IT Security and Compliance Videos

Watch webinars and video guides from industry experts New Net Technologies, on a range of IT security and compliance topics.

If you are serious about change control and automating key security controls, make sure your monitoring technology doesn't just scale, but that it gives you MEGA-SCALE. Watch the video to find out how.

Req 2.2 mandates the need to verify that system configuration standards are consistent with industry-accepted hardening standards. NNT is a CIS-Certified Vendor and as such provides pre-built device hardening templates derived from the CIS Benchmarks to audit for any vulnerabilities present.

Identifying emerging threats with the volume and velocity of today’s data is challenging for every organization. Let IBM Security and NNT simplify your security risk and exposure by using our QRadar® Integration App now officially validated by IBM.

By leveraging NNT’s Closed-Loop Intelligent Change Control Technology, repeated or recurring change patterns can be captured and identified as either harmless or potentially harmful as well, discriminating pre-approved changes from unexpected and unwanted changes.

bmc itsm integration

NNT’s intelligent integration module seamlessly integrates with BMC’s security and ITSM products to effectively mitigate security risks and service downtime and availability. The collaboration of products enables your teams to prioritize and remediate critical vulnerabilities and systematically address compliance violations all while improving operational integrity, security and compliance.

cherwell itsm integration

NNT has integrated its award-winning Change Tracker™ Gen7 R2 solution with the leading ITSM provider, Cherwell®, to deliver Closed-Loop Intelligent Change Control. 

fim

File Integrity Monitoring (FIM) is a foundational control that involves analyzing operating systems and application software files to determine if and when they have changed, how they changed and who made the change using a verification method between a current file state and a known baseline.

secureops

NNT's new strategy called SecureOps (short for Secure Operations) merges IT operations best practices in change management with the foundational controls for security, identifying unknown, unwanted and potentially malicious events in real-time…without all the noise and headaches of endless alerts. 

systemharden

As a CIS Certified vendor, NNT can help your audit your entire IT estate against a range of CIS Benchmarks. Within minutes, you can establish where vulnerabilities exist within your environment and just how to remediate them.

fim

Identify known vulnerabilities within software and configuration settings before they can be exploited by a cyber-attack using NNT Vulnerability Tracker.

USA Offices
New Net Technologies LLC
Naples
Suite #10115, 9128 Strada Place
Naples, Florida, 34108
Atlanta
1175 Peachtree St NE
Atlanta, Georgia, 30361.
Portland
4145 SW Watson, Suite 350
Beaverton, Oregon, 97005.

Tel: (844) 898-8358
email [email protected]
UK Office
New Net Technologies Ltd
Rivers Lodge, West Common
Harpenden, Hertfordshire
AL5 2JD

Tel: 01582 287310
email [email protected]
CIS benchmarking SEWP Cybersecurity 500Sans Institute Now Certified IBM Security
Copyright 2019, New Net Technologies LLC. All rights reserved. 
NNT and Change Tracker are registered trademarks of New Net Technologies LLC.
All other product, company names and trademarks are the property of their respective owners.