Download the datasheet. The Huntsman Security Information & Event Management (SIEM) is architected to operate independently in secure environments. Access Now, Download Huntsman Security's ASD ISM Compliance Guide and learn how to meet your obligations to the requirements., Download the GPG13 Compliance Guide Overview Security Operations & Management. More recent guidance has focused on the wider process objectives such as logging, threat detection and incident handling. In some of the finer detail, this guidance echoes the requirements of GPG13 with regard to protective monitoring., Download the free Essential 8 Auditor eGuide to find out how you can approach your defensive position, or contact us directly to organise a 20-minute cyber-gap conversation with a Huntsman Security expert., Download our Essential Eight Compliance Guide to discover how to measure the effectiveness of your organisation’s security controls using Huntsman Security’s Essential Eight solutions., Huntsman Security’s Enterprise SIEM incorporates a new easy-to-use dashboard, for SOC or IT teams to access the MITRE ATT&CK® framework and quickly detect threats and identify and classify their type and severity..