huntsmansecurity.com Open in urlscan Pro
162.159.134.42  Public Scan

Submitted URL: https://www.huntsmansecurity.co.uk/
Effective URL: https://huntsmansecurity.com/
Submission: On August 07 via automatic, source certstream-suspicious — Scanned from AU

Form analysis 2 forms found in the DOM

GET https://huntsmansecurity.com

<form action="https://huntsmansecurity.com" method="GET">
  <input type="text" name="s" id="s" class="input-search" placeholder="What would you like to find?">
  <button type="submit">
    <svg width="32" height="32" viewBox="0 0 32 32" fill="none" xmlns="http://www.w3.org/2000/svg">
      <path opacity="0.3"
        d="M19.0573 22.2761C18.5366 21.7554 18.5366 20.9112 19.0573 20.3905C19.578 19.8698 20.4222 19.8698 20.9429 20.3905L26.2762 25.7239C26.7969 26.2446 26.7969 27.0888 26.2762 27.6095C25.7555 28.1302 24.9113 28.1302 24.3906 27.6095L19.0573 22.2761Z"
        fill="#002B4E"></path>
      <path fill-rule="evenodd" clip-rule="evenodd"
        d="M5.33325 14.6666C5.33325 19.8213 9.51193 24 14.6666 24C19.8212 24 23.9999 19.8213 23.9999 14.6666C23.9999 9.51199 19.8212 5.33331 14.6666 5.33331C9.51193 5.33331 5.33325 9.51199 5.33325 14.6666ZM21.3333 14.6666C21.3333 18.3485 18.3485 21.3333 14.6666 21.3333C10.9847 21.3333 7.99992 18.3485 7.99992 14.6666C7.99992 10.9847 10.9847 7.99998 14.6666 7.99998C18.3485 7.99998 21.3333 10.9847 21.3333 14.6666Z"
        fill="#002B4E"></path>
    </svg>
  </button>
  <button type="button" class="btn-close-search">
    <svg width="32" height="32" viewBox="0 0 32 32" fill="none" xmlns="http://www.w3.org/2000/svg">
      <path d="M8.16675 8.16669L24.8334 24.8334" stroke="#002B4E" stroke-width="2" stroke-linecap="round" stroke-linejoin="round"></path>
      <path d="M8.16675 24.8334L24.8334 8.16669" stroke="#002B4E" stroke-width="2" stroke-linecap="round" stroke-linejoin="round"></path>
    </svg>
  </button>
</form>

