Our cyber security products span from our next gen SIEM used in the most secure government and critical infrastructure environments, to automated cyber risk reporting applications for commercial and government organisations of all sizes.
What are Cookies?
Cookies are small text files that can be used by websites to make a user’s experience more efficient. They are downloaded to your device when you visit a website.
Cookies allow websites to recognise a user’s device and allow you to navigate between pages efficiently, remember preferences and generally improve the user experience. They can also be used to tailor advertising to your interests through tracking your browsing across websites.
Session cookies are deleted when you close your browser and persistent cookies remain on your device after the browser is closed.
Some cookies collect your IP address which is a numeric code that identifies your computer on the internet. Your IP address might be used to gather broad demographic information and geography.
Types of Cookies
Huntsman Security uses the following types of cookies:
These cookies help make the website usable by enabling basic functions like page navigation and access to secure areas of the website. The website cannot function properly without these cookies.
These cookies enable the website to remember information that changes the way the website behaves or looks, like the region that you are in.
Statistics cookies help us understand how visitors interact with the website by collecting and reporting information anonymously.
Marketing cookies are used to track visitors across the website. The intention is to display ads that are relevant and engaging for the individual user and thereby more valuable for third party advertisers.
We are in the process of classifying these.
To review a full list of all the cookies we use, and their type, please refer to the Cookie Declaration.
Opting Out of or Disabling Cookies
Third Party Websites
Read by directors, executives, and security professionals globally, operating in the most complex of security environments.