CIS CyberMarket®

NNT was selected to join CIS’s CyberMarket as a means to address several of the CIS Controls and participating in a purchasing program that serves U.S. State, Local, Tribal, and Territorial (SLTT) government organizations, not-for-profit entities, and public health and education institutions to improve cybersecurity through cost-effective group procurement.

By leveraging the strategic partnership between CIS and NNT, public and not-for-profit organizations can recognize the benefits of:

  • A CIS approved technology that maps directly to various Basic, Foundational and Organization CIS Controls
  • Receiving product and service discounts through a collective purchasing program established by CIS
  • Utilizing numerous resources to help safeguard against cyber threats

91% of all security breaches can be auto-detected when release, change and configuration management controls like NNT are properly implemented - IT Process Institute

CIS Controls and NNT

The first six CIS Controls (Basic) are the most critical to implement and manage. Interestingly, they have more to do with operational controls than they do security controls. NNT’s products uniquely align with the requirements of these "Basic" controls by providing a suite of products that address each of the controls requirements.

NNT's strategic partnership with CIS highlights the industry's need to combine an IT management methodology and best practices from both security and IT service management...resulting in a holistic, comprehensive and prescriptive approach to solving security. This strategy is what NNT calls SecureOps™.

This strategy is underpinned by NNT’s knowledge of the essential common controls that overlap to support and achieve business objectives from two different vantage points. This approach creates the security foundation and a solution to eliminate security breaches and incidents as we know them today.

Good IT operations management has always been the foundation for a strong cyberdefense; if you can't do the first, you will fail at the second.

CIS Logo
Tony Sager, SVP and Chief Evangelist

CIS Controls Solution Briefing:
Learn how NNT addresses the CIS controls

icon

CIS Controls Detailed White Paper:
Learn where NNT can address the 20 CIS Controls

icon

CIS Controls Report:
Download the CIS Controls Version 7 Report

icon

Additional Resources

"The majority of security incidents occur when basic controls are lacking or are poorly implemented. The first six CIS Controls have been assessed as preventing up to 90% of pervasive and dangerous cyber-attacks.”

Read John Gilligan (CEO of Center for Internet Security) testimony to the United States Senate, Permanent Subcommittee on Investigations, Homeland Security & Government Affairs Committee on Private Sector Data Breaches, Thursday, March 7, 2019.
Read John Gilligan’s testimony »
Watch John Gilligan’s testimony »

Latest Resources

CIS

Access CIS Resources
Access a broad range of CIS Benchmark reports to audit your enterprise and continuously monitor for any drift from your hardened state.
Download Reports »

Server Hardening

Server Hardening Resources
Download Hardened Services checklists, derived by NNT in conjunction with Microsoft, to manually audit your servers for compliance.
Download Checklists »

Audit Policy

Audit Policy Template Resources
Gain access to audit policies derived from the Center for Internet Security to generate audit logs on all relevant security levels.
Download Audit Policies »

NNT Suite of Products

change tracker gen7r2 logo

Combine industry leading Device Hardening, File Integrity Monitoring, Change Control, Configuration Management & Compliance Management into one easy to use solution that can scale to the most demanding environments!

fastcloud logo

Automatically evaluate and verify the authenticity of file changes in real-time with NNT FAST™ (File Approved-Safe Technology) Integrity Assurance.

log tracker logo logo

Comprehensive and easy to use security information & event log management with intelligent & self-learning correlation technology to highlight potentially harmful activity in seconds.

vulnerability tracker logo

Continuously scan and identify vulnerabilities with unparalleled accuracy and efficiency, protecting your IT assets on premises, in the cloud and mobile endpoints.

USA Offices
New Net Technologies LLC
Naples
Suite #10115, 9128 Strada Place
Naples, Florida, 34108
Atlanta
1175 Peachtree St NE
Atlanta, Georgia, 30361.
Portland
4145 SW Watson, Suite 350
Beaverton, Oregon, 97005.

Tel: (844) 898-8358
email [email protected]
UK Office
New Net Technologies Ltd
Rivers Lodge, West Common
Harpenden, Hertfordshire
AL5 2JD

Tel: 01582 287310
email [email protected]
CIS benchmarking SEWP Cybersecurity 500Sans Institute Now Certified
Copyright 2019, New Net Technologies LLC. All rights reserved. 
NNT and Change Tracker are registered trademarks of New Net Technologies LLC.
All other product, company names and trademarks are the property of their respective owners.