Adding Change Control To Your Change Management Process

NNT and Cherwell have teamed up to provide a comprehensive out-of-the-box integration that links the changes requested and approved with those that are actually taking place within your IT environment. This combined solution set hugely improves security, availability and compliance by implementing a closed-loop intelligent change control solution that will correlate all changes occurring throughout your IT environment with an approved change ticket and or manifest from your Cherwell solution.

IT changes are the number one source of service outages and security breaches. Integrating NNT’s award-winning change control solution with Cherwell’s change management platform dramatically improves IT service delivery as well as significantly improving your security and compliance initiatives.

Cherwell & NNT Integration Capabilities
Integrating Change Tracker with Cherwell

By Integrating Change Tracker™ with Cherwell your Capability for Change Control is Transformed
Approved changes are validated automatically, with a full audit trail of what actually changed provided and reconciled with your Change Requests. By leveraging Change Tracker Intelligent Change Control™, repeated or recurring change patterns can be modeled and re-used to segregate pre-approved changes from the unexpected and genuinely suspicious changes. This reduction of change noise revolutionizes breach detection, clearly exposing insider and zero-day malware activity.

Change Tracker™ puts a spotlight on all changes made

Change Tracker™ Puts a Spotlight on All Changes Made
Changes made during a prescribed planned change window get validated against the expected change profile - any exceptions, such as misconfigurations or additional non-scoped changes are exposed for review and remediation where required. All Unplanned Changes are also recorded in full – including who made the change, with before and after exposure of changes clearly reported. These are prioritized as Cherwell incidents – changes will be automatically analyzed using continuously updated Threat Intelligence – NNT F.A.S.T. Cloud™.

tick

Validate approved changes automatically with a full audit trail of what actually changed provided.

noise

Significantly reduce overwhelming change noise to clearly expose insider & zero-day malware activity.

padlock

Re-use recurring change patterns to isolate pre-approved changes from the unexpected & genuinely suspicious changes.

arrows

Investigate unplanned changes in full, with who made the change and before & after exposure of changes clearly reported.

brain

Automatically analyze changes using continuously updated Threat Intelligence- NNT F.A.S.T Cloud™.

Cherwell & NNT - A Collaborative Solution

What does a Closed-Loop Intelligent Change Control process look like?

Closed loop change process diagram

  1. Request for proposed changes are submitted to a CAB (change advisory board). The CAB either approves or rejects the request for change.
  2. If approved, a Release, Build, Test, Schedule and Deployment plan is created to take effect within a prescribed Change Management & Maintenance Window.
  3. Change Tracker is incorporated into a pre-production test environment of the ITSM tool(s). Observed changes by NNT Change Tracker are used as a mechanism to auto-build a policy to identify and suppress noise of expected changes in post-deployment environments. (NNT Change Tracker Builds New Planned Change Schedule).
  4. NNT will operate (inside and outside the Change Mgmt & Maintenance Window) to detect all changes.
  5. NNT observed changes are reconciled against approved change requests from the ITSM platform.
  6. By understanding the authorized and approved changes, NNT will highlight all the unknown, unwanted, unexpected and potentially malicious changes (additions, modifications and deletions). These are the changes needing to be reviewed and investigated immediately.

Speak to a consultant to help you find a solution that fits your security needs

Latest Resources

CIS

Access CIS Resources
Access a broad range of CIS Benchmark reports to audit your enterprise and continuously monitor for any drift from your hardened state.
Download Reports »

Server Hardening

Server Hardening Resources
Download Hardened Services checklists, derived by NNT in conjunction with Microsoft, to manually audit your servers for compliance.
Download Checklists »

Audit Policy

Audit Policy Template Resources
Gain access to audit policies derived from the Center for Internet Security to generate audit logs on all relevant security levels.
Download Audit Policies »

NNT Suite of Products

change tracker gen7r2 logo

Combine industry leading Device Hardening, File Integrity Monitoring, Change Control, Configuration Management & Compliance Management into one easy to use solution that can scale to the most demanding environments!

fastcloud logo

Automatically evaluate and verify the authenticity of file changes in real-time with NNT FAST™ (File Approved-Safe Technology) Integrity Assurance.

log tracker logo logo

Comprehensive and easy to use security information & event log management with intelligent & self-learning correlation technology to highlight potentially harmful activity in seconds.

vulnerability tracker logo

Continuously scan and identify vulnerabilities with unparalleled accuracy and efficiency, protecting your IT assets on premises, in the cloud and mobile endpoints.

USA Offices
New Net Technologies LLC
Naples
Suite #10115, 9128 Strada Place
Naples, Florida, 34108
Atlanta
1175 Peachtree St NE
Atlanta, Georgia, 30361.
Portland
4145 SW Watson, Suite 350
Beaverton, Oregon, 97005.

Tel: (844) 898-8358
email [email protected]
UK Office
New Net Technologies Ltd
Rivers Lodge, West Common
Harpenden, Hertfordshire
AL5 2JD

Tel: 01582 287310
email [email protected]
CIS benchmarking SEWP Cybersecurity 500Sans Institute Now Certified
Copyright 2019, New Net Technologies LLC. All rights reserved. 
NNT and Change Tracker are registered trademarks of New Net Technologies LLC.
All other product, company names and trademarks are the property of their respective owners.