POST /#gf_1

<form method="post" enctype="multipart/form-data" target="gform_ajax_frame_1" id="gform_1" action="/#gf_1" data-formid="1" novalidate="">
  <div class="gform-body gform_body">
    <div id="gform_fields_1" class="gform_fields top_label form_sublabel_below description_below validation_below">
      <div id="field_1_1" class="gfield gfield--type-email gfield--input-type-email gfield_contains_required field_sublabel_below gfield--no-description field_description_below field_validation_below gfield_visibility_visible"
        data-js-reload="field_1_1"><label class="gfield_label gform-field-label" for="input_1_1">Email<span class="gfield_required"><span class="gfield_required gfield_required_text">(Required)</span></span></label>
        <div class="ginput_container ginput_container_email">
          <input name="input_1" id="input_1_1" type="email" value="" class="large" placeholder="E-mail address" aria-required="true" aria-invalid="false">
        </div>
      </div>
      <div id="field_1_2" class="gfield gfield--type-hidden gfield--input-type-hidden gform_hidden field_sublabel_below gfield--no-description field_description_below field_validation_below gfield_visibility_visible" data-js-reload="field_1_2">
        <div class="ginput_container ginput_container_text"><input name="input_2" id="input_1_2" type="hidden" class="gform_hidden" aria-invalid="false"
            value="https://app-3QNMK6DPRQ.marketingautomation.services/webforms/receivePostback/MzawMLEwMjA2BwA/"></div>
      </div>
      <div id="field_1_3" class="gfield gfield--type-hidden gfield--input-type-hidden gform_hidden field_sublabel_below gfield--no-description field_description_below field_validation_below gfield_visibility_visible" data-js-reload="field_1_3">
        <div class="ginput_container ginput_container_text"><input name="input_3" id="input_1_3" type="hidden" class="gform_hidden" aria-invalid="false" value="efcad5c3-0c8b-4eac-9b04-5a1ce35c8912"></div>
      </div>
      <fieldset id="field_1_4"
        class="gfield gfield--type-consent gfield--type-choice gfield--input-type-consent gfield_contains_required field_sublabel_below gfield--no-description field_description_below hidden_label field_validation_below gfield_visibility_visible"
        data-js-reload="field_1_4">
        <legend class="gfield_label gform-field-label gfield_label_before_complex">Marketing<span class="gfield_required"><span class="gfield_required gfield_required_text">(Required)</span></span></legend>
        <div class="ginput_container ginput_container_consent"><input name="input_4.1" id="input_1_4_1" type="checkbox" value="1" aria-required="true" aria-invalid="false"> <label
            class="gform-field-label gform-field-label--type-inline gfield_consent_label" for="input_1_4_1">I agree to receive educational material, product information and event invitations from Huntsman Security<span
              class="gfield_required gfield_required_text">(Required)</span></label><input type="hidden" name="input_4.2" value="I agree to receive educational material, product information and event invitations from Huntsman Security"
            class="gform_hidden"><input type="hidden" name="input_4.3" value="11" class="gform_hidden"></div>
      </fieldset>
      <fieldset id="field_1_5"
        class="gfield gfield--type-consent gfield--type-choice gfield--input-type-consent gfield_contains_required field_sublabel_below gfield--no-description field_description_below hidden_label field_validation_below gfield_visibility_visible"
        data-js-reload="field_1_5">
        <legend class="gfield_label gform-field-label gfield_label_before_complex">Agree<span class="gfield_required"><span class="gfield_required gfield_required_text">(Required)</span></span></legend>
        <div class="ginput_container ginput_container_consent"><input name="input_5.1" id="input_1_5_1" type="checkbox" value="1" aria-required="true" aria-invalid="false"> <label
            class="gform-field-label gform-field-label--type-inline gfield_consent_label" for="input_1_5_1">I have read the <a href="/privacy-policy/" target="_blank">privacy notice</a><span
              class="gfield_required gfield_required_text">(Required)</span></label><input type="hidden" name="input_5.2" value="I have read  the <a href=&quot;/privacy-policy/&quot; target=&quot;_blank&quot;>privacy notice</a>"
            class="gform_hidden"><input type="hidden" name="input_5.3" value="11" class="gform_hidden"></div>
      </fieldset>
      <div id="field_1_6" class="gfield gfield--type-captcha gfield--input-type-captcha field_sublabel_below gfield--no-description field_description_below hidden_label field_validation_below gfield_visibility_visible" data-js-reload="field_1_6">
        <label class="gfield_label gform-field-label" for="input_1_6">CAPTCHA</label>
        <div id="input_1_6" class="ginput_container ginput_recaptcha gform-initialized" data-sitekey="6Lf95yApAAAAAF0_GL29UZln8zLuLJNiBjG4wufu" data-theme="light" data-tabindex="-1" data-size="invisible" data-badge="bottomright">
