ratings and maturity levels against the ACSC Essential Eight controls and, pinpoints areas of concern across IT systems and users. It can also be used for third-party suppliers.

Automated and trackable remediation activities allow analysts to run subsequent and regular assessments (without any additional licensing costs) to instantly measure any improvements in your cyber security performance that might further reduce any residual risk.

The Essential 8 Auditor automates and accurately reports on the status of your risk management efforts against the ACSC Essential Eight controls. It provides risk and management teams with visibility into your current cyber posture: the effectiveness of your current controls, any of those controls requiring specific uplift, and the balance or residual risk outstanding.

Executives and Management value the Essential 8 Auditor as it provides reliable evidence of performance on-demand. It identifies cyber vulnerabilities, provides benchmarked ratings and maturity levels against the ACSC Essential Eight controls and, pinpoints areas of concern across IT systems and users. It can also be used for third-party suppliers.

Automated and trackable remediation activities allow analysts to run subsequent and regular assessments (without any additional licensing costs) to instantly measure any improvements in your cyber security performance that might further reduce any residual risk.

Automation

and seamless reporting on the status of your risk management activities

and seamless reporting on the status of your risk management activities

Easy To Follow Steps

empowering analysts with easy-to-follow mitigation steps

empowering analysts with easy-to-follow mitigation steps

Benchmark

your cyber security score and re-assess your score at any time

your cyber security score and re-assess your score at any time

A snapshot of Huntsman Security’s Essential 8 Auditor application.

See how the Essential 8 Auditor can automatically assess security controls across your entire environment, to produce an immediate and verifiable measure of their maturity.

Request a demo

A quick look at the Essential 8 Auditor's key features

Visibility
On-demand operation Empirical measurement Gap analysis, to uplift resilience Live dashboards (data export available) Data-driven assessment
Reporting Capabilities
Systematic risk-reporting framework Executive security summary reports “To-do” list for non-compliant endpoints ACSC Security maturity level determination (L0 – L3)
Installation
Light weight Easy self-install Agentless Upgrades to latest ACSC Essential Eight recommendations
Product Support and Service
Phone/Email (incl.) Onsite available

Essential 8 Auditor Overview

The Essential 8 Auditor provides on-demand cyber vulnerability & maturity assessment, to measure your security compliance against the ACSC Essential Eight cyber security framework. It protects IT assets, systems and sensitive information on-site and in remote locations, and scales as your organisation expands across on-premise, cloud-based and hybrid IT environments.

By automating data collection and audit functions, the Essential 8 Auditor turns complex security data into actionable reporting for risk management decision making. It provides faster and more accurate assessment of your cyber posture and the state of your prevention, containment and recovery controls.

Our easy-to-use software allows you to measure your Essential Eight maturity score in minutes. Whether yours is an on-prem or cloud environment it produces a comprehensive ‘to-do’ list of security issues for remediation by your Security Risk team.

Once mitigation activities are complete, the Essential 8 Auditor application can be run regularly to produce an updated Essential Eight maturity score. It gives stakeholders a clear and timely view of your cyber security control effectiveness, to reveal any residual risk.

Our Essential 8 Auditor application puts you in control of your organisation’s cyber security rating, to guide your next steps. It provides on-demand cyber KPI measurements and a ‘window into the security engine room’ for operations teams and Boards of Directors. Resilience metrics for improvement processes and prioritised ‘to do’ lists inform the management of security controls and effective oversight.

null
Don't compromise on the ease or reliability of your risk management process. You can be accurately measuring your cyber maturity in hours, not weeks.

Huntsman Security, 2021

SIGN UP TO RECEIVE CYBER SECURITY INSIGHTS

Read by directors, executives, and security professionals globally, operating in the most complex of security environments.