Videos and Webinars
NNT Change Tracker Gen 7 R2 provides critical and fundamental cyber security prevention and detection. Change Tracker from NNT will ensure that your IT systems remain in a known, secure and compliant state at all times.
If you are serious about change control and automating key security controls, make sure your monitoring technology doesn't just scale, but that it gives you MEGA-SCALE. Watch the video to find out how.
Req 2.2 mandates the need to verify that system configuration standards are consistent with industry-accepted hardening standards. NNT is a CIS-Certified Vendor and as such provides pre-built device hardening templates derived from the CIS Benchmarks to audit for any vulnerabilities present.
Identifying emerging threats with the volume and velocity of today’s data is challenging for every organization. Let IBM Security and NNT simplify your security risk and exposure by using our QRadar® Integration App now officially validated by IBM.
File Integrity Monitoring (FIM) is a foundational control that involves analyzing operating systems and application software files to determine if and when they have changed, how they changed and who made the change using a verification method between a current file state and a known baseline.
Change Tracker Gen7 R2 solves the problems that have plagued organizations and industries for more than a decade – managing the overwhelming noise of change control and ensure the integrity of IT systems.
Change Tracker Gen7 R2 delivers ‘Closed-Loop’ SecureOps, reconciling actual changes made with your ServiceNow change requests.
Leverage cloud-based Threat Intelligence to automatically validate file changes in real-time as they are detected using an authoritative file whitelist with NNT FAST™ (File Approved-Safe technology) Cloud.
Overview and key highlights
Change Tracker Gen7 provides the most accurate and effective File Integrity Monitoring solution, ensuring the integrity of your security IT systems and reporting any changes as they take place. But how do you differentiate between ‘good’, intended or planned changes, and ‘bad’, possibly malicious activity?
Protecting and securing critical electronic health data is more important than ever, as the FBI and other federal agencies have been sounding the alarm on 'imminent' cyber threats targeting healthcare systems.
Data breaches caused by cloud misconfigurations have been dominating news headlines in recent years with 80% of companies in the United States experiencing a cloud-related breach according to research by IDC.
Just how effectively does your organization operate the first six CIS Controls? If 90% of cyber attacks can be prevented by mastering the first 6 controls, why hasn’t everyone already embraced them?
In the second sequence of webinars hosted by Tony Sager, Senior Vice President and Chief Evangelist of Center for Internet Security and Mark Kedgley, CTO of NNT, they discussed CIS Control 9: Limitation and Control of Network Ports, Protocols, and Services.
CIS Control 5 should be called the ‘Remember-what-happened-to-the-Death-Star’ security control because it’s all about hardening systems against cyber-attacks through secure configuration settings.
Through a major collaboration with Greenbone Networks, NNT has advanced their security through system integrity strategy with distributed...
About this webinar: Most organizations today run a ‘Build-a-Bear’ approach to Cyber Security, with products and practices they piece together.
Halloween has been and gone: the time where we share scary stories knowing they’re confined to story books and movie screens, but unfortunately, there are some IT horror stories that are all too real: the scariest being ransomware.
Any therapist will tell you that there are a range of emotions adopted when dealing with grief of any kind. Nothing changes when dealing with the grief caused by having to manage a GRC Compliance Audit. But the good news is you can get through it!
During this Webinar, you’ll hear directly from our panel of experts as we discussed the increased importance of applying the Center for Internet Security Controls as a modern cyber security approach. The session also highlighted the benefits of combining the CIS standards with ongoing, real-time compliance monitoring.