          <div class="grecaptcha-badge" data-style="bottomright"
            style="width: 256px; height: 60px; display: block; transition: right 0.3s; position: fixed; bottom: 14px; right: -186px; box-shadow: gray 0px 0px 5px; border-radius: 2px; overflow: hidden;">
            <div class="grecaptcha-logo"><iframe title="reCAPTCHA" width="256" height="60" role="presentation" name="a-bu3kjjww2zly" frameborder="0" scrolling="no"
                sandbox="allow-forms allow-popups allow-same-origin allow-scripts allow-top-navigation allow-modals allow-popups-to-escape-sandbox allow-storage-access-by-user-activation"
                src="https://www.google.com/recaptcha/api2/anchor?ar=1&amp;k=6Lf95yApAAAAAF0_GL29UZln8zLuLJNiBjG4wufu&amp;co=aHR0cHM6Ly9odW50c21hbnNlY3VyaXR5LmNvbTo0NDM.&amp;hl=en&amp;v=hfUfsXWZFeg83qqxrK27GB8P&amp;theme=light&amp;size=invisible&amp;badge=bottomright&amp;cb=lusfoyts0xi4"
                tabindex="-1"></iframe></div>
            <div class="grecaptcha-error"></div><textarea id="g-recaptcha-response" name="g-recaptcha-response" class="g-recaptcha-response"
              style="width: 250px; height: 40px; border: 1px solid rgb(193, 193, 193); margin: 10px 25px; padding: 0px; resize: none; display: none;"></textarea>
          </div><iframe style="display: none;"></iframe>
        </div>
      </div>
    </div>
  </div>
  <div class="gform_footer top_label"> <input type="submit" id="gform_submit_button_1" class="gform_button button" value="Sign Up"
      onclick="if(window[&quot;gf_submitting_1&quot;]){return false;}  if( !jQuery(&quot;#gform_1&quot;)[0].checkValidity || jQuery(&quot;#gform_1&quot;)[0].checkValidity()){window[&quot;gf_submitting_1&quot;]=true;}  "
      onkeypress="if( event.keyCode == 13 ){ if(window[&quot;gf_submitting_1&quot;]){return false;} if( !jQuery(&quot;#gform_1&quot;)[0].checkValidity || jQuery(&quot;#gform_1&quot;)[0].checkValidity()){window[&quot;gf_submitting_1&quot;]=true;}  jQuery(&quot;#gform_1&quot;).trigger(&quot;submit&quot;,[true]); }">
    <input type="hidden" name="gform_ajax" value="form_id=1&amp;title=&amp;description=&amp;tabindex=0&amp;theme=gravity-theme">
    <input type="hidden" class="gform_hidden" name="is_submit_1" value="1">
    <input type="hidden" class="gform_hidden" name="gform_submit" value="1">
    <input type="hidden" class="gform_hidden" name="gform_unique_id" value="">
    <input type="hidden" class="gform_hidden" name="state_1"
      value="WyJ7XCI0LjFcIjpcIjcxYzczYmYyNmJlZjEzYjM5NzBhMzE5YzQ0NDAwNjRkXCIsXCI0LjJcIjpcIjI0NGEzMGI4NWExZTE3ZWIxMDI4ODhiOTVhOWU0ZTQ5XCIsXCI0LjNcIjpcImYxNGYwZDEyYjE3YWMyZDNmOTEwMDA4NzExYzI2ZDM3XCIsXCI1LjFcIjpcIjcxYzczYmYyNmJlZjEzYjM5NzBhMzE5YzQ0NDAwNjRkXCIsXCI1LjJcIjpcIjIxMzRhNzQ4NzRjOWRjZWQ0YmM5ODE5ODQyMmJjYjRmXCIsXCI1LjNcIjpcImYxNGYwZDEyYjE3YWMyZDNmOTEwMDA4NzExYzI2ZDM3XCJ9IiwiNDg4NWU5NDg0MzM3MDcxNzZmMjk4ZDlhYTVlYmUwM2EiXQ==">
    <input type="hidden" class="gform_hidden" name="gform_target_page_number_1" id="gform_target_page_number_1" value="0">
    <input type="hidden" class="gform_hidden" name="gform_source_page_number_1" id="gform_source_page_number_1" value="1">
    <input type="hidden" name="gform_field_values" value="">
  </div>
  <input type="hidden" id="ct_checkjs_0f49c89d1e7298bb9930789c8ed59d48" name="ct_checkjs" value="103243943">
  <script>
    setTimeout(function() {
      var ct_input_name = "ct_checkjs_0f49c89d1e7298bb9930789c8ed59d48";
      if (document.getElementById(ct_input_name) !== null) {
        var ct_input_value = document.getElementById(ct_input_name).value;
        document.getElementById(ct_input_name).value = document.getElementById(ct_input_name).value.replace(ct_input_value, '103243943');
      }
    }, 1000);
  </script><label class="apbct_special_field" id="apbct_label_id87901" for="apbct__email_id__gravity_form_87901">87901</label><input id="apbct__email_id__gravity_form_87901" class="apbct_special_field apbct__email_id__gravity_form" autocomplete="off"
    name="apbct__email_id__gravity_form_87901" type="text" value="87901" size="30" apbct_event_id="87901" maxlength="200"><input id="apbct_event_id_gravity_form_87901" class="apbct_special_field" name="apbct_event_id" type="hidden"
    value="87901"><input type="hidden" id="apbct_visible_fields_1" name="apbct_visible_fields"
    value="eyIwIjp7InZpc2libGVfZmllbGRzIjoiaW5wdXRfMSIsInZpc2libGVfZmllbGRzX2NvdW50IjoxLCJpbnZpc2libGVfZmllbGRzIjoiaW5wdXRfMiBpbnB1dF8zIGlucHV0XzQuMiBpbnB1dF80LjMgaW5wdXRfNS4yIGlucHV0XzUuMyBnLXJlY2FwdGNoYS1yZXNwb25zZSBnZm9ybV9hamF4IGlzX3N1Ym1pdF8xIGdmb3JtX3N1Ym1pdCBnZm9ybV91bmlxdWVfaWQgc3RhdGVfMSBnZm9ybV90YXJnZXRfcGFnZV9udW1iZXJfMSBnZm9ybV9zb3VyY2VfcGFnZV9udW1iZXJfMSBnZm9ybV9maWVsZF92YWx1ZXMgYXBiY3RfX2VtYWlsX2lkX19ncmF2aXR5X2Zvcm1fODc5MDEgYXBiY3RfZXZlbnRfaWQgY3Rfbm9fY29va2llX2hpZGRlbl9maWVsZCIsImludmlzaWJsZV9maWVsZHNfY291bnQiOjE4fX0="><input
    name="ct_no_cookie_hidden_field"
    value="_ct_no_cookie_data_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"
    type="hidden" class="apbct_special_field ct_no_cookie_hidden_field">
</form>

