Videos and Webinars
File Integrity Monitoring (FIM) is a foundational control that involves analyzing operating system and application software files to determine if and when they have changed, how they changed and who made the change using a verification method between a current file state and a known baseline.
See how NNT Change Tracker Gen 7 ™ delivers "closed loop" SecureOps™, reconciling all actual changes made with ServiceNow® change requests.
Leverage cloud-based Threat Intelligence to automatically validate file changes as they are detected using an authoritative file whitelist. And now you can use the NNT FAST™ (File Approved-Safe technology) Cloud to do just this, in real-time.
Overview and key highlights
Change Tracker Gen7 provides the most accurate and effective File Integrity Monitoring solution, ensuring the integrity of your security IT systems and reporting any changes as they take place. But how do you differentiate between ‘good’, intended or planned changes, and ‘bad’, possibly malicious activity?
In this Educational Moment we discuss Comparing and Contrasting Compliance Reports to provide ongoing real time compliance intelligence. Learn how to leverage the information provided for enhanced security and compliance management as well as comparing results from different devices to ascertain any configuration or compliance drift.
This Educational Moment will be on the topic of Configuration Policy Remediation. With NNT's latest Threat Mitigation Kits, organizations are equipped with the necessary configuration & vulnerability checklists, which NNT further automates to automatically fix any weaknesses identified within your systems.
See the next generation of breach prevention technology - Change Tracker Gen 7™
Every gap in defenses leaves the enterprise with a Cyber Security Achilles Heel, a weak spot or vulnerability that an attacker can exploit. We call this the Enterprise Attack Surface.
How prone is your organization to an attack right now? How do you assess or measure this?
This overview shows how Change Tracker Version 6.5 uses real-time file integrity monitoring technology to discover vulnerabilities using CIS Benchmark reports, for servers, database systems and network devices, thereafter providing real-time FIM to detect any breach or malware.
Your organization is under attack right now. The range of techniques and battlefronts is bigger than ever
CIS Control 5 should be called the ‘Remember-what-happened-to-the-Death-Star’ security control because it’s all about hardening systems against cyber-attacks through secure configuration settings.
Through a major collaboration with Greenbone Networks, NNT has advanced their security through system integrity strategy with distributed...
About this webinar: Most organizations today run a ‘Build-a-Bear’ approach to Cyber Security, with products and practices they piece together.
Halloween has been and gone: the time where we share scary stories knowing they’re confined to story books and movie screens, but unfortunately, there are some IT horror stories that are all too real: the scariest being ransomware.
Any therapist will tell you that there are a range of emotions adopted when dealing with grief of any kind. Nothing changes when dealing with the grief caused by having to manage a GRC Compliance Audit. But the good news is you can get through it!
During this Webinar, you’ll hear directly from our panel of experts as we discussed the increased importance of applying the Center for Internet Security Controls as a modern cyber security approach. The session also highlighted the benefits of combining the CIS standards with ongoing, real-time compliance monitoring.
NNT recently conducted a webinar series on the topic of achieving compliance and how to combat today’s devastating ransomware attacks.
Abiding by compliance standards is a must and at NNT, we know it’s more than just a check-list exercise. By combing Continuous Compliance Tracking, Intelligent Change Control & Continuous System Integrity Monitoring, NNT has made achieving, proving & remaining compliant a straightforward and closed-loop process.
NNT recently hosted a webinar and published a series of educational resources on the predicted 2016 Cyber Security Threat Landscape. To that end, NNT would like to provide you with a brief overview of our findings.
It should come as no surprise that cyber threats are continuing to evolve both in sophistication and the level of threat they represent. Despite these continued threats, there’s an equally improving maturity within the cyber security community & growing evidence that a simple, pragmatic and best practice approach to security is more than capable of fending off the threat.