NNT SaaS For Change Tracker
The Worlds leading SecureOps solution delivered from The Cloud
A ready to go, NNT Change Tracker Gen7 R2 system, hosted in the world’s leading cloud infrastructure, Amazon Web Services.
Your own Change Tracker environment, curated reporting, system optimization, hosted and managed by NNT, no need to worry about implementation or management of the central Change Tracker Hub, hardware, patching or backups. All delivered using an affordable and flexible licensing system.
Your choice! The SaaS hub is available via any combination of public internet services (via secure, unidirectional HTTPS using the latest TLS 1.2), or AWS VPC peering to connect to your existing AWS Cloud systems, or even via dedicated, private VPN links to your legacy datacenters.
The Hub is secured within the AWS cloud, the worlds leading SOC2-compliant cloud services platform. Further protection is provided using the AWS WAFS (Web Application Firewall Service) to just inbound-only, HTTPS web traffic. Meanwhile the NNT Cloud Management team only ever have access to the platform via the AWS console, with the AWS WAFS blocking all outbound traffic.
- NNT Change Tracker Hub is hosted witin Secure AWS cloud
- All access to Hub from Internet is inbound-only, HTTPS on custom port, and crucially , is all inspected and controlled by AWS WAFS
- All inbound traffic is BLOCKED by AWS WAFS policy except for inbound traffic matching NNT API format.
- NNT team only have access to NNT Hub via AWS Console, AWS WAFS blocks all outbound traffic (no access to Customer Premises systems)
Change Tracker Gen 7R2: Complete configuration and system integrity assurance combined with the most comprehensive and intelligent change control solution available.
Vulnerability Tracker: The world’s only limitless and unrestricted vulnerability scanning solution with unparalleled accuracy and efficiency, protecting your IT assets on premises, in the cloud and mobile endpoints.
Access CIS Resources
Access a broad range of CIS Benchmark reports to audit your enterprise and continuously monitor for any drift from your hardened state.
Download Reports »
Server Hardening Resources
Download Hardened Services checklists, derived by NNT in conjunction with Microsoft, to manually audit your servers for compliance.
Download Checklists »
Audit Policy Template Resources
Gain access to audit policies derived from the Center for Internet Security to generate audit logs on all relevant security levels.
Download Audit Policies »