Text Content

THIS WEBSITE USES COOKIES

We use cookies to personalise content and ads, to provide social media features
and to analyse our traffic. For more details, select ‘Show details’ below or
review our Cookie Policy.

Do not sell or share my personal information
Deny Allow all Show details
OK
Deny Allow selection Allow all
Necessary
Preferences
Statistics
Marketing
Show details
Cookie declaration [#IABV2SETTINGS#] About
 Necessary (27)  Preferences (4)  Statistics (13)  Marketing (38)  Unclassified
(2)
Necessary cookies help make a website usable by enabling basic functions like
page navigation and access to secure areas of the website. The website cannot
function properly without these cookies.

NameProviderPurposeExpiryTypetest_cookieGoogleUsed to check if the user's
browser supports cookies.1 dayHTTP Cookie_GRECAPTCHAGooglePending180 daysHTTP
Cookierc::aGoogleThis cookie is used to distinguish between humans and bots.
This is beneficial for the website, in order to make valid reports on the use of
their website.PersistentHTML Local Storagerc::bGoogleThis cookie is used to
distinguish between humans and bots. SessionHTML Local Storagerc::cGoogleThis
cookie is used to distinguish between humans and bots. SessionHTML Local
Storagerc::d-15#GoogleThis cookie is used to distinguish between humans and
bots. PersistentHTML Local Storagerc::fGoogleThis cookie is used to distinguish
between humans and bots. PersistentHTML Local
Storageapbct_cookies_testhuntsmansecurity.comUsed in order to detect spam and
improve the website's security. PersistentHTML Local
Storageapbct_headlesshuntsmansecurity.comUsed in order to detect spam and
improve the website's security. PersistentHTML Local
Storageapbct_page_hitshuntsmansecurity.comUsed in order to detect spam and
improve the website's security. PersistentHTML Local
Storageapbct_pixel_urlhuntsmansecurity.comUsed in order to detect spam and
improve the website's security. PersistentHTML Local
Storageapbct_session_current_pagehuntsmansecurity.comHolds which URL should be
presented to the visitor when visiting the site. SessionHTML Local
Storageapbct_session_idhuntsmansecurity.comUsed in order to detect spam and
improve the website's security. SessionHTML Local
Storageapbct_urlshuntsmansecurity.comUsed in order to detect spam and improve
the website's security. PersistentHTML Local
Storageapbct_visible_fieldshuntsmansecurity.comUsed in order to detect spam and
improve the website's security. PersistentHTML Local
StorageCookieConsentCookiebotStores the user's cookie consent state for the
current domain1 yearHTTP Cookiecookietestmonitor.fraudblocker.comThis cookie is
used to determine if the visitor has accepted the cookie consent box.SessionHTTP
Cookiect_checked_emailshuntsmansecurity.comUsed in order to detect spam and
improve the website's security. PersistentHTML Local
Storagect_checkjshuntsmansecurity.comUsed in order to detect spam and improve
the website's security. PersistentHTML Local
Storagect_fkp_timestamphuntsmansecurity.comUsed in order to detect spam and
improve the website's security. PersistentHTML Local
Storagect_pointer_datahuntsmansecurity.comUsed in order to detect spam and
improve the website's security. PersistentHTML Local
Storagect_ps_timestamphuntsmansecurity.comUsed in order to detect spam and
improve the website's security. PersistentHTML Local
Storagect_screen_infohuntsmansecurity.comUsed in order to detect spam and
improve the website's security. PersistentHTML Local
Storagect_timezonehuntsmansecurity.comUsed in order to detect spam and improve
the website's security. PersistentHTML Local
StoragewpEmojiSettingsSupportshuntsmansecurity.comThis cookie is part of a
bundle of cookies which serve the purpose of content delivery and presentation.
The cookies keep the correct state of font, blog/picture sliders, color themes
and other website settings.SessionHTML Local Storage1.gifCookiebotUsed to count
the number of sessions to the website, necessary for optimizing CMP product
delivery. SessionPixel Trackerli_gcLinkedInStores the user's cookie consent
state for the current domain180 daysHTTP Cookie

Preference cookies enable a website to remember information that changes the way
the website behaves or looks, like your preferred language or the region that
you are in.

NameProviderPurposeExpiryTypeapbct_iframes_protectedhuntsmansecurity.comPreserves
user states when filling out forms.PersistentHTML Local
Storagect_cookies_typehuntsmansecurity.comUsed in order to detect spam and
improve the website's security. Does not store visitor specific
data.PersistentHTML Local Storageom-countryhuntsmansecurity.comThis cookie is
used to determine the preferred country setting selected by the
visitor.PersistentHTML Local
Storagewistia-video-progress-#huntsmansecurity.comContains a timestamp for the
website’s video-content. This allows the user to resume watching without having
to start over, if the user leaves the video or website. PersistentHTML Local
Storage

Statistic cookies help website owners to understand how visitors interact with
websites by collecting and reporting information anonymously.

NameProviderPurposeExpiryTypebounceAppnexusDetermines if a user leaves the
website straight away. This information is used for internal statistics and
analytics by the website operator. SessionPixel TrackersegAppnexusRegisters
statistical data on users' behaviour on the website. Used for internal analytics
by the website operator. SessionPixel TrackerhjActiveViewportIdsHotjarThis
cookie contains an ID string on the current session. This contains non-personal
information on what subpages the visitor enters – this information is used to
optimize the visitor's experience.PersistentHTML Local
StoragehjViewportIdHotjarSaves the user's screen size in order to adjust the
size of images on the website.SessionHTML Local Storage_gaGoogleRegisters a
unique ID that is used to generate statistical data on how the visitor uses the
website.2 yearsHTTP Cookie_ga_#GoogleUsed by Google Analytics to collect data on
the number of times a user has visited the website as well as dates for the
first and most recent visit. 2 yearsHTTP Cookie_hjSession_#HotjarCollects
statistics on the visitor's visits to the website, such as the number of visits,
average time spent on the website and what pages have been read.1 dayHTTP
Cookie_hjSessionUser_#HotjarCollects statistics on the visitor's visits to the
website, such as the number of visits, average time spent on the website and
what pages have been read.1 yearHTTP
Cookieapbct_site_landing_tshuntsmansecurity.comDetermines when the visitor last
visited the different subpages on the website, as well as sets a timestamp for
when the session started.PersistentHTML Local
Storagect_has_scrolledhuntsmansecurity.comRegisters if the website's
scroll-depth detection is active - This function remembers how far the user has
scrolled on the current session across the website's sub-pages.PersistentHTML
Local Storagect_mouse_movedhuntsmansecurity.comRegisters if the website's
scroll-depth detection is active - This function remembers how far the user has
scrolled on the current session across the website's sub-pages.PersistentHTML
Local Storagewistiahuntsmansecurity.comUsed by the website to track the
visitor's use of video-content - The cookie roots from Wistia, which provides
video-software to websites.PersistentHTML Local Storagepersonalization_idTwitter
Inc.This cookie is set by Twitter - The cookie allows the visitor to share
content from the website onto their Twitter profile. 400 daysHTTP Cookie

