NNT SecureOps and the ECC: Saudi Arabia’s Essential Cybersecurity Controls

Saudi Arabia's Essential Cybersecurity Controls

Saudi Arabia’s National Cybersecurity Authority introduced the Essential Cybersecurity Controls (ECC) in 2018. The objective was to establish best practice in cyber security at a national level, covering critical infrastructure, high priority sectors and government services. The ECC is a comprehensive but ‘one size fits all’ security framework and as such is a minimum requirement, with the expectation that each organization seeking to demonstrate compliance should also undertake their own risk assessment.

Put simply, risk levels are different for each organization, determined by industry sector, confidential data being processed and the exposure represented by their IT systems/architecture. Domain 5 focuses on Industrial Control Systems/Operational Technology, which will only be relevant to those organizations with a dependency on manufacturing/production facilities or those in energy generation/distribution.

NNT SecureOps™ is the perfect solution
for operating and demonstrating ECC compliance.

vulnerability tracker logo

NNT’s Vulnerability Tracker™ identifies known vulnerabilities within software and configuration settings before they can be exploited by a cyber-attack.

  • Directly addresses ECC 2-1 Asset Management, 2-10 Vulnerabilities Management, 2-11 Penetration Testing, 2-15 Web Application Security and 5-1 Industrial Control Systems (ICS) Protection
  • Unique, fully meshed, distributed scanning solution providing UNLIMITED scanning, not restricted by device counts. This makes Vulnerability Tracker the most scalable, flexible and cost-effective enterprise-class scanner.

change tracker gen7r2 logo

NNT Change Tracker Gen 7 R2 provides fundamental cyber security prevention and detection. It does this by leveraging the required security best practice disciplines of system configuration and integrity assurance combined with the most comprehensive and intelligent change control solution available. Change Tracker from NNT will ensure that your IT systems remain in a known, secure and compliant state at all times.

  • Directly addresses ECC 2-3 Information System and Information Processing Facilities Protection, 2-5 Networks Security Management, 2-7 Data and Information Protection and 5-1 Industrial Control Systems (ICS) Protection
  • Provides context-based File Integrity Monitoring and File Whitelisting to assure all change activity is automatically analyzed and validated.
  • Certified CIS configuration hardening ensures all systems remain securely configured at all times
  • Intelligent change control technology, provides unparalleled change noise reduction along with the ultimate reassurance that the changes occurring within your production environment are consistent, safe and as required.

log tracker logo logo

NNT Log Tracker records full audit trails of all user and system activity then correlates events to provide early-warning of hacker behavior.

  • Directly addresses ECC 2-12 Cybersecurity Event Logs and Monitoring Management and 2-13 Cybersecurity Incident and Threat Management
  • Securely protects all logs and audit trails
  • Correlates logs from all devices including network devices, Unix and Windows servers, applications and databases, ICS and OT infrastructure, analyzing them for unusual or suspicious activity
  • Pre-built compliance reports and scorecards
  • Alert Rules and Tickets can be used to build escalation logic, prioritizing more serious threats with Severity Ratings
  • Ideal as an Event Aggregator and feed for a ServiceDesk or External Security Response Teams.

Speak to a consultant to learn how NNT automates the Essential Cybersecurity Controls Contact Us

The Most Powerful & Reliable Cybersecurity Products

change tracker gen7r2 logo

Change Tracker Gen 7R2: Complete configuration and system integrity assurance combined with the most comprehensive and intelligent change control solution available.

FAST Cloud logo

Fast Cloud: Leverage the world’s largest whitelist repository to automatically evaluate and verify the authenticity of file changes in real-time with NNT FAST™ (File Approved-Safe Technology)

vulnerability tracker logo

Vulnerability Tracker: The world’s only limitless and unrestricted vulnerability scanning solution with unparalleled accuracy and efficiency, protecting your IT assets on premises, in the cloud and mobile endpoints.

log tracker logo

Log Tracker: Comprehensive and easy to use security information & event log management with intelligent & self-learning correlation technology to highlight potentially harmful activity in seconds

Contact Us

Corporate Headquarters

Netwrix
6160 Warren Parkway, Suite 100
Frisco, Texas, 75034

Phone 1: 1-949-407-5125

Phone 2: 888-638-9749 (toll-free)


[email protected]
 

United Kingdom

Netwrix
5 New Street Square
London EC4A 3TW

Phone: +44 (0) 203 588 3023


 [email protected]
SC Magazine Cybersecurity 500 CSGEA Winners 2021 CIS benchmarking SEWP Now Certified IBM Security
Copyright 2024, New Net Technologies LLC. All rights reserved. 
NNT and Change Tracker are registered trademarks of New Net Technologies LLC.
All other product, company names and trademarks are the property of their respective owners.