Combining SIEM, CCM and FIM in one easy to use solution, NNT enables organizations to see which events take place, automatically honing in on those of concern - it will identify what changed, who made the change and which changes were planned vs unplanned, all in real-time.

The solution will reduce manual effort by automating the CCM process, removing the need to firefight whilst identifying the root cause of issues and preventing recurrence of the incident. It will eliminate the breach to detection time gap, alerting on unauthorized changes that introduce security risk or non-compliance and will enable you to make continual improvements to your compliant state by ‘learning with each alert’ to refine process and policy.

Security Monitoring - Change Detection

NNT Security Information and Event Log Management (SIEM)
NNT’s multi-platform security correlation enables you to securely gather and review daily logs from all devices, including network devices, UNIX and Window servers, applications and databases.
It will show:

  • Who has accessed what device
  • Is there an on-going security vulnerability
  • Whether confidential data is impacted

CIS Security Benchmark Certificate

NNT Change & Configuration Management (CCM)
The NNT solution starts with a compliance or device hardening audit option to ensure the devices are set up securely from the outset. On-going forensic detection of changes to this compliant state will be tracked in real-time or as part of a scheduled report, controlling and minimizing configuration drift and ensuring system configurations don’t deviate away from established standards and policies.
It will confirm:

  • Which devices were affected
  • Who made the change
  • Whether the change was approved
  • Whether it has affected your compliant state

NNT File Integrity Monitoring (FIM)
A vital stance in the bid to protect systems from breaches is to monitor unusual or unapproved changes to the Application file systems. NNT FIM verifies program and operating system files have not been compromised, with host intrusion prevention (HIP) pinpointing anything malicious installed on the in scope device.
It will identify:

  • Unusual changes
  • Which specific attributes changed and who made the change
  • Adds, moves or deletes
  • Checksum/hash based changes
 Trusted by:
vse.jpgcsmartlive-casino.jpgiac.jpgharrods.jpgfirst-quantum.jpgMontrose-Travel.jpgkenneth-copeland.jpgTotal-Card.jpghhglobal.jpghepsiburada.jpgsunchemical.jpgshearwater.jpgamdocs.jpgcrowedunlevy.jpgcablewire.jpgnorcotek.jpgcigna.jpgucsandiego.jpgmtrgaming.jpglivenation.jpgabrsm.jpgbobby-cox.jpgedm.jpgpowerchord.jpgzen.jpggvec.jpgodeon.jpgharbouritau.jpgspar.jpgdatamatx.jpgnxgen.jpgnymbus.jpgrayonier.jpgwestfield-state-university.jpgalamo-colleges.jpgboomkat.jpgbowtie.jpgwallashops.jpgzap.jpgStandard-Hotel.jpgCompliance-360.jpgdupont.jpgAWA-Collections.jpg4wheelparts.jpgacas.jpgcentertheatre.jpgstpeters.jpgcontinuum.jpgbchdigital.jpgorbcomm.jpgrentatoll.jpg5thavetheatre.jpgpass.jpgpando.jpgford.jpgveolia.jpgduncansolutions.jpgdublin-business.jpgkennethhagin.jpgstjoe.jpgtravelodge.jpgmarwoodgroup.jpghampshire.jpgbnpparibas.jpgjack-wills.jpgcredimax.jpgni.jpgconcord.jpgnafsa.jpgberkshireassociates.jpgrealec.jpgeztaxreturn.jpghbl.jpgraiffeisen.jpgticketmaster.jpgzamir.jpgonpoint.jpgwonga.jpgclickandbuy.jpgcolliercounty.jpgblakemore.jpgPenn-State-Uni.jpgingbank.jpgushmm.jpgjohnsons.jpggowireless.jpgfis.jpgenmax.jpgtechnologypros.jpgderivco.jpgcboss.jpgunifiedpayments.jpglivetv.jpgdunelm.jpgxaxis.jpgShelby-County.jpgNIBSS.jpggeneral-dynamics.jpgcare.jpgnhs.jpgleidos.jpghotel-cholat.jpgwestern-financial-group.jpgunionbank.jpgretail-lockbox.jpglansare_logo.jpgwindsorandmaidenhead.jpgxap.jpgcua.jpgwizzair.jpgaberdeen.jpgwhynotleaseit.jpgredwood.jpgislandbanki.jpgeuroffice.jpgAeriandi.jpgpurchase.jpgarqiva.jpgsajan.jpghp.jpgopportune.jpgrnib.jpgeasystreet.jpghph.jpgprometric.jpgpunter-southall.jpgsiconns.jpgcuany.jpgpicturehouse.jpgryanair.jpgskipton.jpgSpanson.jpghandh.jpgchaparral.jpgxerox.jpgmaxwellpaper.jpgwett.jpggolubcapital.jpgbarton-cooney.jpgiridium.jpgbrocade.jpgpaymetric.jpgpma.jpgsymago.jpgselectcore.jpgzenithbank.jpgvmi.jpgRichland-Logistics.jpgentee.jpgseapines.jpgbom.jpgovec.jpgwhsmith.jpgbritish-museum.jpgadvance2000.jpgaimia.jpgnctm.jpgaspen.jpghei-hotels.jpgdeluxecorp.jpgnashville-int-airport.jpgessex-police.jpgBiaggis.jpgnkwd.jpgsynergiecontact.jpgeTranzact.jpgkalmbachpublishing.jpgScotRail.jpgcornell.jpgBlackbird-Technologies.jpglark.jpgaciconn.jpgarmy.jpgjet-blue.jpgforeshore.jpgspendvision.jpgsimmons.jpgbankofchina.jpgpkr.jpginss.jpgdudley-nhs.jpgtheatreroyal.jpgpartnerships.jpguniversal-orlando.jpggm.jpgthewestbrom.jpghub_logo.jpgepay.jpgequiant.jpgactivetelesource.jpgduoboots.jpgvoxgen.jpgvnpay.jpglandisgyr.jpgageas.jpgghl.jpgace.jpgnewlook.jpgeon.jpgbriefing.jpgsymetra.jpgRed-Card-Systems.jpgnhs-bury.jpgbrightstar.jpgpaypro-business.jpgdhl.jpg
USA Offices
New Net Technologies Ltd
Naples
9128 Strada Place
Naples, Florida, 34108
Atlanta
201 17th Street, Suite 300
Atlanta, Georgia, 30363.

Tel: 1-888-898-0674
email USinfo@nntws.com
NNT Logo
UK Office
New Net Technologies Ltd
Spectrum House, Dunstable Road
Redbourn,
St Albans

Herts
AL3 7PR

Tel: 08456 585 005
Fax: 08456 122 031
email info@newnettechnologies.com
Connect with NNT
Google+ Linkedin Twitter - Change Tracker Facebook rss feed YouTube
Sign up to NNT's IT security and compliance monthly newsletter. Get breaking security news, how-to tips, trends and commentary direct to your inbox.