Marketing cookies are used to track visitors across websites. The intention is
to display ads that are relevant and engaging for the individual user and
thereby more valuable for publishers and third party advertisers.

NameProviderPurposeExpiryTypena_idOracleUsed to recognize the visitor upon
re-entry. This allows the website to register the visitor’s behaviour and
facilitate the social sharing function provided by Addthis.com. 1 yearHTTP
CookieouidOracleSets an ID-string for the specific visitor. This is used to
recognize the visitor upon re-entry. This allows the website to register the
visitor’s behaviour and facilitate the social media sharing function provided by
Addthis.com. 1 yearHTTP CookieuidOracleCreates a unique, machine-generated user
ID. AddThis, which is owned by Clearspring Technologies, uses the user ID to
make it possible for the user to share content across social networks and
provide detailed statistics to various providers.1 yearHTTP
CookieanjAppnexusRegisters a unique ID that identifies a returning user's
device. The ID is used for targeted ads.3 monthsHTTP
Cookiereceive-cookie-deprecationAppnexusCollects information on user behaviour
on multiple websites. This information is used in order to optimize the
relevance of advertisement on the website.400 daysHTTP
Cookieuuid2AppnexusRegisters a unique ID that identifies a returning user's
device. The ID is used for targeted ads.3 monthsHTTP
CookieXANDR_PANIDAppnexusThis cookie registers data on the visitor. The
information is used to optimize advertisement relevance. 3 monthsHTTP
Cookie_uetsidMicrosoftUsed to track visitors on multiple websites, in order to
present relevant advertisement based on the visitor's preferences.
PersistentHTML Local Storage_uetsid_expMicrosoftContains the expiry-date for the
cookie with corresponding name. PersistentHTML Local Storage_uetvidMicrosoftUsed
to track visitors on multiple websites, in order to present relevant
advertisement based on the visitor's preferences. PersistentHTML Local
Storage_uetvid_expMicrosoftContains the expiry-date for the cookie with
corresponding name. PersistentHTML Local StorageMUIDMicrosoftUsed widely by
Microsoft as a unique user ID. The cookie enables user tracking by synchronising
the ID across many Microsoft domains.1 yearHTTP CookielastExternalReferrer Meta
Platforms, Inc.Detects how the user reached the website by registering their
last URL-address.PersistentHTML Local StoragelastExternalReferrerTime Meta
Platforms, Inc.Detects how the user reached the website by registering their
last URL-address.PersistentHTML Local Storagepagead/landing [x2]GoogleCollects
data on visitor behaviour from multiple websites, in order to present more
relevant advertisement - This also allows the website to limit the number of
times that they are shown the same advertisement. SessionPixel
Tracker#,#GoogleCollects data on user behaviour and interaction in order to
optimize the website and make advertisement on the website more relevant.
PersistentHTML Local Storage#,#_expiresAtGoogleCollects data on user behaviour
and interaction in order to optimize the website and make advertisement on the
website more relevant. PersistentHTML Local Storage__ssSharpspringCollects
information on visitor behaviour on multiple websites - This information is used
on the website in order to optimize the relevance of advertisement. The cookie
also allows the website to determine how the visitor accessed the website. 1
dayHTTP Cookie__ss_referrerSharpspringCollects information on visitor behaviour
on multiple websites - This information is used on the website in order to
optimize the relevance of advertisement. The cookie also allows the website to
determine how the visitor accessed the website. 1 dayHTTP
Cookie__ss_tkSharpspringCollects information on visitor behaviour on multiple
websites - This information is used on the website in order to optimize the
relevance of advertisement. The cookie also allows the website to determine how
the visitor accessed the website. 25 yearsHTTP Cookie_fbp Meta Platforms,
Inc.Used by Facebook to deliver a series of advertisement products such as real
time bidding from third party advertisers.3 monthsHTTP Cookie_gcl_auGoogleUsed
by Google AdSense for experimenting with advertisement efficiency across
websites using their services. 3 monthsHTTP Cookie_uetsidMicrosoftCollects data
on visitor behaviour from multiple websites, in order to present more relevant
advertisement - This also allows the website to limit the number of times that
they are shown the same advertisement. 1 dayHTTP Cookie_uetvidMicrosoftUsed to
track visitors on multiple websites, in order to present relevant advertisement
based on the visitor's preferences. 1 yearHTTP
CookieoptiMonkClientOptiMonkImplements pop-up advertisement on the website. 1
yearHTTP CookieoptiMonkClientIdhuntsmansecurity.comCollects information on what
products the visitor has viewed and the content of the shopping-cart. This is
used to increase the website's conversion rate through targeted advertisement
and product promotions through emails. 1 yearHTTP
CookieoptiMonkSessionhuntsmansecurity.comImplements pop-up advertisement on the
website. SessionHTTP CookieOptiMonkShopAttributeshuntsmansecurity.comImplements
pop-up advertisement on the website. PersistentHTML Local
StorageOptiMonkVisitorAttributeshuntsmansecurity.comImplements pop-up
advertisement on the website. PersistentHTML Local StoragebcookieLinkedInUsed by
the social networking service, LinkedIn, for tracking the use of embedded
services.1 yearHTTP Cookieli_sugrLinkedInCollects data on user behaviour and
interaction in order to optimize the website and make advertisement on the
website more relevant. 3 monthsHTTP CookielidcLinkedInUsed by the social
networking service, LinkedIn, for tracking the use of embedded services.1
dayHTTP CookiekoitkSharpspringCollects data on user behaviour and interaction in
order to optimize the website and make advertisement on the website more
relevant. 400 daysHTTP Cookiew/1.0/sdOpenxRegisters data on visitors such as IP
addresses, geographical location and advertisement interaction. This information
is used optimize the advertisement on websites that make use of OpenX.net
services. SessionPixel Trackerpa_#_tsMarin SoftwareUsed across websites that use
the same ad network to display ads to the other advertisers in the network.400
daysHTTP Cookiepa_uidMarin SoftwareUsed across websites that use the same ad
network to display ads to the other advertisers in the network.400 daysHTTP
Cookiei/adsctTwitter Inc.The cookie is used by Twitter.com in order to determine
the number of visitors accessing the website through Twitter advertisement
content. SessionPixel Tracker

