Book a demo form

Book a demo

E8 Brochure Campaign Traffic

Resource Download

Contact Us

Signup Form (Blog Page and Resources Page)

Services Signup (MSSP page popup)

MITRE Att@ck Download (SEIM Pages 2021)

Book a demo form

Landing page - free trial form

Book a demo

E8 Brochure Campaign Traffic

Landing page - E8 demo form

Download the SmartCheck Brochure

Request SmartCheck for Ransomware Demo

SmartCheck for Ransomware Demo

SmartCheck Demo LP

SmartCheck Demo LP 2

MITRE ATT@CK Webinar - Jun 2022

Register(Required)
Agree(Required)
you must read and acknowledge our privacy policy
Marketing

July 2022 Landing Page (Brochure Download)

  • This field is for validation purposes and should be left unchanged.

July 2022 Landing Page (Director)

  • This field is for validation purposes and should be left unchanged.

Insurance - 25 Minute Q&A

  • This field is for validation purposes and should be left unchanged.

Insurance - Checklist Download

  • This field is for validation purposes and should be left unchanged.

Contact Us (Japan New)

  • お問い合わせフォーム

Dec 22 - eGuide

  • This field is for validation purposes and should be left unchanged.

Dec 22 - No Obligation Demo

  • This field is for validation purposes and should be left unchanged.

Jan 23 - Cyber Gap

  • This field is for validation purposes and should be left unchanged.

Jan 23 - Cyber Gap - Sec Managers (AU)

"*" indicates required fields

Marketing
Consent*
This field is for validation purposes and should be left unchanged.

Jan 23 - E8 Brochure - Directors (AU)

"*" indicates required fields

Receive
Privacy*

Jan 23 - Talk To An Expert - Landing (AU)

"*" indicates required fields

Marketing
Consent*
This field is for validation purposes and should be left unchanged.

Jan 23 - E8 Brochure - Directors (AU) (POPUP)

"*" indicates required fields

Receive
Privacy*

Jan 23 - Cyber Gap - Landing (AU) (POPUP)

"*" indicates required fields

Marketing
Consent*
This field is for validation purposes and should be left unchanged.

Asset_Downloads_Insurance_Campaign_3

"*" indicates required fields

Marketing
Consent*
This field is for validation purposes and should be left unchanged.

Asset_Downloads_Insurance_Campaign_1

"*" indicates required fields

Marketing
Consent*
This field is for validation purposes and should be left unchanged.

Asset_Downloads_Insurance_Campaign_2

"*" indicates required fields

Marketing
Consent*
This field is for validation purposes and should be left unchanged.

Asset_Downloads_Insurance_Campaign_4

"*" indicates required fields

Marketing
Consent*
This field is for validation purposes and should be left unchanged.

eGuide_Insurance_Campaign

  • This field is for validation purposes and should be left unchanged.

Checklist_Insurance_Campaign

  • This field is for validation purposes and should be left unchanged.

Expert_Insurance_Campaign

"*" indicates required fields

Marketing
Consent*
This field is for validation purposes and should be left unchanged.

Webinar - MITRE ATT&CK® work for you - PHT - Mar 23

Agree(Required)
you must read and acknowledge our privacy policy
Marketing

Webinar - MITRE ATT&CK® work for you - AEDT - Mar 23

Agree(Required)
you must read and acknowledge our privacy policy
Marketing
Japan

Essential 8 Auditor

On-demand cyber vulnerability & maturity assessment

Be on top of your organisation’s cyber security hygiene at all times.

COST & TIME SAVING

with a cost effective, automated out-of-the-box resource

INFORMED OVERSIGHT FOR RISK MANAGEMENT & COMPLIANCE

to know your cyber maturity in minutes

AUTOMATION, ACCURACY & VERIFIABILITY

to report on your risk management status against the Essential Eight controls

Informed oversight of risk involves the board being satisfied that cyber risks are adequately addressed by the risk management framework of the organisation.

‘Key questions for an organisation’s board of directors’ Australian Securities & Investments Commission (ASIC)

Why organisations choose
Huntsman Security’s Essential 8 Auditor application to
manage compliance & cyber risk

COST EFFECTIVE, AUTOMATED OUT-OF-THE-BOX RESOURCE

Cost and Time Saving

Essential 8 Auditor offers cost and time savings for Security Risk teams, who typically run their own manual or 3rd party auditor assessment against the Australian Cyber Security Centre (ACSC) Essential Eight controls. It lets you know your cyber maturity rating and what needs to be done – in minutes.

Typically, organisations follow a manual assessment which can be disruptive and often delivers an inaccurate picture. Teams have the time-consuming task of responding to questionnaires that attempt to identify a range of issues from legacy machines, to unlicensed devices as well as cyber vulnerabilities. Responses to checklists can be subjective, and that is why the Essential 8 Auditor automates and distils this activity into reliable data-driven security reporting in minutes.

Utilising the Essential 8 Auditor application, analysts can easily connect to all of your organisation’s data sources and endpoints, and within minutes, visualise your cyber maturity score, enabling mitigation by following a simple ‘to do’ list. Equally importantly, each of the eight control reports highlight the proportion of the overall endpoints audited and assessed, and any assets excluded from the measurement.

