Cyber Security Resources

Resources and content to help you monitor and combat defence grade cyber attacks

Access our industry-leading resources to improve your cyber resilience: case studies, compliance guides, white papers plus educational tools and videos.

Resources: 79 available: Case Studies (6) | Compliance Guides (15) | Infographics (4) | Product Brochures (12) | Tools (9) | Solution Briefs (3) | Video / Webinar (8) | White Papers (22)

Use the filter options below to quickly access the information you require.


Developing Managed Security Services

Case Studies

Developing Managed Security Services

How two organisations developed and grew their managed security services....

Improving Security Control Effectiveness

Case Studies

Improving Security Control Effectiveness

How an organisation that provides IT services to 9 organisations gained a centralised view of security control effectiveness....

Credit Union Case Study

Case Studies

Credit Union Case Study

Explore why this this credit union chose Huntsman technology to meet its compliance obligations to PCI-DSS, ISO 27001 and APRA...

Managed Investment Services Case Study

Case Studies

Managed Investment Services Case Study

Explore why this investment management services company to some of Australia’s leading life insurers, superannuation providers...

MSSP Case Study

Case Studies

MSSP Case Study

Why Huntsman Enterprise SIEM was selected by an MSSP that provides security services to government agencies handling highly...

Retail Bank Case Study

Case Studies

Retail Bank Case Study

How an Australian arm of an international bank used Huntsman to consolidate the security of disparate IT and security systems....

Essential 8 Risk & Compliance Guide

Compliance Guides

Essential 8 Risk & Compliance Guide

A guide to how Huntsman Security technology measures your compliance and alignment to the Essential 8 security controls....

ASD ISM System Monitoring Compliance Guide

Compliance Guides

ASD ISM System Monitoring Compliance Guide

The latest 2018 ASD ISM System Monitoring recommendations: learn how Huntsman® SIEM & Security Analytics technology maps to the...

ASD ISM Compliance Guide OVERVIEW

Compliance Guides

ASD ISM Compliance Guide OVERVIEW

An overview of how Huntsman supports compliance to ASD ISM....

ASD ISM Compliance Guide

Compliance Guides

ASD ISM Compliance Guide

A step by step Compliance Guide detailing how Huntsman technology maps to ASD ISM, and how it helps organisations to assess and...

Fast Track your GDPR Compliance

Compliance Guides

Fast Track your GDPR Compliance

Are you fulfilling your GDPR obligations? Download the guide for practical examples on what implementing GDPR should look like....

FISMA Compliance Guide Overview

Compliance Guides

FISMA Compliance Guide Overview

An overview of how to support FISMA requirements with Huntsman®: the hub of a security ecosystem to monitor the audit,...

FISMA Compliance Guide

Compliance Guides

FISMA Compliance Guide

A detailed Compliance Guide showing how Huntsman® supports FISMA requirements; providing the hub of a security ecosystem to...

GDPR Security Monitoring Summary

Compliance Guides

GDPR Security Monitoring Summary

An overview of GDPR cyber security compliance obligations....

GDPR Security Monitoring Reference Guide

Compliance Guides

GDPR Security Monitoring Reference Guide

Review the 5 key GDPR articles that apply to security monitoring and access our guidance detailing how to comply....

GPG13 Compliance Guide OVERVIEW

Compliance Guides

GPG13 Compliance Guide OVERVIEW

An overview of how Huntsman SIEM can help your organisation meet its GPG13 obligations and similar protective monitoring...

ISO27001 Compliance Guide

Compliance Guides

ISO27001 Compliance Guide

A step by step guide detailing how Huntsman Enterprise SIEM supports ISO 27001 regulations: enterprise-wide visibility and...

PCI DSS Compliance Guide OVERVIEW

Compliance Guides

PCI DSS Compliance Guide OVERVIEW

An overview of how Huntsman Enterprise SIEM supports PCI DSS compliance, meeting the challenges without leaving security gaps....

PCI DSS Compliance Guide

Compliance Guides

PCI DSS Compliance Guide

A step by step Compliance Guide detailing how Huntsman Enterprise SIEM supports PCI DSS regulations, meeting the challenges...

PSD2 Compliance Guide Overview

Compliance Guides

PSD2 Compliance Guide Overview

This paper gives an overview of The Payment Services Directive 2 (PSD2), the updated version of the original Payment Services...

PSD2 Compliance Guide

Compliance Guides

PSD2 Compliance Guide

Discover what the legislation means, the cyber security requirements and how Huntsman Security technology maps to the standard....

Business Value of Monitoring

Infographics

Business Value of Monitoring

Check out the Business Value of Monitoring Infographic... do you know the value Cyber Security Monitoring adds to your business?...

C2M2 Infographic

Infographics

C2M2 Infographic

This infographic gives a simple visualisation of the C2M2 Model...

