Videos and Webinars

Videos

NNT Change Tracker™ Gen7 R2 - Online Demo

NNT Change Tracker Gen 7 R2 provides critical and fundamental cyber security prevention and detection. Change Tracker from NNT will ensure that your IT systems remain in a known, secure and compliant state at all times.

Mega-Scale Change Control

If you are serious about change control and automating key security controls, make sure your monitoring technology doesn't just scale, but that it gives you MEGA-SCALE. Watch the video to find out how.

PCI DSS Requirement: System hardening?

Req 2.2 mandates the need to verify that system configuration standards are consistent with industry-accepted hardening standards. NNT is a CIS-Certified Vendor and as such provides pre-built device hardening templates derived from the CIS Benchmarks to audit for any vulnerabilities present.

IBM QRadar® Integration – IBM Validated

Identifying emerging threats with the volume and velocity of today’s data is challenging for every organization. Let IBM Security and NNT simplify your security risk and exposure by using our QRadar® Integration App now officially validated by IBM.

NNT File Integrity Monitoring (FIM)

File Integrity Monitoring (FIM) is a foundational control that involves analyzing operating systems and application software files to determine if and when they have changed, how they changed and who made the change using a verification method between a current file state and a known baseline.

What's New - Gen7 R2?

Change Tracker Gen7 R2 solves the problems that have plagued organizations and industries for more than a decade – managing the overwhelming noise of change control and ensure the integrity of IT systems.

NNT Change Tracker™ Detects Unplanned Changes and Creates New Security Incidents in ServiceNow®

Change Tracker Gen7 R2 delivers ‘Closed-Loop’ SecureOps, reconciling actual changes made with your ServiceNow change requests.

NNT F.A.S.T. Cloud Threat Intelligence Integration

Leverage cloud-based Threat Intelligence to automatically validate file changes in real-time as they are detected using an authoritative file whitelist with NNT FAST™ (File Approved-Safe technology) Cloud.

Quarterly Update: NNT’s FAST Cloud Integration from NNT’s CEO & CTO

Change Tracker Gen7 provides the most accurate and effective File Integrity Monitoring solution, ensuring the integrity of your security IT systems and reporting any changes as they take place. But how do you differentiate between ‘good’, intended or planned changes, and ‘bad’, possibly malicious activity?

Webinars

Back 2 Basics: Adopting the 6 Basic CIS Controls

Just how effectively does your organization operate the first six CIS Controls?  If 90% of cyber attacks can be prevented by mastering the first 6 controls, why hasn’t everyone already embraced them?

Any Port In a Storm of Cyber-Security Remains a Problem: CIS Control 9

In the second sequence of webinars hosted by Tony Sager, Senior Vice President and Chief Evangelist of Center for Internet Security and Mark Kedgley, CTO of NNT, they discussed CIS Control 9: Limitation and Control of Network Ports, Protocols, and Services.

Cybersecurity Lesson from the Death Star: CIS Control #5 Explained in 30 Minutes

CIS Control 5 should be called the ‘Remember-what-happened-to-the-Death-Star’ security control because it’s all about hardening systems against cyber-attacks through secure configuration settings.

NNT Vulnerability Tracker™ - Re-Innovating the Vulnerability Scanning Market

Through a major collaboration with Greenbone Networks, NNT has advanced their security through system integrity strategy with distributed...

Webinar: Compliance...Implement and Operate the Right Security Controls

About this webinar: Most organizations today run a ‘Build-a-Bear’ approach to Cyber Security, with products and practices they piece together.

Webinar: Nightmare On Ransomware Street - Lock Your Digital Doors

Halloween has been and gone: the time where we share scary stories knowing they’re confined to story books and movie screens, but unfortunately, there are some IT horror stories that are all too real: the scariest being ransomware.

Webinar Recap: 5 Stages of Compliance Audit Grief

Any therapist will tell you that there are a range of emotions adopted when dealing with grief of any kind.  Nothing changes when dealing with the grief caused by having to manage a GRC Compliance Audit. But the good news is you can get through it!

Webinar: Modernizing Cyber Security with CIS

During this Webinar, you’ll hear directly from our panel of experts as we discussed the increased importance of applying the Center for Internet Security Controls as a modern cyber security approach. The session also highlighted the benefits of combining the CIS standards with ongoing, real-time compliance monitoring.

Webinar Recap: Achieving Compliance & the Latest Threats from Ransomware

NNT recently conducted a webinar series on the topic of achieving compliance and how to combat today’s devastating ransomware attacks.

Webinar: GRC 2016: Achieving Compliance & Protecting Against The Latest Threats from Ransomware

Abiding by compliance standards is a must and at NNT, we know it’s more than just a check-list exercise. By combing Continuous Compliance Tracking, Intelligent Change Control & Continuous System Integrity Monitoring, NNT has made achieving, proving & remaining compliant a straightforward and closed-loop process.

Contact Us

USA Offices

New Net Technologies LLC
Suite #10115, 9128 Strada Place
Naples, Florida, 34108

New Net Technologies LLC
1175 Peachtree St NE
Atlanta, Georgia, 30361.

Tel: (844) 898-8358
[email protected]

 

UK Office

New Net Technologies Ltd
Rivers Lodge, West Common
Harpenden, Hertfordshire
AL5 2JD

Tel: 020 3917 4995
 [email protected]

SC Magazine Cybersecurity 500 Infosec Security Winners 2018 CIS benchmarking SEWP Sans Institute Now Certified IBM Security
Copyright 2020, New Net Technologies LLC. All rights reserved. 
NNT and Change Tracker are registered trademarks of New Net Technologies LLC.
All other product, company names and trademarks are the property of their respective owners.