Our cyber security products span from our next gen SIEM used in the most secure government and critical infrastructure environments, to automated cyber risk reporting applications for commercial and government organisations of all sizes.
(Source: CIO.com) As we ramp up for RSA, it is interesting that one common cross vendor theme is coming up. HP’s ArcSight installed base has become the great SIEM [Security Information and Event Management] hunting ground. Meg Whitman has effectively killed yet another HP acquisition. Having been through some ugly acquisitions myself, I try to use every example of contrasting how to do these things right vs. how to do them very wrong. It seems that some executives either don’t want to do it right or they never really read the current definition of insanity “doing the same thing over and over expecting a different results.”
Don’t get me wrong, before Whitman came on board HP was kind of legendary for killing acquisitions. VoodooPC and Palm’s destruction were only the latest of a long string of firms HP bought and then systematically killed, wiping out millions to billions of value in what appears to be four easy-to-follow steps. Despite HPs past success in this area, Meg Whitman is turning doing it into a science. There appears to be no one better at killing acquisitions today than HP.
So this week, rather than focus on the firms that do this right, let’s focus on that magical skillset HP has for doing this masterfully wrong using ArcSight as the example.
Sydney, Australia, 21 November 2023 – Huntsman Security today announced its cyber security predictions for 2024, including organisations’ move to data-driven cyber security and the challenges posed by AI. The company considers why operational resilience will top the agenda in many more boardrooms, and how businesses will need to respond to these changing governance guidelines. […]Read more
Read the Huntsman Security insights into the Australian Prudential Regulation Authority (APRA) Cyber Audit findings, from a UK perspective in Financial IT – Applying an Australian Regulator’s Cyber Audit Findings, in a UK Context. Based on the insights of Piers Wilson, Head of Product Management at Huntsman Security, the article looks at the audit findings, […]Read more
Read Fear is the mind-killer: Governance key to safety in the cyber dunes a recent opinion piece on ComputerWeekly.com. The article, quoting Huntsman Security CEO, Peter Woollacott, examines the intelligence gained from cyber insurance, risk management frameworks, and the connections into cyber security and operational resilience. Click here to read the article.Read more
Sydney, Australia, 07 December 2022 Huntsman Security today announced its cyber security predictions for 2023, including the importance of cyber security posture, systematic risk management and the expected changes driven by the insurance industry. In addition, the company outlines why cyber security guidelines are likely to become more global, and why the industry needs to evolve […]Read more
The number of organizations that will be either unable to afford cyber insurance, be declined cover, or experience significant coverage limitations is set to double in 2023, according to Huntsman Security. Watch Help Net Security video here.Read more
A “perfect storm” of surging threats, economic headwinds and evolving regulations will see many organizations miss out on cyber-insurance in 2023, experts have warned. Read the Infosecurity article here.Read more
Organisations face perfect storm of evolving cyber security and compliance regulations and increased threats across the globe. Read the TEISS article here.Read more
Organisations looking to shore up their security postures face more and more barriers to obtaining cyber insurance. Read the Computer Weekly article here.Read more
Copyright © 2021MarketsandMarkets™ In a recent market-wide assessment by Analyst firm MarketsandMarkets (M&M), Huntsman Security was identified as one of the leading pervasive solutions in the security analytics space, reflecting its longevity and strength. “Pervasive players are established vendors with very strong business strategies.” M&M explain. As opposed to the product vendors who offer solutions […]Read more
Read by directors, executives, and security professionals globally, operating in the most complex of security environments.