PSD2 Operational Risk & Security Guidelines

Infographics

PSD2 Operational Risk & Security Guidelines

This infographic gives a simple visualisation of PSD2 Operational Risk & Security Guidelines....

Security Incident Handling (Threat Overload)

Infographics

Security Incident Handling (Threat Overload)

Security Incident Handling to avoid Threat Overload.... check out the infographic....

Essential 8 Auditor

Product Brochures

Essential 8 Auditor

An audit tool that delivers an immediate view of your organisation's security controls....

Essential 8 Scorecard

Product Brochures

Essential 8 Scorecard

A risk management tool that continuously measures the effectiveness of your security controls....

Next Gen SIEM

Product Brochures

Next Gen SIEM

A next generation SIEM, with inbuilt behavioural anomaly detection and threat intelligence....

Next Gen SIEM MSSP

Product Brochures

Next Gen SIEM MSSP

Next Gen SIEM MSSP reduces service delivery costs, simplifies the security management process and accelerates revenue generation....

Next Gen SIEM Cloud

Product Brochures

Next Gen SIEM Cloud

Next Gen SIEM Cloud provides security monitoring for your cloud service infrastructure and as a value-added security monitoring...

Next Gen SIEM SOAR

Product Brochures

Next Gen SIEM SOAR

Security Automation that verifies threats and reduces False Positives, freeing analysts to focus on real threats....

Behaviour Anomaly Detection brochure

Product Brochures

Behaviour Anomaly Detection

Explore how Huntsman uses machine-based learning to deliver behavioural profiling and detection of threats not identified by...

Huntsman Multi Tenancy

Product Brochures

Huntsman Multi Tenancy

Discover how Huntsman’s Multi-Tenancy allows security service providers to separate customer data and reporting, and segregate...

Forrester Wave 2018 Report

Product Brochures

Forrester Wave 2018 Report

Explore Forrester Research's review of Huntsman Security's Next Gen SIEM & Security Analytics technology....

Huntsman Threat Intelligence

Product Brochures

Huntsman Threat Intelligence

Explore how Huntsman Threat Intelligence sources cyber security intelligence and event context automatically, and in real-time....

Huntsman Extended Data Repository

Product Brochures

Huntsman Extended Data Repository

Huntsman Extended Data Repository provides access to longer-term data across multiple, parallel distributed repositories whilst...

Huntsman High Availability Licence Pack

Product Brochures

Huntsman High Availability Licence Pack

Huntsman High Availability provides the capabilities to deliver, true active-active or active-passive resilience and effective...

Cloud Solution Brief

Solution Briefs

Cloud Security using Huntsman

How to use Huntsman to secure Cloud Platforms: Real-time, multi tenant, intelligent monitoring and event processing....

MSSP Solution Brief

Solution Briefs

MSSP Security using Huntsman

Discover how to scale your security services by using Huntsman SIEM technology to manage multiple customers on a single...

Threat Intelligence Solution Brief

Solution Briefs

Threat Intelligence using Huntsman

A detailed guide explaining how to use the Huntsman Security Platform to analyse threat Intelligence, improve situational...

Essential Guide to SIEM

Tools

Essential Guide to SIEM

How next generation SIEM works and its role in providing SOC teams with insights and a track record of activities....

MSP Guide to Building Cyber Security Services

Tools

MSP Guide to Building Cyber Security Services

An overview to establishing and growing your cyber security services....

A Guide to Cyber Security KPIs

Tools

A Guide to Cyber Security KPIs

An overview of defining, setting and monitoring KPIs for cyber security....

Personal Data Breach Mitigation - 4 Step Checklist

Tools

Personal Data Breach Mitigation - 4 Step Checklist

Preventative strategies to minimise the number of data breaches including practical examples....

Essential Guide to Data Breach Notifications

Tools

Essential Guide to Data Breach Notifications

One of the most hotly talked about requirements of GDPR is the need to notify the authority within 72 hours of a confirmed breach....

Cloud Security Service Options for Cloud Service Providers

Tools

Cloud Security Service Options for Cloud Service Providers

An introduction to cloud security service options....

Essential Guide to Cyber Security NCSC 10 Steps

Tools

Essential Guide to Cyber Security NCSC 10 Steps

Implement the UK's NCSC 10 Steps to Cyber Security with our helpful, structured, progressive plan....

5 Best Practice ISMS Checklists

Tools

5 Best Practice ISMS Checklists

Benchmark your current ISMS...against our 5 Best Practice ISMS Checklists....

5 Step Cyber Security Benchmark Tool

Tools

5 Step Cyber Security Benchmark Tool

Measure your organisation's cyber posture with our 5 Step Cyber Security Benchmark Tool....

Analyst Portal short video

Video / Webinar

Analyst Portal short video

Learn how to eliminate False Positives...

Automation Short Video

Video / Webinar

Automation Short Video

Improve your Incident Response...

BAD Short Video

Video / Webinar

BAD Short Video

See unknown threats in real-time...

