Videos and Webinars

Videos

NNT Change Tracker™ Gen7 R2 - Online Demo

NNT Change Tracker Gen 7 R2 provides critical and fundamental cyber security prevention and detection. Change Tracker from NNT will ensure that your IT systems remain in a known, secure and compliant state at all times.

Mega-Scale Change Control

If you are serious about change control and automating key security controls, make sure your monitoring technology doesn't just scale, but that it gives you MEGA-SCALE. Watch the video to find out how.

PCI DSS Requirement: System hardening?

Req 2.2 mandates the need to verify that system configuration standards are consistent with industry-accepted hardening standards. NNT is a CIS-Certified Vendor and as such provides pre-built device hardening templates derived from the CIS Benchmarks to audit for any vulnerabilities present.

IBM QRadar® Integration – IBM Validated

Identifying emerging threats with the volume and velocity of today’s data is challenging for every organization. Let IBM Security and NNT simplify your security risk and exposure by using our QRadar® Integration App now officially validated by IBM.

NNT File Integrity Monitoring (FIM)

File Integrity Monitoring (FIM) is a foundational control that involves analyzing operating systems and application software files to determine if and when they have changed, how they changed and who made the change using a verification method between a current file state and a known baseline.

What's New - Gen7 R2?

Change Tracker Gen7 R2 solves the problems that have plagued organizations and industries for more than a decade – managing the overwhelming noise of change control and ensure the integrity of IT systems.

NNT Change Tracker™ Detects Unplanned Changes and Creates New Security Incidents in ServiceNow®

Change Tracker Gen7 R2 delivers ‘Closed-Loop’ SecureOps, reconciling actual changes made with your ServiceNow change requests.

NNT F.A.S.T. Cloud Threat Intelligence Integration

Leverage cloud-based Threat Intelligence to automatically validate file changes in real-time as they are detected using an authoritative file whitelist with NNT FAST™ (File Approved-Safe technology) Cloud.

Quarterly Update: NNT’s FAST Cloud Integration from NNT’s CEO & CTO

Change Tracker Gen7 provides the most accurate and effective File Integrity Monitoring solution, ensuring the integrity of your security IT systems and reporting any changes as they take place. But how do you differentiate between ‘good’, intended or planned changes, and ‘bad’, possibly malicious activity?

Webinars

Cybersecurity Threats In Healthcare Systems Exposed

Protecting and securing critical electronic health data is more important than ever, as the FBI and other federal agencies have been sounding the alarm on 'imminent' cyber threats targeting healthcare systems.

Misconfiguration

Data breaches caused by cloud misconfigurations have been dominating news headlines in recent years with 80% of companies in the United States experiencing a cloud-related breach according to research by IDC.

Back 2 Basics: Adopting the 6 Basic CIS Controls

Just how effectively does your organization operate the first six CIS Controls?  If 90% of cyber attacks can be prevented by mastering the first 6 controls, why hasn’t everyone already embraced them?

Any Port In a Storm of Cyber-Security Remains a Problem: CIS Control 9

In the second sequence of webinars hosted by Tony Sager, Senior Vice President and Chief Evangelist of Center for Internet Security and Mark Kedgley, CTO of NNT, they discussed CIS Control 9: Limitation and Control of Network Ports, Protocols, and Services.

Cybersecurity Lesson from the Death Star: CIS Control #5 Explained in 30 Minutes

CIS Control 5 should be called the ‘Remember-what-happened-to-the-Death-Star’ security control because it’s all about hardening systems against cyber-attacks through secure configuration settings.

NNT Vulnerability Tracker™ - Re-Innovating the Vulnerability Scanning Market

Through a major collaboration with Greenbone Networks, NNT has advanced their security through system integrity strategy with distributed...

Webinar: Compliance...Implement and Operate the Right Security Controls

About this webinar: Most organizations today run a ‘Build-a-Bear’ approach to Cyber Security, with products and practices they piece together.

Webinar: Nightmare On Ransomware Street - Lock Your Digital Doors

Halloween has been and gone: the time where we share scary stories knowing they’re confined to story books and movie screens, but unfortunately, there are some IT horror stories that are all too real: the scariest being ransomware.

Webinar Recap: 5 Stages of Compliance Audit Grief

Any therapist will tell you that there are a range of emotions adopted when dealing with grief of any kind.  Nothing changes when dealing with the grief caused by having to manage a GRC Compliance Audit. But the good news is you can get through it!

Webinar: Modernizing Cyber Security with CIS

During this Webinar, you’ll hear directly from our panel of experts as we discussed the increased importance of applying the Center for Internet Security Controls as a modern cyber security approach. The session also highlighted the benefits of combining the CIS standards with ongoing, real-time compliance monitoring.

Contact Us

Corporate Headquarters

Netwrix
6160 Warren Parkway, Suite 100
Frisco, Texas, 75034

Phone 1: 1-949-407-5125

Phone 2: 888-638-9749 (toll-free)


[email protected]
 

United Kingdom

Netwrix
5 New Street Square
London EC4A 3TW

Phone: +44 (0) 203 588 3023


 [email protected]
SC Magazine Cybersecurity 500 CSGEA Winners 2021 CIS benchmarking SEWP Now Certified IBM Security
Copyright 2024, New Net Technologies LLC. All rights reserved. 
NNT and Change Tracker are registered trademarks of New Net Technologies LLC.
All other product, company names and trademarks are the property of their respective owners.