Unclassified cookies are cookies that we are in the process of classifying,
together with the providers of individual cookies.

NameProviderPurposeExpiryTypeloglevelWistiaPendingSessionHTTP
CookieoptiMonkEmbedded227719huntsmansecurity.comPending1 yearHTTP Cookie

 [#IABV2_LABEL_PURPOSES#]  [#IABV2_LABEL_FEATURES#]  [#IABV2_LABEL_PARTNERS#]
[#IABV2_BODY_PURPOSES#]
[#IABV2_BODY_FEATURES#]
[#IABV2_BODY_PARTNERS#]

Cookies are small text files that can be used by websites to make a user's
experience more efficient. 

The law states that we can store cookies on your device if they are strictly
necessary for the operation of this site. For all other types of cookies we need
your permission. In some locations, your continued use of our website
constitutes your consent to our use of cookies in accordance with our Cookie
Policy. In other locations, you must consent by clicking on one of the buttons
above.

This site uses different types of cookies. Some cookies are placed by third
party services that appear on our pages.

You can at any time change or withdraw your consent from the Cookie Declaration
on our website.

Learn more about who we are, how you can contact us and how we process personal
data in our Privacy Policy.  Please state your consent ID and date when you
contact us regarding your consent, both of which can be found in
the Cookie Declaration on our website.

If you do not agree to the use of cookies as described in our Cookie Policy, you
can click the Deny button above or disable cookies by following the instructions
for your browser. Some of the website services will not function as well if
cookies are disabled

Cookie declaration last updated on 9/7/24 by Cookiebot
日本語
 * Products
   Products
   
   Our cyber security products span from our next gen SIEM used in the most
   secure government and critical infrastructure environments, to automated
   cyber risk reporting applications for commercial and government organisations
   of all sizes.
   
   Essential 8
   Essential 8 Auditor
   Essential 8 Scorecard
   Cyber Resilience
   SmartCheck
   SIEM
   For Enterprise
   For MSSPs
   For Government
   SIEM FEATURES
    * Managing Alerts and Incidents
    * Behaviour Anomaly Detection (BAD2)
    * Threat Verification and Automation
    * MITRE ATT&CK® Threat Heatmap
    * Reporting and Alerting

 * Solutions by Industry
   Solutions by Industry
   
   Any organisation can be the target of cyber attackers or find itself exposed
   through the actions of malicious insiders. Leverage our industry specific
   cyber security awareness to help reduce risk.
   
   
   INDUSTRIES
   
   
   GOVERNMENT
   
   Defence-grade cyber security
   
   
   FINANCIAL SERVICES
   
   Cyber security for high-bandwidths at scale
   
   
   CRITICAL INFRASTRUCTURE
   
   Managing high-profile risk at scale
   
   
   HEALTH
   
   Assurance, visibility, defence and control
   
   
   SHIPPING, FREIGHT & LOGISTICS
   
   Security monitoring, compliance & reporting
   
   
   DEFENCE & INTELLIGENCE
   
   Securing defence and intelligence networks

 * Learning & Resources
   Learning & Resources
   
   Access our industry-leading resources to improve your cyber resilience
   
   Just Released
   
   
   A CYBER-RISK READINESS CHECKLIST
   
   for directors and senior leaders
   
   Trending this Month
    * Operational Resilience
    * Data-driven and evidence-based cyber security decision making
    * Cyber Risk Management
   
   Browse by Topic
    * Case Studies
    * Compliance Standards
    * Governance & Risk
    * Huntsman Products
    * Cyber Insurance
    * Solutions

 * About Huntsman
   About Huntsman
   
   Since 1999, Huntsman Security has been on the cutting-edge of cyber security
   software development, serving some of the most sensitive and secure
   intelligence, defence and criminal justice environments in the world.
   
