Book a demo form

Request a Trial

E8 Brochure Campaign Traffic

Resource Download

Contact Us

Signup Form (Blog Page and Resources Page)

Services Signup (MSSP page popup)

Essential 8 14 Day Trial

MITRE Att@ck Download (SEIM Pages 2021)

Book a demo form

Landing page - free trial form

Request a Trial

E8 Brochure Campaign Traffic

Landing page - E8 demo form

Download the SmartCheck Brochure

Request a SmartCheck demo

Cyber Risk Measurement

cyber risk measurement solution to support business decision making

Gain visibility of your organisation’s cyber risk

If your organisation’s stakeholders don’t have a clear, shared view of your organisation’s cyber security posture, how can they manage it and incorporate it into their risk management decision making? Having the ability to quantify cyber risk is imperative in today’s operating environment.  Imagine having:

  • An immediate view of security control effectiveness
  • A continuous measurement of cyber security posture
  • Visibility of performance, including trends over time – benchmarked against a known framework
  • Assurance that you are improving resistance to cyber threats

Huntsman Security’s Essential 8 Auditor  and Essential 8 Scorecard solutions can provide your organisation’s stakeholders with instant, objective visibility of how the business is tracking against the most common cyber defence stress points.

Essential 8 Auditor product executes a cyber risk auditEssential 8 Scorecard product continuously measures essential 8 security control effectiveness


Explore Essential 8 Auditor  Explore Essential 8 Scorecard


Objective cyber metrics using a trusted framework

Using Australian government’s ACSC Essential Eight Mitigation Strategies, found to mitigate 85% of targeted attacks, the solutions deliver cyber security performance metrics measured and calculated against the eight most fundamental security controls required to protect your organisation.


eight strategies to mitigate 85% of targeted cyber attacks


Automation delivers instant reporting

The Essential 8 Auditor and the Essential 8 Scorecard streamline and minimise the operational security reporting overhead on your team; they simply gather data from ongoing security operations and through direct connections to systems and configuration interfaces to automatically establish weak points, policy failures and vulnerabilities to the most common attack types; vulnerabilities that are said to have led to more than 85% of enterprise security breaches and malware outbreaks in recent years.

The functionality provides summary and detailed control status reports covering:

  • Patching and vulnerability management of systems and applications
  • Application control, patching, configuration and macro execution control
  • User management and authentication
  • Privileged Admin Management activity
  • Daily backup of important data


Improve the communication of your cyber security posture

Sharing the key performance metrics of your organisation’s cyber security posture, gives you the best chance of protecting your business.   Giving all stakeholders key insights enables them to make informed decisions that drive the strategy, health and competitiveness of your business.

An image showing the Essential 8 Auditor dashboard of security control performance metrics and maturity

Essential 8 Auditor – Security Control Performance Dashboard


Cyber risk measurement with Huntsman Security Essential 8 tools


Flexibility and Visibility

  • Operates across cloud, on premise or hybrid environments
  • Supports Risk Management Framework requirements to measure & audit security control performance
  • Integrates with IRM platforms
  • Accurate and continuous view of common cyber defence stress points
  • Risk reporting – provides reliable metrics for management decision-making

Improves effectiveness of resources

  • Removes unknown of self-assessment and reporting
  • Instantly identifies weaknesses for remediation
  • Minimises operational security reporting commitments
  • Saves time, cost and money when compared to a breach

Aligns to Government recommendations


Find out more about cyber risk measurement


Download Essential 8 Case Study

Request more Info