Our cyber security products span from our next gen SIEM used in the most secure government and critical infrastructure environments, to automated cyber risk reporting applications for commercial and government organisations of all sizes.
Learn how integrating a SIEM platform with a cloud service can help your organisation unmask threats and provide a full security picture: dashboards to track compliance against the Essential Eight cyber mitigation strategies.
"*" indicates required fields
In February 2017, the Australian Signals Directorate (ASD) published a guideline listing eight critical cyber mitigation strategies, to which all government departments should adhere.
On 15 March 2022, the Protective Security Policy Framework was amended to mandate the Essential Eight, Maturity Level Two for all non-corporate Commonwealth entities. The mandatory implementation of the additional four controls is a core requirement from 1 July 2022.
Huntsman Security’s dashboard for the ACSC Essential Eight allows customers to continually monitor their maturity against each of the cyber security mitigation strategies in real-time.
DOWNLOAD OUR CLOUD SECURITY WHITE PAPER NOW AND DISCOVER:
Read by directors, executives, and security professionals globally, operating in the most complex of security environments.