NNT’s Post Deployment Check-Up Service
NNT understands that the first months with a new product are the most important. This is when the real learning is done and operational processes put in place to integrate the solution within the organization.
Therefore to help our customers maximize the effectiveness of their investment, the NNT team will conduct a post-deployment check-up to ensure everything is running smoothly.
The check-up session is normally conducted at the 6-month point but as a customer of NNT, the session is there to be used whenever you feel it is suitable.
The check-up takes the form of a 30-minute call with your NNT account manager and an NNT technical resource.
At the end of the check-up session your NNT account manager will follow-up with a summary of the items discussed. If there are items which need to be addressed in more detail, perhaps a little bit of "how to" training or potentially an upgrade, then follow-up sessions with the support team will be organized.
“As part of our ongoing commitment to providing reliable and secure hosted and remote telecoms solutions to our clients, we wanted to ensure we had all of the security items for the Payment Card Industry Data Security Standard well taken care of. After some research we came across NNT. The team at NNT listened carefully to our requirements and taking on-board our desire to keep costs manageable without skimping on quality, NNT proposed their Change & Log Tracker solution.
The software worked just as we hoped during trial and having now installed the system into our production env...
Combine industry leading Device Hardening, File Integrity Monitoring, Change Control, Configuration Management & Compliance Management into one easy to use solution that can scale to the most demanding environments!
Automatically evaluate and verify the authenticity of file changes in real-time with NNT FAST™ (File Approved-Safe Technology) Integrity Assurance.
Comprehensive and easy to use security information & event log management with intelligent & self-learning correlation technology to highlight potentially harmful activity in seconds.
Access CIS Resources
Access a broad range of CIS Benchmark reports to audit your enterprise and continuously monitor for any drift from your hardened state.
Download Reports »
Server Hardening Resources
Download Hardened Services checklists, derived by NNT in conjunction with Microsoft, to manually audit your servers for compliance.
Download Checklists »
Audit Policy Template Resources
Gain access to audit policies derived from the Center for Internet Security to generate audit logs on all relevant security levels.
Download Audit Policies »