View all newsletters
Receive our newsletter - data, insights and analysis delivered to you

Huntsman Security seek SIEM feed aggregation amid rebrand

Release comes amid skills shortage and cybersecurity fragmentation fears.


Huntsman Security has launched its Unified Console in a bid to bring together disparate legacy SIEM feeds into a single dashboard.

The release comes amid growing fears of fragmentation in security as well as a growing skills shortage, and aims to give IT departments an oversight of all security events from one source.

Peter Woollacott, chief executive of Huntsman, said: "The modern, global enterprise can easily use a variety of different security monitoring solutions; whether for the networks, platform support and compliance teams; or for operations in London, New York, Melbourne or Bombay.

"No single one of these solutions will give the business what it needs at the highest level, yet replacing them simply isn’t an option.

"Unified Console tackles this challenge head-on by helping companies to modernise their legacy security solutions, manage multiple environments from a single console and extend investments in their current SIEM infrastructure."

Features of the Unified Console include live security and compliance statuses, a behavioural anomaly detector and a modular design.

The release coincides with a rebranding from the Tier-3 Huntsman moniker as well as the $10m launch of a US subsidiary in Silicon Valley on Thursday.

Content from our partners
Why all businesses must democratise data analytics
How start-ups can take the next step towards scaling up
Unlocking the value of artificial intelligence and machine learning

"Cybersecurity solutions have come a long way in recent years and are well suited to track and identify potential breaches from massive amounts of data," said Rob Enderle, president and principal analyst, of the Enderle Group, a research firm.

"However, recent Target, Sony and Adobe breaches illustrate the challenges involved with running a 21st century business and the need to identify and act on legitimate risks immediately.

"In most high profile breaches, slow time to resolution, not lack of recognition, is the issue that brings companies to their knees."

Websites in our network
NEWSLETTER Sign up Tick the boxes of the newsletters you would like to receive. Tech Monitor's research, insight and analysis examines the frontiers of digital transformation to help tech leaders navigate the future. Our Changelog newsletter delivers our best work to your inbox every week.
I consent to New Statesman Media Group collecting my details provided via this form in accordance with the Privacy Policy