Whether it’s enterprise scale or a smaller SMB environment the Essential 8 Auditor out-of-the-box software is quick to install and set up – not requiring external staff or specialists for implementation or use. Starting at a $6,500 investment, we find that our customers quickly generate payback on their investment within the first few weeks of use, with this highly effective cyber security diagnostic and risk assessment application.

Read more

Easy installation

allows for self-installation, with optional support from Huntsman Security

Your Security Rating, In Minutes

by using the Essential 8 Auditor to avoid time-intensive manual reviews

ROI within weeks

with the Essential 8 Auditor's ease of set-up, automation and cost-efficient annual fee

KNOW YOUR CYBER MATURITY IN MINUTES

Informed Oversight for Risk Management & Compliance

For organisations with growing IT governance obligations or those that simply prioritise risk and cyber security management, the Essential 8 Auditor can be of major assistance in your performance improvement and security uplift program. It provides an evidential trail of performance, and pinpoints the areas of concern, to guide next steps for both IT and Executive teams. With its comprehensive Attack Surface Management (ASM) capabilities the Essential 8 Auditor automatically verifies your IT assets, measures vulnerabilities and reports any areas of changing cyber risk.

The Essential 8 Auditor is a quantitative and highly scalable risk measurement solution that identifies an easy-to-follow remediation list, and empowers both IT and Executive teams to guide their security strategy with the automated checks and balances that align with the ACSC’s Essential Eight security controls.

For Federal Government departments required to report against the Protective Security Policy Framework (PSPF) or State based departments seeking to assess compliance with their State or Territory’s Information Security Policies, the Essential 8 Auditor is a simple solution to inform improvement and manage compliance.

The full range of readily available reporting ensures that directors, management and staff, can maintain end-to-end transparency across the entire organisation. This is fully supported from the ground up with verifiable quantitative risk measurement and data-driven security decision making.

Read more

Full Visibility

of your entire organisation and its endpoints, at any time.

Compliance

reporting against Government security policies of all levels

Evidential Trail

tracks events for evidential reporting to pinpoint areas of concern

REPORT YOUR RISK MANAGEMENT STATUS AGAINST THE ESSENTIAL EIGHT CONTROLS

Automation, Accuracy & Verifiability

The Essential 8 Auditor automates and accurately reports on the status of your risk management efforts against the ACSC Essential Eight controls, providing risk and management teams with visibility into your current cyber posture: the effectiveness of your current controls, any of those controls requiring specific uplift, and the balance or residual risk outstanding.

Executives and Management value the Essential 8 Auditor as it provides an evidential trail of performance on-demand. It identifies cyber vulnerabilities, provides benchmarked ratings and maturity levels against the ACSC Essential Eight controls and, pinpoints areas of concern across IT systems, users and third-party suppliers.

Automated and trackable remediation activities allow analysts to run subsequent and regular assessments (without any additional licensing costs) to instantly measure any improvements in your organisation’s cyber security performance that might further reduce any residual risk.

Read more

Automation

and seamless reporting on the status of your risk management efforts

Easy To Follow Steps

empowering analysts with easy-to-follow mitigation steps

Benchmark

your cyber security score and re-assess your score at any time

Overview

A snapshot of Huntsman Security’s Essential 8 Auditor application.

See how the Essential 8 Auditor can automatically assess security controls across your entire environment, to produce an immediate and verifiable measure of their maturity.

A quick look at the Essential 8 Auditor's key features

Visibility
On-demand operation Empirical measurement Gap analysis, to uplift resilience Live dashboards (data export available) Data-driven assessment
Reporting Capabilities
Systematic risk-reporting framework Executive security summary reports “To-do” list for non-compliant endpoints ACSC Security maturity level determination (L0 – L3)
Installation
Light weight Easy self-install Agentless Upgrades to latest ACSC Essential Eight recommendations
Product Support and Service
Phone/Email (incl.) Onsite available

Essential 8 Auditor Overview

The Essential 8 Auditor provides on-demand cyber vulnerability & maturity assessment, to measure your security compliance against the ACSC Essential Eight cyber security framework. It protects IT assets, systems and sensitive information on-site and in remote locations, and scales as your organisation expands across on-premise, cloud-based and hybrid IT environments.

By automating data collection and audit functions, the Essential 8 Auditor turns complex security data into actionable reporting for risk management decision making. It provides faster and more accurate assessment of your cyber posture and the state of your prevention, containment and recovery controls.

Our easy-to-use software allows you to measure your Essential Eight maturity score in minutes. Whether yours is an on-prem or cloud environment it produces a comprehensive ‘to-do’ list of security issues for remediation by your Security Risk team.

Once mitigation activities are complete, the Essential 8 Auditor application can be run regularly to produce an updated Essential Eight maturity score. It gives stakeholders a clear and timely view of your cyber security control effectiveness, to reveal any residual risk.

Our Essential 8 Auditor application puts you in control of your organisation’s cyber security rating, to guide your next steps. It provides on-demand cyber KPI measurements and a ‘window into the security engine room’ for operations teams and Boards of Directors. Resilience metrics for improvement processes and prioritised ‘to do’ lists inform the management of security controls and effective oversight.

Don't compromise on the ease or reliability of your risk management process.You can be accurately measuring your cyber maturity in hours, not weeks.

Huntsman Security, 2021

Have a question?

Ready to explore how Huntsman Security can strengthen your cyber security posture?