mailerlogo.png

Newsletter

 
February 21st, 2017
 janissue.png

WEBINAR REMINDER

Don't Forget to Join Us Tomorrow February 22nd at 11am EST!

During tomorrow's webinar on Modernizing your Cyber Security Approach with the Center for Internet Security you'll hear directly from our panel of experts – David Froud with Core Concept Security, Adam Montville with the Center for Internet Security (CIS), Mark Kerrison with NNT, and Mark Kedgley with NNT. They'll be covering the increased importance of applying the Center for Internet Security standard to your modern cyber security approach, and will also be highlighting the benefits of combining the CIS standards with ongoing, real-time compliance monitoring.

You can register for the webinar by clicking here

Inter continental Hotels Confirms Breach at 12 Hotels

An announcement made by InterContinental Hotel Group (IHG) confirmed that a credit card breach affected at least 12 of its properties in the United States. IHG released a statement explaining it found malicious software installed on point of sale servers between August and December 2016 at restaurants and bars of 12 IHG-managed properties. The stolen credit card data included information stored on the magnetic stripe of credit and debit cards, including card holder name, card number, expiration data, and internal verification code

Read more »

Our panel of experts will be asked a series of questions, including: Why is it that a huge number of breaches are still able to exploit existing known vulnerabilities, Why do you need to understand the state of the configuration of your IT estate, Why do organizations tend to prioritize focus on perimeter defenses at the expense of the actual systems that store sensitive data, What's the latest guidance on Ransomware, Why is the Center for Internet Security relevant, and What is the safest thing to do when eliminating vulnerabilities by hardening.

newsimg2.jpg

Cloud Security & Compliance in Action

The cloud has created a level of convenience and scalability that was unprecedented until just a few years ago. However, while cloud adoption has gained popularity over the last few years, security and compliance have historically been lacking in this field. The daunting task of incorporating a cloud environment into any business is a headache enough, not to mention the complexities a business has to face when complying with regulatory standards. But these standards are put in place to ensure sensitive data stored in the cloud has safeguards implemented to protect clients, employees, and companies from online harm.

Read more »

newsimg1.jpg

Laser Precision Planned Change Rules- Tips & Tricks

Change Tracker Gen7 has been designed to be simple to set-up and use. This is a key differentiator from the more cumbersome legacy products such as Tripwire® Enterprise with complex combinations of Tasks, Actions, Rules and Policies all with regular expression pattern matches to configure. The beauty of Change Tracker Gen7 is that all the most common monitoring and reporting tasks are pre-packed and automatically assigned to devices based on an intelligent discovery process. 

 Read more »


untitled.png

NEW YORK STATE REVEALS NEW CYBERSECURITY REGULATIONS FOR FINANCIAL INDUSTRY

The governor of New York State, Andrew Cuomo, announced last Thursday comprehensive new cyber security regulations for the financial service industry, in an effort to improve cyber resilience within the financial sector and keep customer data safe. 

Read more »

USA Office - Naples
9128 Strada Place, Naples, Florida, 34108
Tel: 1-888-898-0674

USA Office - Atlanta
201 17th Street, Suite 300,
Atlanta, Georgia, 30363

UK Office
Spectrum House, Dunstable Road
St Albans, AL3 7PR.
Tel : 08456 585 005

Email: [email protected] | Web: www.newnettechnologies.com
Copyright © 2017 - New Net Technologies, All rights reserved.

 

The Most Powerful & Reliable Cybersecurity Products

change tracker gen7r2 logo

Change Tracker Gen 7R2: Complete configuration and system integrity assurance combined with the most comprehensive and intelligent change control solution available.

FAST Cloud logo

Fast Cloud: Leverage the world’s largest whitelist repository to automatically evaluate and verify the authenticity of file changes in real-time with NNT FAST™ (File Approved-Safe Technology)

vulnerability tracker logo

Vulnerability Tracker: The world’s only limitless and unrestricted vulnerability scanning solution with unparalleled accuracy and efficiency, protecting your IT assets on premises, in the cloud and mobile endpoints.

log tracker logo

Log Tracker: Comprehensive and easy to use security information & event log management with intelligent & self-learning correlation technology to highlight potentially harmful activity in seconds

Contact Us

Corporate Headquarters

Netwrix
6160 Warren Parkway, Suite 100
Frisco, Texas, 75034

Phone 1: 1-949-407-5125

Phone 2: 888-638-9749 (toll-free)


[email protected]
 

United Kingdom

Netwrix
5 New Street Square
London EC4A 3TW

Phone: +44 (0) 203 588 3023


 [email protected]
SC Magazine Cybersecurity 500 CSGEA Winners 2021 CIS benchmarking SEWP Now Certified IBM Security
Copyright 2024, New Net Technologies LLC. All rights reserved. 
NNT and Change Tracker are registered trademarks of New Net Technologies LLC.
All other product, company names and trademarks are the property of their respective owners.