   
   QUICK LINKS
   
   
   ABOUT
   
   About our mission and core competences
   
   
   TRAINING & SUPPORT
   
   Implementation support and training
   
   
   TESTIMONIALS
   
   See what our customers have to say
   
   
   PARTNERS
   
   Explore our partner program
   
   
   NEWS & MEDIA
   
   Latest news from Huntsman
   
   
   EVENTS
   
   Meet Huntsman in person
   
   
   LEADERSHIP TEAM
   
   Meet our team
   
   
   CAREERS
   
   Want to work with Huntsman?

 * Blog
 * Partners
 * Contact Us





CORNERSTONE CYBER SECURITY RISK MANAGEMENT, MONITORING AND RESPONSE TECHNOLOGY

Always on cyber security analytics

Explore Products


TRUSTED BY




HUNTSMAN SECURITY HAS BEEN ON THE CUTTING-EDGE OF CYBER SECURITY & CYBER
RISK-MANAGEMENT SOFTWARE DEVELOPMENT SINCE 1999.

We serve some of the most sensitive and secure intelligence, defence and
criminal justice environments in the world.


SIEM
ENTERPRISE

Our always on cyber analytics tool that deploys from a single SOC platform
managed by your team.

Find out more



SMARTCHECK

Rapid, automated risk assessment by monitoring 12 Safeguards across the
cyber-attack sequence.

Find out more


ESSENTIAL 8
AUDITOR

Our cyber risk audit tool that delivers an immediate view of security control
effectiveness against the Essential Eight framework.

Find out more


SIEM
MSSP

Our always on cyber analytics tool for MSSPs, offering multi-tenancy for 250 to
50,000 endpoints.

Find out more


ESSENTIAL 8
SCORECARD

Our award winning RegTech technology that continuously measures the
effectiveness of your organisation’s security controls.

Find out more



OUR LATEST RESOURCES AND INSIGHTS – FOR TECHNOLOGY TEAMS, EXECUTIVES &
DIRECTORS, RISK TEAMS, AND MANAGED SERVICES ORGANISATIONS


CRITICAL INFRASTRUCTURE

Regardless of whether your organisation is categorised as Critical
Infrastructure under the SOCI Act, or you are a third-party supplier to a
Critical Infrastructure provider, the provisions of the SOCI CIRMP will impact
you. Download our paper to read more.

Read More


A CYBER-RISK READINESS CHECKLIST

Access now our cyber-risk readiness checklist for directors and senior leaders
that will help you to verify your readiness to govern through a cyber crisis.

Read More


OPERATIONAL RESILIENCE

This paper aims to explore the ongoing scenario testing techniques recommended
in the FCA Policy to maintain the operational resilience of the resources that
underpin important business services.

Read More


AGENCY RESILIENCE, COMPLIANCE & REPUTATION: A CYBER GOVERNANCE PERSPECTIVE

This paper aims to equip your leadership roles to stay current with the latest
findings, and access short- and long-term solutions to improve cyber governance.

Read More


ESSENTIAL 8 SCORECARD – PITCHER PARTNERS SYDNEY CASE STUDY

Explore why Pitcher Partners Sydney chose Huntsman Security’s Essential 8
Scorecard as the foundational solution for its cyber uplift programme.

Read More


CYBER SECURITY PREDICTIONS FOR 2024

Access Huntsman Security’s report to learn about six trends that will be most
pivotal for cyber security leaders and teams in 2024.

Read More



EXPLORE WHAT SETS HUNTSMAN SECURITY APART

COST & TIME SAVING

with cost-effective, automated applications with significant demonstrable ROI

RISK MANAGEMENT & COMPLIANCE

cyber maturity and cyber gap reporting in minutes, that protects IT assets,
systems and sensitive information on-site and in remote locations

AUTOMATION, ACCURACY & VERIFIABILITY

with data-driven reporting for tech teams and executives to visually see and
benchmark your cyber risk status, supported by in-built prompts to remediate
issues






THE ESSENTIAL METRICS FOR MANAGING CYBER RISK

Automate your data collection and audit functions with the Essential 8 Auditor.

It turns complex security data into actionable reporting for risk management
decision-making, providing a faster and more accurate assessment of your cyber
posture.

Find out more



WHAT OUR CLIENTS ARE SAYING

Our customer feedback reflects our local support capability, continuing IT
protection, compliance and infrastructure management over many years, while
others show how our next generation cyber security technology adapted quickly
from its initial brief to meet changing security needs.



> “What makes Huntsman so attractive is its ability to deliver appropriate and
> actionable information to our security and incident management teams…The bonus
> is leverage of our existing security investments – we’re now generating more
> value and more intelligence than we thought possible from some of our point
> solutions”

CISO, International Communications Carrier


WHAT OUR CLIENTS ARE SAYING

Our customer feedback reflects our local support capability, continuing IT
protection, compliance and infrastructure management over many years, while
others show how our next generation cyber security technology adapted quickly
from its initial brief to meet changing security needs.



