Configuration Management Resources
Read the latest news, developments and opinion pieces on IT security and compliance from industry experts New Net Technologies.
Click on a link below for information on how you can ensure your configuration management complies with security standards.
Configuration Management Blog
Configuration Management Articles
- October is National Cyber Security Awareness Month- So Just How Secure is Your Organization?
- Department of Homeland Security’s Cyber Security Still Vulnerable
- File Integrity Monitoring – 3 Reasons Why Your Security is Compromised Without it Part 3
- File Integrity Monitoring - Is FIM Better Than AV? Is a Gun Better Than a Knife?
- All Configuration Management Articles
Configuration Management Case Studies
The FIM portion of NNT literally saved my company last week. By monitoring the IT estate with NNT, we were able to identify a threat that the Firewall failed to protect against and the AntiVirus software wasn’t able to detect. NNT’s real-time FIM alerted us to the altered system dll files amongst the multitude of file changes taking place, pinpointing the offending Root Kit and enabling us to deal with the malicious malware before it could wreak havoc - I would rate NNT’s contribution to our security initiative as absolutely invaluable!
David McKnight, Data and Network Security Officer, Public Interest Communications Inc.