ITSM Integration

Connect your existing IT Service Management tools with NNT to correlate the changes that occur within your IT environment with those that were actually planned and approved.

By combining the best practice, operational discipline of Change Management with the compliance and security discipline of Change Monitoring and Change Control, you will inherently improve the security of your operations – SecureOps for short!

NNT’s suite of ITSM integration options combines the ability to correlate changes within your environment with an approved ticket or set of intelligent change rules, which in turn helps to prevent and protect against all forms of breach as well as gaining full control of changes for security, compliance and operational peace of mind.

Let NNT and any one of our ITSM partners demonstrate how these established integrated solutions can maximize your operational integrity, security and compliance by implementing a closed-loop intelligent change control solution.

91% of all security breaches can be auto-detected when release, change and configuration management controls like NNT are properly implemented
- IT Process Institute

The industry needs to begin to stop following bright shiny objects and looking for silver bullets. Solving the problem of security requires basic fundamental IT management methodology driven from years of factual evidence and data. Simply put…If you control CHANGE you control SECURITY!

Learn more...
SecureOps™
Security Through System Integrity
IT Process Institute Report

80% of unplanned downtime is due to Change
- Gartner

Change is the root cause for majority of all service availability issues. If you implement a Closed-Loop Intelligent Change Control solution you can drastically reduce the risk of service down-time. Change is the only constant…which requires a solution to facilitates known and expected changes that have been pre-tested and pre-approved.

Learn more...
Closed-Loop Intelligent Change Control

197 days is the average length of time it takes for organizations to detect a data breach
- Ponemon Institute

NNT and its ITSM partners can provide a unique solution that takes the 197 day average to detect a breach down to 1 day. By allowing only known and expected changes to occur, all other identified and detected changes can be discretely managed and removed if necessary.


Learn more...
Continuous Compliance & Assurance

CHANGE CONTROL is the common denominator across IT Security, Availability and Compliance! If you control change you control your IT risk, service availability and ability to demonstrate compliance on a daily basis.

ITSM Solution Partners

Select from any number of solution partners to learn more about Closed-Loop Intelligent Change Control.

servicenow logo

Learn more...
ServiceNow

servicenow logo

Learn more...
Cherwell

servicenow logo

Learn more...
BMC

ITSM Tools & NNT - A Collaborative Solution

Change Management and Change Control are two very different but necessary solutions to an effective enterprise and service management strategy. Change Management is and has been the process of implementing change relative to an authorized work order that incorporates a release plan, build, test, schedule and deploy. The component that has been missing to create an effective closed-loop solution is change control.

Change control enables the reconciliation of authorized and expected changes against what is continuously observed to pinpoint unknown, unauthorized or malicious activity…all of which can have a catastrophic or negative impact on both security or availability. Whether it’s an employee circumventing a process of a hacker trying to gain access to sensitive information, both situations are unwanted.

By adopting this approach, the traditional problem of “change noise” is eliminated where generated alerts become a short list of priorities needing to be reviewed and/or remediated.

Closed loop change process diagram

What does a Closed-Loop Intelligent Change Control process look like?

  1. Request for proposed changes are submitted to a CAB (change advisory board). The CAB either approves or rejects the request for change.
  2. If approved, a Release, Build, Test, Schedule and Deployment plan is created to take effect within a prescribed Change Management & Maintenance Window.
  3. Change Tracker is incorporated into a pre-production test environment of the ITSM tool(s). Observed changes by NNT Change Tracker are used as a mechanism to auto-build a policy to identify and suppress noise of expected changes in post-deployment environments. (NNT Change Tracker Builds New Planned Change Schedule).
  4. NNT will operate (inside and outside the Change Mgmt & Maintenance Window) to detect all changes.
  5. NNT observed changes are reconciled against approved change requests from the ITSM platform.
  6. By understanding the authorized and approved changes, NNT will highlight all the unknown, unwanted, unexpected and potentially malicious changes (additions, modifications and deletions). These are the changes needing to be reviewed and investigated immediately.

NNT Integration Capabilities

tick

Validate approved changes automatically with a full audit trail of what actually changed provided.

noise

Significantly reduce overwhelming change noise to clearly expose insider & zero-day malware activity.

padlock

Re-use recurring change patterns to isolate pre-approved changes from the unexpected & genuinely suspicious changes.

arrows

Investigate unplanned changes in full, with who made the change and before & after exposure of changes clearly reported.

brain

Automatically analyze changes using continuously updated Threat Intelligence- NNT F.A.S.T Cloud™.

Speak to a consultant to help you find a solution that fits your security needs

Latest Resources

CIS

Access CIS Resources
Access a broad range of CIS Benchmark reports to audit your enterprise and continuously monitor for any drift from your hardened state.
Download Reports »

Server Hardening

Server Hardening Resources
Download Hardened Services checklists, derived by NNT in conjunction with Microsoft, to manually audit your servers for compliance.
Download Checklists »

Audit Policy

Audit Policy Template Resources
Gain access to audit policies derived from the Center for Internet Security to generate audit logs on all relevant security levels.
Download Audit Policies »

NNT Suite of Products

change tracker gen7r2 logo

Combine industry leading Device Hardening, File Integrity Monitoring, Change Control, Configuration Management & Compliance Management into one easy to use solution that can scale to the most demanding environments!

fastcloud logo

Automatically evaluate and verify the authenticity of file changes in real-time with NNT FAST™ (File Approved-Safe Technology) Integrity Assurance.

log tracker logo logo

Comprehensive and easy to use security information & event log management with intelligent & self-learning correlation technology to highlight potentially harmful activity in seconds.

vulnerability tracker logo

Continuously scan and identify vulnerabilities with unparalleled accuracy and efficiency, protecting your IT assets on premises, in the cloud and mobile endpoints.

USA Offices
New Net Technologies LLC
Naples
Suite #10115, 9128 Strada Place
Naples, Florida, 34108
Atlanta
1175 Peachtree St NE
Atlanta, Georgia, 30361.
Portland
4145 SW Watson, Suite 350
Beaverton, Oregon, 97005.

Tel: (844) 898-8358
email [email protected]
UK Office
New Net Technologies Ltd
Rivers Lodge, West Common
Harpenden, Hertfordshire
AL5 2JD

Tel: 01582 287310
email [email protected]
CIS benchmarking SEWP Cybersecurity 500Sans Institute Now Certified
Copyright 2019, New Net Technologies LLC. All rights reserved. 
NNT and Change Tracker are registered trademarks of New Net Technologies LLC.
All other product, company names and trademarks are the property of their respective owners.