Our cyber security products span from our next gen SIEM used in the most secure government and critical infrastructure environments, to automated cyber risk reporting applications for commercial and government organisations of all sizes.
with a cost effective, automated out-of-the-box resource
know your cyber hygiene and maturity in minutes
to report on your risk management status against the Essential Eight controls
Essential 8 Auditor offers cost and time savings for Security and Risk teams, who typically run their own manual or 3rd party auditor assessment against the Australian Cyber Security Centre (ACSC) Essential Eight controls. It lets you know your cyber maturity rating and what needs to be done – in minutes.
Typically, organisations follow a manual assessment process which can be disruptive and often delivers an inaccurate picture. Teams have the time-consuming task of responding to questionnaires that attempt to identify a range of issues from legacy assets, to unlicensed devices as well as cyber vulnerabilities. Responses to checklists can be subjective, and that is why the Essential 8 Auditor automates and formats this activity into reliable data-driven security reporting in minutes.
Utilising the Essential 8 Auditor application, analysts can easily connect to your organisation’s relevant data sources and endpoints, and within minutes, visualise your cyber maturity score, enabling mitigation by following a simple ‘to-do’ list. Equally importantly, each of the eight control reports highlights the coverage or proportion of the IT assets audited and assessed and any assets excluded from the measurement.
Whether it’s enterprise-scale or a smaller SMB environment the Essential 8 Auditor out-of-the-box software is quick to install and set up – not requiring external staff or specialists for implementation or use. Starting at a $6,500 investment, we find that our customers quickly generate payback on their investment through the regular use of this highly effective cyber security diagnostic and risk assessment application.
allows for self-installation, with optional support from Huntsman Security
by using the Essential 8 Auditor to avoid time-intensive manual reviews
with the Essential 8 Auditor’s ease of set-up, automation and cost-efficient annual fee
For organisations with growing IT governance obligations or those that simply prioritise risk and cyber security management, the Essential 8 Auditor can be of major assistance in your performance improvement and security uplift program. It provides an evidential trail of performance, and pinpoints any areas of concern, to guide the next steps for both IT and Executive teams. With its comprehensive Attack Surface Management (ASM) capabilities, the Essential 8 Auditor automatically verifies your IT assets, measures vulnerabilities and reports any areas of changing cyber risk.
The Essential 8 Auditor is a quantitative and highly scalable risk measurement solution that delivers an easy-to-follow remediation list and empowers both IT and Executive teams to guide their security strategy with the automated checks and balances that align with the ACSC’s Essential Eight security controls.
For Australian Federal Government departments required to report against the Protective Security Policy Framework (PSPF) or State based departments seeking to assess compliance with their State or Territory’s Information Security Policies, the Essential 8 Auditor is a simple solution to inform improvement and manage compliance.
The full range of readily available reporting ensures that directors, management and staff, can maintain transparency of cyber security information across the entire organisation. This is fully supported from the ground up with verifiable quantitative risk measurement for data-driven security decision making.
of your entire organisation – its servers and endpoints, at any time
reporting against Government security policies and controls at all levels
tracks events for evidential reporting and pinpoints areas of concern
The Essential 8 Auditor automates and accurately reports on the status of your risk management efforts against the ACSC Essential Eight controls. It provides risk and management teams with visibility into your current cyber posture: the effectiveness of your current controls, any of those controls requiring specific uplift, and the balance or residual risk outstanding.
Executives and Management value the Essential 8 Auditor as it provides reliable evidence of performance on-demand. It identifies cyber vulnerabilities, provides benchmarked ratings and maturity levels against the ACSC Essential Eight controls and, pinpoints areas of concern across IT systems and users. It can also be used for third-party suppliers.
Automated and trackable remediation activities allow analysts to run subsequent and regular assessments (without any additional licensing costs) to instantly measure any improvements in your cyber security performance that might further reduce any residual risk.
and seamless reporting on the status of your risk management activities
empowering analysts with easy-to-follow mitigation steps
your cyber security score and re-assess your score at any time
See how the Essential 8 Auditor can automatically assess security controls across your entire environment, to produce an immediate and verifiable measure of their maturity.Request a demo
At any time, your team can run a quick and easy check to understand the alignment of your internal security posture and security policy.Read more
Built-in transparency, that provides users with visibility and oversight of the datasets and methodology used for analysis and reporting.Read more
By baselining the current security controls and their effectiveness, the Essential 8 Auditor also highlights IT risks that are not adequately managed.Read more
|On-demand operation||Empirical measurement||Gap analysis, to uplift resilience||Live dashboards (data export available)||Data-driven assessment|
|Systematic risk-reporting framework||Executive security summary reports||“To-do” list for non-compliant endpoints||ACSC Security maturity level determination (L0 – L3)|
|Light weight||Easy self-install||Agentless||Upgrades to latest ACSC Essential Eight recommendations|
|Product Support and Service|
|Phone/Email (incl.)||Onsite available|
The Essential 8 Auditor provides on-demand cyber vulnerability & maturity assessment, to measure your security compliance against the ACSC Essential Eight cyber security framework. It protects IT assets, systems and sensitive information on-site and in remote locations, and scales as your organisation expands across on-premise, cloud-based and hybrid IT environments.
By automating data collection and audit functions, the Essential 8 Auditor turns complex security data into actionable reporting for risk management decision making. It provides faster and more accurate assessment of your cyber posture and the state of your prevention, containment and recovery controls.
Our easy-to-use software allows you to measure your Essential Eight maturity score in minutes. Whether yours is an on-prem or cloud environment it produces a comprehensive ‘to-do’ list of security issues for remediation by your Security Risk team.
Once mitigation activities are complete, the Essential 8 Auditor application can be run regularly to produce an updated Essential Eight maturity score. It gives stakeholders a clear and timely view of your cyber security control effectiveness, to reveal any residual risk.
Our Essential 8 Auditor application puts you in control of your organisation’s cyber security rating, to guide your next steps. It provides on-demand cyber KPI measurements and a ‘window into the security engine room’ for operations teams and Boards of Directors. Resilience metrics for improvement processes and prioritised ‘to do’ lists inform the management of security controls and effective oversight.
Read by directors, executives, and security professionals globally, operating in the most complex of security environments.