Change Tracker Enterprise™ Videos
Find webinars and video guides from industry experts New Net Technologies, on a range of IT security and compliance topics.
Click on a link below to find out how NNT Change Tracker Enterprise™ can incorporate Device Hardening, File Integrity Monitoring, Change & Configuration Management, and Security & Compliance Management into your IT system for a comprehensive security solution.
In this Educational Moment we discuss Comparing and Contrasting Compliance Reports to provide ongoing real time compliance intelligence. Learn how to leverage the information provided for enhanced security and compliance management as well as comparing results from different devices to ascertain any configuration or compliance drift.
It should come as no surprise that cyber threats are continuing to evolve both in sophistication and the level of threat they represent. Despite these continued threats, there’s an equally improving maturity within the cyber security community & growing evidence that a simple, pragmatic and best practice approach to security is more than capable of fending off the threat.
See the next generation of breach prevention technology - Change Tracker Gen 7™
Change Tracker Gen7 represents an intelligent approach to system integrity monitoring through the use of our Closed-Loop Intelligent Change Control (CLICC). NNT has significantly reduced the previously overwhelming workload associated with forensic-level change control to allow the organization to focus on what matters most- unexpected changes.
Join NNT’s Mark Kerrison and Mark Kedgley who are keen to acquaint you with this landmark release!
Every gap in defenses leaves the enterprise with a Cyber Security Achilles Heel, a weak spot or vulnerability that an attacker can exploit. We call this the Enterprise Attack Surface.
How prone is your organization to an attack right now? How do you assess or measure this?
This overview shows how Change Tracker Version 6.5 uses real-time file integrity monitoring technology to discover vulnerabilities using CIS Benchmark reports, for servers, database systems and network devices, thereafter providing real-time FIM to detect any breach or malware.