View all newsletters
Receive our newsletter - data, insights and analysis delivered to you

Huntsman Security seek SIEM feed aggregation amid rebrand

Release comes amid skills shortage and cybersecurity fragmentation fears.

By Jimmy Nicholls

Huntsman Security has launched its Unified Console in a bid to bring together disparate legacy SIEM feeds into a single dashboard.

The release comes amid growing fears of fragmentation in security as well as a growing skills shortage, and aims to give IT departments an oversight of all security events from one source.

Peter Woollacott, chief executive of Huntsman, said: "The modern, global enterprise can easily use a variety of different security monitoring solutions; whether for the networks, platform support and compliance teams; or for operations in London, New York, Melbourne or Bombay.

"No single one of these solutions will give the business what it needs at the highest level, yet replacing them simply isn’t an option.

"Unified Console tackles this challenge head-on by helping companies to modernise their legacy security solutions, manage multiple environments from a single console and extend investments in their current SIEM infrastructure."

Features of the Unified Console include live security and compliance statuses, a behavioural anomaly detector and a modular design.

The release coincides with a rebranding from the Tier-3 Huntsman moniker as well as the $10m launch of a US subsidiary in Silicon Valley on Thursday.

Content from our partners
Scan and deliver
GenAI cybersecurity: "A super-human analyst, with a brain the size of a planet."
Cloud, AI, and cyber security – highlights from DTX Manchester

"Cybersecurity solutions have come a long way in recent years and are well suited to track and identify potential breaches from massive amounts of data," said Rob Enderle, president and principal analyst, of the Enderle Group, a research firm.

"However, recent Target, Sony and Adobe breaches illustrate the challenges involved with running a 21st century business and the need to identify and act on legitimate risks immediately.

"In most high profile breaches, slow time to resolution, not lack of recognition, is the issue that brings companies to their knees."

Websites in our network
Select and enter your corporate email address Tech Monitor's research, insight and analysis examines the frontiers of digital transformation to help tech leaders navigate the future. Our Changelog newsletter delivers our best work to your inbox every week.
  • CIO
  • CTO
  • CISO
  • CSO
  • CFO
  • CDO
  • CEO
  • Architect Founder
  • MD
  • Director
  • Manager
  • Other
Visit our privacy policy for more information about our services, how Progressive Media Investments may use, process and share your personal data, including information on your rights in respect of your personal data and how you can unsubscribe from future marketing communications. Our services are intended for corporate subscribers and you warrant that the email address submitted is your corporate email address.