NNT Change Tracker™ Gen 7 delivers ‘Security through System Integrity’. Ensuring your IT systems are in a known, secure and compliant state at all times will help protect your organization from sophisticated cyber threats including zero day and insider attacks.

Ensure critical security controls are in place to spot cyber threats, identify any suspicious changes and adjust the secure baseline for all of your systems in real time with NNT Change Tracker™ Gen 7.



Breach Prevention

Ensure all IT assets are secure and breach free at all times by leveraging state of the art, recommended security and configuration hardening settings along with real-time system vulnerability and configuration drift management.


Breach Detection

Change Tracker™ Gen 7 identifies suspicious activity using highly sophisticated contextual change control underpinned by threat intelligence to spot breach activity while reducing change noise.


Continuous Security and Compliance

By creating a secure and compliant state for all IT systems and combining that with ongoing, context-based change control plus baseline management, Change Tracker™ Gen 7 ensures systems remain in a secure and compliant state at all times.

Change Tracker Gen 7
Real Time Contextual File Integrity Monitoring
Real-Time Contextual File Integrity Monitoring

NNT provides the most advanced and genuinely effective FIM solution for organizations of all sizes. Change Tracker™ intelligently analyzes all changes in real time leveraging the world’s largest repository of independently whitelisted files combined with intelligent and automated planned change rules to significantly reduce typical FIM change noise. Crucially this will allow you to alert on unusual, unexpected and potentially harmful changes along with valuable context such as who made the change and precisely what changed. Change Tracker™ doesn’t just stop there. Our comprehensive system integrity solution is able to monitor unauthorized changes to files, registry keys and values, directories, processes, services, open ports, and much more. With NNT you get constant reassurance of the integrity and security of all of your IT systems.

System Hardening
System Hardening and Vulnerability Management

Minimize your attack surface with continuous and real-time clear configuration guidance and remediation based on your specific compliance requirements. Auditor-ready reports help you spend less time dealing with auditors by providing you with all the evidential reports you and your auditor need. NNT is a fully certified Center for Internet Security (CIS) Vendor, so this all backed by CIS and other industry standard benchmarks for system hardening and vulnerability mitigation guidance.

Continuous Compliance Monitoring Across all Industries
Continuous Compliance Monitoring Across all Industries

NNT provides comprehensive tailored or pre-built reports to provide vital evidence to security staff, management and auditors of the ongoing and improving state of your organizations secure and compliant posture. Using both agents and agentless technology, NNT ensures the compliant state of all systems in real time without the associated delays and blind-spots created by snapshot solutions.

Configuration Management combined with Intelligent Change Control
Configuration Management Combined with Intelligent Change Control

Gaining visibility into system changes is probably the only real way to fully ensure systems remain secure at all times. If changes are allowed to take place without any checks or balance there is always the risk of a breach. NNT uses ‘Closed Loop Intelligent Change Control’ technology to enable change control without the disruptive change noise usually associated with these types of solutions. NNT Change Tracker™ can even integrate with your IT Service Desk such as ServiceNow® or operate independently to create, approve and finally check actual changes compared to the approved change request.

Breach Detection- Host Intrusion Detection
Breach Detection- Host Intrusion Detection

NNT’s self-learning breach detection technology utilizes pattern matching intelligence to identify expected, planned changes, helping you understand what’s normal and alert you to activity that isn’t. Host Intrusion detection enables you to take action before data theft and damage is done. With NNT Change Tracker™ Gen 7, you are uniquely equipped to spot a breach even if that breach is Zero-Day or Inside User precipitated. 

See Change Tracker™ Gen7 in Action in this Feature Video Overview


Operating at a forensic level within the IT infrastructure, Change Tracker works across all popular platforms such as:


This product packs quite a bit of features and functionality for a low cost.
SC Magazine. .
Change Tracker Enterprise ™

5 / 5 stars 5 stars
Trusted by:
USA Offices
New Net Technologies LLC
Suite #10115, 9128 Strada Place
Naples, Florida, 34108
201 17th Street, Suite 300
Atlanta, Georgia, 30363.
4145 SW Watson, Suite 350
Beaverton, Oregon, 97005.

Tel: 1-888-898-0674
email [email protected]
UK Office
New Net Technologies Ltd
Rivers Lodge, West Common
Harpenden, Hertfordshire

Tel: 01582 287310
email [email protected]
Google+ Linkedin Twitter - Change Tracker Facebook rss feed YouTube
CIS benchmarking SEWP Cybersecurity 500Sans Institute Now Certified
Copyright 2018, New Net Technologies LLC. All rights reserved. 
NNT and Change Tracker are registered trademarks of New Net Technologies LLC.
All other product, company names and trademarks are the property of their respective owners.