> “You’ve heard of a black swan; well, we realised that you can’t anticipate
> every potentially threatening security situation. You can’t have a rule for
> everything and so we deployed Huntsman which monitors for what we are not
> expecting.”

Risk Manager, UK Government Agency


WHAT OUR CLIENTS ARE SAYING

Our customer feedback reflects our local support capability, continuing IT
protection, compliance and infrastructure management over many years, while
others show how our next generation cyber security technology adapted quickly
from its initial brief to meet changing security needs.



> “Huntsman provides us with true security management capabilities that meet the
> stringent real-time performance, reliability and scalability of our
> mission-critical role secure IT infrastructure. Only Huntsman meets this
> criterion”

Director of Security, Australian Government Agency

Read more testimonials
Read more testimonies


AWARDS & RECOGNITION


HUNTSMAN SECURITY WINS BEST COMPLIANCE PRODUCT AT TEISS AWARDS 2020

February 14, 2020

Huntsman Security’s “Essential 8 Scorecard” wins “Best compliance product” and
“Best SME security product” at TEISS Awards 2020   LONDON, UK – February 12,
2020 – Huntsman Security was the winner of two categories at the TEISS Awards in
London on 12th February. The TEISS Awards 2020 were presented as part of the
prestigious annual “European […]

Read article


ESSENTIAL 8 SCORECARD DOUBLE AWARD WINNER AT TEISS AWARDS 2020

February 13, 2020

Huntsman Security’s Essential 8 Scorecard was the winner of two categories at
the TEISS Awards in London on 12th February: Best Compliance Product and Best
SME Security Product     The TEISS Awards 2020 were presented as part of the
prestigious annual “European Information Security Summit – London”.  TEISS
publish cyber security news, information and analysis to […]

Read article


INFOSEC PRODUCTS OF THE MONTH: NOVEMBER 2021

December 8, 2021

SmartCheck for Ransomware is listed as one of the most interesting products
released in the past month.  Read More    

Read article


KPMG CHAIRMAN STATES THAT AUDITORS ARE FINDING REMOTE AUDITING A CHALLENGE

July 1, 2020

KPMG chairman Alison Kitchen states that auditors are finding remote auditing a
challenge.  Read More    

Read article


ESSENTIAL 8 SCORECARD WINS CYBER SECURITY AWARD AT AUSTRALIAN TECHNOLOGIES
COMPETITION 2019

October 30, 2019

Huntsman Security’s Essential 8 Scorecard has been awarded the Cyber Security
innovation award by the Australian Technologies Competition 2019.   The
Australian competition, established for 20 years, seeks to identify and
accelerate Australian technology ‘scaleups’ with the greatest global potential.
  After a seven-month journey, including 206 entries and a shortlist of 33
semi-finalists, the […]

Read article



SIGN UP TO RECEIVE CYBER SECURITY INSIGHTS

Read by directors, executives, and security professionals globally, operating in
the most complex of security environments.

Email(Required)



Marketing(Required)
I agree to receive educational material, product information and event
invitations from Huntsman Security(Required)
Agree(Required)
I have read the privacy notice(Required)
CAPTCHA


87901
Products
 * SIEM for MSSPs
 * SIEM for Enterprise
 * SIEM for Government
 * Essential 8 Scorecard
 * Essential 8 Auditor
 * SmartCheck

Solutions by Industries
 * Government
 * Critical Infrastructure
 * Financial Services
 * Health
 * Defence & Intelligence
 * Shipping, Freight, Transport & Logistics

Learning & Resources
 * Resources
 * Case Studies
 * MITRE
 * Cyber Security Blogs

About Huntsman Securitys
 * About Us
 * Testimonials
 * News & Media
 * Events
 * Training & Support
 * Partners
 * Contact Us

Contact Get in contact

Australia
+61 1300 136 897

United Kingdom
+44 (0)845 222 2010

Japan
+81 3 5953 8430

© 2023 Huntsman | Tier-3

Privacy PolicyCookie PolicyTerms of Use



Notifications



word word word word word word word word word word word word word word word word
word word word word word word word word word word word word word word word word
word word word word word word word word word word word word word word word word
word word word word word word word word word word word word word word word word
word word word word word word word word word word word word word word word word
word word word word word word word word word word word word word word word word
word word word word word word word word word word word word word word word word
word word word word word word word word word word word word word word word word
word word word word word word word word word word word word word word word word
word word word word word word word word word word word word word word word word
word word word word word word word word word word word word word word word word
word word word word word word word word word word word word word word word word
word word word word word word word word

mmMwWLliI0fiflO&1
mmMwWLliI0fiflO&1
mmMwWLliI0fiflO&1
mmMwWLliI0fiflO&1
mmMwWLliI0fiflO&1
mmMwWLliI0fiflO&1
mmMwWLliI0fiflO&1


Get your 10% off
X
X
AICD Directors and Senior Leaders: Download our cyber-risk readiness checklist
now and
answer five questions to verify your readiness to govern through a cyber crisis.
Download now