Join the latest MITRE ATT&CK® webinar. Click here for AEDT or here for AWST
"*" indicates required fields
"*" indicates required fields
"*" indicates required fields
"*" indicates required fields
"*" indicates required fields
"*" indicates required fields
"*" indicates required fields
"*" indicates required fields
"*" indicates required fields
"*" indicates required fields
By highlighting the current security controls in place, and their effectiveness, the Essential 8 Auditor also identifies IT risks that are not adequately managed.
The Essential 8 Auditor automatically identifies and classifies each security issue found, providing an explanation of reasons and context to support the prioritisation of remediation actions.
Following remediation, the Essential 8 Auditor can be re-run to measure the effectiveness of the mitigation effort and report any maturity improvement. All assessment results from the Essential 8 Auditor can be stored to allow users the ability to look at previous results and compare their progress.
EXPLORE OTHER ESSENTIAL 8 AUDITOR FEATURES
Ready to explore how Huntsman Security can support the strengthening of your cyber security posture?