Today's IT professionals are faced with the task of ensuring the continuous compliance of their IT infrastructure with an overwhelming spectrum of policy and regulations: PCI for retailers; SOX for sensitive financial information; NERC for energy suppliers and power regulators; HIPAA and HITECH for medical professions; CIS, DIA, and NIST for sensitive security systems. And this list continues to grow.

NNT Log Tracker Enterprise provides a comprehensive solution to any compliance mandate requiring log collection and retention. Event log analysis is a key weapon in the fight against any cyber attack. Identifying the method and source of an attack allows preventative measures to be continually improved. This is why all security policies place log retention at their core. PCI DSS compliance requires logs to be gathered and reviewed daily and retained for at least one year. Similarly, for GCSx Code of Connection, or Co Co, compliance, audit logs recording user activities, exceptions and information security events are to be retained for at least 6 months.

NNT Change Tracker Enterprise provides configuration assessment policies out of the box... Change Tracker Enterprise enables IT organizations to assess the entire IT Infrastructure against security benchmarks for both physical and virtual configurations, and quickly achieve configuration compliance and integrity. Best of all, it can dramatically cut both audit preparation time and cost and bring the infrastructure into a state of continuous compliance. Examples include:

PCI Compliance

Change Tracker Enterprise gives merchants, service providers, Government Offices and acquiring banks confidence that they've secured sensitive cardholder data and have proof of continuous PCI compliance for Auditors. Use in conjunction with Log Tracker Enterprise to meet and exceed PCI DSS requirements for event log gathering and retention.

Click Here for More Information

Click Here for Sample Report

For more information on the PCI DSS V3.2 requirements click here

GCSx Code of Connection (CoCo)

The UK Government’s Code of Connection security standard requires all network ‘touchpoints’ to be protected and secured from potential cyber attacks. Change Tracker Enterprise ensures that your network and servers remain in a securely configured state. Log Tracker Enterprise gathers and stores event log messages for all relevant systems in line with CoCo requirements.

Click Here for Further Information

For more detail on the GCSx Code of Connection click here


Change Tracker helps organizations across the power industry comply with NERC Cyber Security Standards CIP 003-6, 005-1, and 007-1, with policies that meet the requirements outlined in 005 and 007.

Click Here for Sample Report

For more details on the NERC CIP security standard click here

ISO 27000 / ISO 27001 / ISO 27002/ ISO 27K

The ISO27K standard defines the concept of an Information Security Management System, encompassing risk assessment and measures to mitigate risk , including business continuity. Change Tracker Enterprise underpins your Change Management process to ensure device configuration settings are automatically tracked and backed up at all times.

Click Here for Further Information

For more details on all ISO27K standards please click here


With Change Tracker Enterprise, IT ensures compliance with important controls from the COBIT framework and generates evidence of compliance in an audit.
ISO 27001

For more details on the COBIT framework please click here


Public companies subject to SOX compliance save time and money getting IT systems compliant and proving compliance in an audit using NNT’s automated configuration assessment policy for SOX followed by NNT's proven change auditing.

Click here for further information

For more background on the Sarbanes-Oxley Act please see


The GLBA (Graham-Leach-Bliley Financial Services Modernization Act focuses on the cybersecurity of financial sector organizations, including commercial and retail banks, investment firms, and related insurance companies.

Click here for further information

For an insight to the Gramm-Leach-Bliley Act please see


Based on best practices from NIST, DISA, and the NSA, NNT ensures Windows XP machines are configured according to the settings of the Federal Desktop Core Configuration (FDCC).

For more background on the FDCC, NIST, SCAP & OVAL vulnerability & hardening checklists & standards »

Microsoft IIS

NNT's Microsoft IIS policy provides configuration control of Microsoft IIS servers, giving administrators confidence they can deliver important business services like e-commerce and customer support.

Click here for further information

Microsoft Exchange

By assessing Microsoft Exchange Server configurations against the expert settings included in NNT's Microsoft Exchange policy, IT easily ensures business communications stay up and running 24/7.

Click here for further information


With Change Tracker Enterprise, organizations gain greater visibility into the configuration of their VMware ESX hypervisors and take a major step toward achieving a known and trusted state for their virtual environment.

Click here for more information



Contact Us

USA Offices

New Net Technologies LLC
4850 Tamiami Trail, Suite 301
Naples, Florida, 34103

New Net Technologies LLC
1175 Peachtree St NE
Atlanta, Georgia, 30361.

Tel: (844) 898-8358
[email protected]


UK Office

New Net Technologies Ltd
The Russell Building, West Common
Harpenden, Hertfordshire

Tel: 020 3917 4995
 [email protected]

SC Magazine Cybersecurity 500 CSGEA Winners 2021 CIS benchmarking SEWP Now Certified IBM Security
Copyright 2022, New Net Technologies LLC. All rights reserved. 
NNT and Change Tracker are registered trademarks of New Net Technologies LLC.
All other product, company names and trademarks are the property of their respective owners.