Cyber Risk Measurement – Executive Visibility

Video / Webinar

Cyber Risk Measurement – Executive Visibility

Watch the video and see how the Security Scorecard provides Executives with visibility of cyber KPIs...

Cyber Security Incidents and Attacks

Video / Webinar

Cyber Security Incidents and Attacks

This video explains how cyber attacks vary by geography and industry. In just 8 minutes discover the costs of attacks and the...

Information Access Control

Video / Webinar

Information Access Control

Discover the 5 reasons why access control is vital, the 4 main approaches, potential dangers and implementation tips....

Protective Monitoring

Video / Webinar

Protective Monitoring

Protective Monitoring...learn why it's important and how to apply it in your organisation....

Security Scorecard Overview

Video / Webinar

Security Scorecard Overview

Watch the video and see how the Security Scorecard provides Executives with visibility of cyber KPIs...

Analytics and Automation in Cyber Security

White Papers

Analytics and Automation in Cyber Security

Alert volumes are increasing every year. Explore how automation can help reduce routine tasks and identify real threats for your...

ASD Essential Eight Security Controls: The Missing Ninth Step

White Papers

ASD Essential Eight Security Controls: The Missing Ninth Step

Discover the critical ninth step to maximise the visibility and measurement of the Essential 8, including vital links to official...

Cloud Security - Monitoring to the ASD Essential Eight

White Papers

Cloud Security - Monitoring to the ASD Essential Eight

Learn how integrating a SIEM platform with a cloud service can help your organisation unmask threats and provide a full security...

Cyber Security Predictions 2019

White Papers

Cyber Security Predictions 2019

Looking forward to the next year in cyber security: gain insight into how 2019 may impact your organisation's risk exposure....

GDPR - What the new Data Protection Regulations mean to UK Businesses

White Papers

GDPR - What the new Data Protection Regulations mean to UK Businesses

Explore the conditions that indicate if GDPR applies to your business and your commitment once a breach is detected....

Maintaining Public Confidence - Information Monitoring in Criminal Justice

White Papers

Information Monitoring in Criminal Justice

Protecting information assets in the Criminal Justice space is key to upholding the system. Explore further....

Maintaining Public Confidence - Information Monitoring in Government

White Papers

Information Monitoring in Government

Information monitoring in government is a challenge, the public's trust is only as good as the last headline....

Insider Threats: Why behaviour is key to early detection

White Papers

Insider Threats: Why behaviour is key to early detection

Insider Threats is one of the greatest security risks to your organisation's information assets. Read more....

GDPR - What the New Regulations mean in Australia

White Papers

GDPR - What the New Regulations mean in Australia

Explore how the conditions of GDPR affect Australian business....

Scorecard Overview

White Papers

Scorecard Overview

Explore just eight cyber controls to protect your business, how to get clear visibility of your cyber security posture and the...

The Cyber Security Malware Crisis is Deepening

White Papers

The Cyber Security Malware Crisis is Deepening

Explore the scale of cyber threats businesses face and the technology, people and process aspect of the challenge....

The Internet Of Things

White Papers

The Internet Of Things

The Internet of Things (IoT) is a challenge for all of us, at home and in the workplace. Explore the security implications....

Top Cyber Mitigation Strategies

White Papers

Top Cyber Mitigation Strategies

Key Governments' cyber mitigation recommendations to defend your business from cyber attacks....

Cloud Computing: Multiplying the Risks

White Papers

Cloud Computing: Multiplying the Risks

This paper discusses the benefits and drawbacks of cloud computing, and looks at the implications for IT security, compliance and...

CNI Protection: Time to get serious

White Papers

CNI Protection: Time to get serious

How do we identify and manage cyber security exposure in critical infrastructure? Explore the role of SIEM....

Cyber Espionage: Is it delusion?

White Papers

Cyber Espionage: Is it delusion?

Cyber espionage is the theft of secrets in digital format and it’s increasing....

Cyber Risk: Assume you are breached

White Papers

Cyber Risk: Assume you are breached

How exposed are you to cybercrime? Very exposed it seems....

Cyber Risk reduction: Why Automated Threat Verification is Key

White Papers

Cyber Risk reduction: Why Automated Threat Verification is Key

Automated Threat Verification will reduce costs and slash your organisation's time at risk. Find out how .......

Fraud Prevention & IT Security

White Papers

Fraud Prevention & IT Security

How SIEM technology can monitor and prevent cyber fraud, and protect your organisation's information assets....

How to break down information silos

White Papers

How to break down information silos

Explore the costs imposed by non-integrated security platforms, and the risk implications for threat and compliance management....

IT Governance: The Director's Cut

White Papers

IT Governance: The Director's Cut

IT Governance, Risk and Compliance - find out what directors need to know to protect their company's assets....

Protecting Privacy: Is it too late?

White Papers

Protecting Privacy: Is it too late?

How much personal data is being collected by who? Explore why security technologies are needed to enforce privacy regulations....