IT Security and Compliance Videos
Watch webinars and video guides from industry experts New Net Technologies, on a range of IT security and compliance topics.
Change Tracker Gen7 provides the most accurate and effective File Integrity Monitoring solution, ensuring the integrity of your security IT systems and reporting any changes as they take place. But how do you differentiate between ‘good’, intended or planned changes, and ‘bad’, possibly malicious activity?
Leverage cloud-based Threat Intelligence to automatically validate file changes as they are detected using an authoritative file whitelist. And now you can use the NNT FAST™ (File Approved-Safe technology) Cloud to do just this, in real-time.
Any therapist will tell you that there are a range of emotions adopted when dealing with grief of any kind. Nothing changes when dealing with the grief caused by having to manage a GRC Compliance Audit. But the good news is you can get through it!
During this Webinar, you’ll hear directly from our panel of experts as we discussed the increased importance of applying the Center for Internet Security Controls as a modern cyber security approach. The session also highlighted the benefits of combining the CIS standards with ongoing, real-time compliance monitoring.
Abiding by compliance standards is a must and at NNT, we know it’s more than just a check-list exercise. By combing Continuous Compliance Tracking, Intelligent Change Control & Continuous System Integrity Monitoring, NNT has made achieving, proving & remaining compliant a straightforward and closed-loop process.
It should come as no surprise that cyber threats are continuing to evolve both in sophistication and the level of threat they represent. Despite these continued threats, there’s an equally improving maturity within the cyber security community & growing evidence that a simple, pragmatic and best practice approach to security is more than capable of fending off the threat.
See the next generation of breach prevention technology - Change Tracker Gen 7™
Change Tracker Gen7 represents an intelligent approach to system integrity monitoring through the use of our Closed-Loop Intelligent Change Control (CLICC). NNT has significantly reduced the previously overwhelming workload associated with forensic-level change control to allow the organization to focus on what matters most- unexpected changes.
Join NNT’s Mark Kerrison and Mark Kedgley who are keen to acquaint you with this landmark release!
Join NNT in this educational session, as we partner directly with the Center for Internet Security (CIS) and Blake Frantz to address the topic of 'Why Security Automation is a critical asset to have'.
Your organization is under attack right now. The range of techniques and battlefronts is bigger than ever
- New malware strains exceed 25 million, and increasing by over 20%, each year, phishing attacks also increasing – AV becomes more impotent each day
- Hacktivist groups and corporate blackmail cyber-attacks are increasing
- The Insider Threat - What defenses do you have against a trusted employee gone rogue?
- And then we have the Advanced Persistent Threat or APT
The NNT view is that there is an art to delivering effective security. File Integrity Monitoring, combined with best practice processes in device hardening and change management, are the only way to maintain truly secure systems.
Every gap in defenses leaves the enterprise with a Cyber Security Achilles Heel, a weak spot or vulnerability that an attacker can exploit. We call this the Enterprise Attack Surface.
How prone is your organization to an attack right now? How do you assess or measure this?
This overview shows how Change Tracker Version 6.5 uses real-time file integrity monitoring technology to discover vulnerabilities using CIS Benchmark reports, for servers, database systems and network devices, thereafter providing real-time FIM to detect any breach or malware.
In the “Six steps to get compliant – and stay compliant” video overview we focused on configuration hardening, file-integrity monitoring and endpoint security. But the PCI DSS has many more layers of security measures. One of the more challenging elements is Requirement 10. Event Logs contain detail-rich information that can help pre-empt security incidents. In the event that the unthinkable happens and you are subject to a breach, an event log history can be used to forensically analyze the origin and method of attack, helping to improve security measures for the future.
NNT Log Tracker provides an Enterprise-Class SIEM solution to all PCI DSS requirements for logging but this video shows how easy and accessible the technology is and how it can be used in any size of organization.
The PCI Data Security Standard calls for a range of security measures, but beyond the use of firewalling, intrusion protection systems and anti-virus software, the understanding of the requirements and responsibilities of the merchant are often poorly understood.
This guide simplifies the balance of PCI DSS measures to just four technology areas
- File Integrity monitoring
- Event Log centralization
- Security Vulnerability scanning for device hardening
- Change Management process
Understanding and implementing measures to address these four areas will make any QSA happy and get you compliant – and keep you compliant – in no time at all.
Join NNT for an insight to the newly announced PCI DSS Version 3.0 and see how PCI security best practices can be operated in just ten minutes a day in this new, 30 minute webinar.