Videos and Webinars

Videos

IBM QRadar® Integration – IBM Validated

Identifying emerging threats with the volume and velocity of today’s data is challenging for every organization. Let IBM Security and NNT simplify your security risk and exposure by using our QRadar® Integration App now officially validated by IBM.

NNT File Integrity Monitoring (FIM)

File Integrity Monitoring (FIM) is a foundational control that involves analyzing operating systems and application software files to determine if and when they have changed, how they changed and who made the change using a verification method between a current file state and a known baseline.

What's New - Gen7 R2?

Change Tracker Gen7 R2 solves the problems that have plagued organizations and industries for more than a decade – managing the overwhelming noise of change control and ensure the integrity of IT systems.

NNT Change Tracker™ Detects Unplanned Changes and Creates New Security Incidents in ServiceNow®

Change Tracker Gen7 R2 delivers ‘Closed-Loop’ SecureOps, reconciling actual changes made with your ServiceNow change requests.

NNT F.A.S.T. Cloud Threat Intelligence Integration

Leverage cloud-based Threat Intelligence to automatically validate file changes in real-time as they are detected using an authoritative file whitelist with NNT FAST™ (File Approved-Safe technology) Cloud.

Quarterly Update: NNT’s FAST Cloud Integration from NNT’s CEO & CTO

Change Tracker Gen7 provides the most accurate and effective File Integrity Monitoring solution, ensuring the integrity of your security IT systems and reporting any changes as they take place. But how do you differentiate between ‘good’, intended or planned changes, and ‘bad’, possibly malicious activity?

Easily Compare & Contrast Compliance Reports with Gen7

In this Educational Moment we discuss Comparing and Contrasting Compliance Reports to provide ongoing real time compliance intelligence. Learn how to leverage the information provided for enhanced security and compliance management as well as comparing results from different devices to ascertain any configuration or compliance drift.

Automatically Fix Server Security Weaknesses with NNT

This Educational Moment will be on the topic of Configuration Policy Remediation. With NNT's latest Threat Mitigation Kits, organizations are equipped with the necessary configuration & vulnerability checklists, which NNT further automates to automatically fix any weaknesses identified within your systems.

Watch the pre-recorded Change Tracker 7 demo

See the next generation of breach prevention technology - Change Tracker Gen 7™

Webinars

Any Port In a Storm of Cyber-Security Remains a Problem: CIS Control 9

In the second sequence of webinars hosted by Tony Sager, Senior Vice President and Chief Evangelist of Center for Internet Security and Mark Kedgley, CTO of NNT, they discussed CIS Control 9: Limitation and Control of Network Ports, Protocols, and Services.

Cybersecurity Lesson from the Death Star: CIS Control #5 Explained in 30 Minutes

CIS Control 5 should be called the ‘Remember-what-happened-to-the-Death-Star’ security control because it’s all about hardening systems against cyber-attacks through secure configuration settings.

NNT Vulnerability Tracker™ - Re-Innovating the Vulnerability Scanning Market

Through a major collaboration with Greenbone Networks, NNT has advanced their security through system integrity strategy with distributed...

Webinar: Compliance...Implement and Operate the Right Security Controls

About this webinar: Most organizations today run a ‘Build-a-Bear’ approach to Cyber Security, with products and practices they piece together.

Webinar: Nightmare On Ransomware Street - Lock Your Digital Doors

Halloween has been and gone: the time where we share scary stories knowing they’re confined to story books and movie screens, but unfortunately, there are some IT horror stories that are all too real: the scariest being ransomware.

Webinar Recap: 5 Stages of Compliance Audit Grief

Any therapist will tell you that there are a range of emotions adopted when dealing with grief of any kind.  Nothing changes when dealing with the grief caused by having to manage a GRC Compliance Audit. But the good news is you can get through it!

Webinar: Modernizing Cyber Security with CIS

During this Webinar, you’ll hear directly from our panel of experts as we discussed the increased importance of applying the Center for Internet Security Controls as a modern cyber security approach. The session also highlighted the benefits of combining the CIS standards with ongoing, real-time compliance monitoring.

Webinar Recap: Achieving Compliance & the Latest Threats from Ransomware

NNT recently conducted a webinar series on the topic of achieving compliance and how to combat today’s devastating ransomware attacks.

Webinar: GRC 2016: Achieving Compliance & Protecting Against The Latest Threats from Ransomware

Abiding by compliance standards is a must and at NNT, we know it’s more than just a check-list exercise. By combing Continuous Compliance Tracking, Intelligent Change Control & Continuous System Integrity Monitoring, NNT has made achieving, proving & remaining compliant a straightforward and closed-loop process.

Webinar: 2016 Cyber Security Threat Predictions Webinar & Whitepaper Synopsis

NNT recently hosted a webinar and published a series of educational resources on the predicted 2016 Cyber Security Threat Landscape. To that end, NNT would like to provide you with a brief overview of our findings.

USA Offices
New Net Technologies LLC
Naples
Suite #10115, 9128 Strada Place
Naples, Florida, 34108
Atlanta
1175 Peachtree St NE
Atlanta, Georgia, 30361.
Portland
4145 SW Watson, Suite 350
Beaverton, Oregon, 97005.

Tel: (844) 898-8358
email [email protected]
UK Office
New Net Technologies Ltd
Rivers Lodge, West Common
Harpenden, Hertfordshire
AL5 2JD

Tel: 01582 287310
email [email protected]
CIS benchmarking SEWP Cybersecurity 500Sans Institute Now Certified IBM Security
Copyright 2019, New Net Technologies LLC. All rights reserved. 
NNT and Change Tracker are registered trademarks of New Net Technologies LLC.
All other product, company names and trademarks are the property of their respective owners.