Book a demo form

Book a demo

E8 Brochure Campaign Traffic

Resource Download

Contact Us

Signup Form (Blog Page and Resources Page)

Services Signup (MSSP page popup)

MITRE Att@ck Download (SEIM Pages 2021)

Book a demo form

Landing page - free trial form

Book a demo

E8 Brochure Campaign Traffic

Landing page - E8 demo form

Download the SmartCheck Brochure

Request SmartCheck for Ransomware Demo

SmartCheck for Ransomware Demo

SmartCheck Demo LP

SmartCheck Demo LP 2

MITRE ATT@CK Webinar - Jun 2022

you must read and acknowledge our privacy policy

July 2022 Landing Page (Brochure Download)

  • This field is for validation purposes and should be left unchanged.

July 2022 Landing Page (Director)

  • This field is for validation purposes and should be left unchanged.

Insurance - 25 Minute Q&A

  • This field is for validation purposes and should be left unchanged.

Insurance - Checklist Download

  • This field is for validation purposes and should be left unchanged.

Contact Us (Japan New)

  • お問い合わせフォーム


ASD ISM Compliance Solution

ASD ISM July 2019 compliance solution

Achieve ASD ISM Compliance 

The latest Australian Government Information Security Manual (ISM), released in June2020, outlines a cyber security framework formulated by the Australian Cyber Security Centre (ACSC) within the Australian Signals Directorate (ASD).   The framework is designed to be applied by organisations, using their risk management framework, to protect their information and systems from cyber threats.

Achieve ISM compliance with the help of Huntsman Security’s security solution.

Download the latest ISM Compliance Guide

A summary of the ISM Risk Framework

The risk management framework used by the ISM draws from National Institute of Standards and Technology (NIST) Special Publication (SP) 800-37 Rev. 2.  Broadly, the ISM risk management framework includes six steps that organisations should follow and maintain to protect their assets:

Step 1 – Define the system

Determine the value of the system, and the information it processes, stores and communicates, based on an assessment of the impact if it were to be compromised.

Step 2 – Select security controls

Using a risk assessment, select security controls for the system and tailor them to achieve an acceptable residual risk.

Step 3 – Implement security controls

Implement security controls and document how they are implemented within the system and its operational environment.

Step 4 – Assess security controls

Assess security controls for the system and its environment to determine if they have been implemented correctly and are operating as intended.

Step 5 – Authorise the system

Authorise the system to operate based on the acceptance of the security risks associated with its operation.

Step 6 – Monitor the system

Monitor the system, and associated cyber threats, security risks and security controls, on an ongoing basis.


How Huntsman Security supports ISM compliance 

Huntsman Security’s solution helps you fulfil the requirements of the ISM within three key areas:

Essential 8 Scorecard

The Essential 8 Scorecard continuously scans and measures the effectiveness of your organisation’s security controls against the ACSC Essential 8 Framework.  It delivers a continuous view of your cyber posture by automatically gathering data from ongoing security operations and through direct connections and configuration interfaces.   The Scorecard identifies and reports on coverage, weak points, policy failures and vulnerabilities against each of the controls.

Essential 8 Scorecard Trend Reporting

Essential 8 Scorecard – Trend Report

Explore Security Control measurement tools

Enterprise SIEM

Huntsman Security’s Enterprise SIEM is a high volume, high speed next generation SIEM with inbuilt threat intelligence and behaviour anomaly detection.  The technology undertakes high speed analysis of large volume streams of data to accurately detect non-compliant system activity, anomalous behaviour, security issues and cyber threats in real-time.

The technology has a proven track record of protecting environments within government, defence, intelligence and critical infrastructure.

Next Gen SIEM incident response dashboard showing current status

Huntsman SIEM Dashboard – Incident Status

Explore Enterprise SIEM


Find out more about ASD ISM compliance

Email for more Info