Our cyber security products span from our next gen SIEM used in the most secure government and critical infrastructure environments, to automated cyber risk reporting applications for commercial and government organisations of all sizes.
Our cyber security products span from our next gen SIEM used in the most secure government and critical infrastructure environments, to automated cyber risk reporting applications for commercial and government organisations of all sizes.
Any organisation can be the target of cyber attackers or find itself exposed through the actions of malicious insiders. Leverage our industry specific cyber security awareness to help reduce risk.
Access our industry-leading resources to improve your cyber resilience
Since 1999, Huntsman Security has been on the cutting-edge of cyber security software development, serving some of the most sensitive and secure intelligence, defence and criminal justice environments in the world.
It SIEM’s Huntsman Security has developed game changing technology that makes a real difference in cyber security incident management and resolution.
Huntsman Security, owned by Sydney based cyber security company, Tier-3, today announced the launch of its new vendor-agnostic machine learning-based Automated Threat Verification (ATV) technology. CEO Peter Woollacott, says this is one of the most exciting updates in the security technology space for years and, “There has never been more security intelligence available to support cybersecurity specialists. The problem however is that there is a dependency on manual processing of this machine-generated information. Consequently, security specialists are struggling to isolate the real threats from the noise and valuable time is lost.” Woollacott went on to say, “In environments that generate billions of events per day, current solutions can’t scale for speedy detection or resolution. With ATV at its core the Huntsman Analyst Portal® dramatically reduces the critical delay between threat detection and resolution by focusing analyst resources on the threats that really matter.”
Read by directors, executives, and security professionals globally, operating in the most complex of security environments.