IT Security and Compliance Videos

Watch webinars and video guides from industry experts New Net Technologies, on a range of IT security and compliance topics.

Cybersecurity Threats in Healthcare Video

NNT's Global Vice President, Dirk Schrader, recently discovered more than 2 petabytes of unprotected medical data found on picture archiving and communication systems (PACS) servers, resulting in 13 million medical examinations relating to around 3.5 million U.S. patients exposed, unprotected, and available to anyone on the internet.

NNT Change Tracker™ Gen7 R2 - Online Demo

NNT Change Tracker Gen 7 R2 provides critical and fundamental cyber security prevention and detection. Change Tracker from NNT will ensure that your IT systems remain in a known, secure and compliant state at all times.

NNT Vulnerability Tracker - Online Demo

Vulnerability scanning is an essential foundational security control and vital for every organization. Cyber attacks such as WannaCry and Petya, left many asking the question: How can we stay safely ahead of the next threat?

NNT Log Tracker Enterprise™ - Online Demo

Comprehensive and easy-to-use Security Information and Event Management (SIEM) solution for any compliance mandate

Baseline Configuration Standard Video

So how do you prevent a cyber-attack? Start with making security a priority for all IT operations, and the first place to start is by making systems as ‘hacker proof’ as possible:

SecureOps Video

SecureOps™ combines established best practices for security and IT service management to deliver a holistic and comprehensive solution that identifies and highlights unknown, unwanted and potentially malicious events in real-time…without all the NOISE and headaches of endless alerts.

Vulnerability scanning is an essential foundational security control and vital for every organization. Cyber-attacks such as WannaCry and Petya, left many asking the question: How can we stay safely ahead of the next threat?

secureops

Change Control is not the same as Change Management. While Change Management focuses on the justification and planning of changes, Change Control majors on the verification of actual changes made.

If you are serious about change control and automating key security controls, make sure your monitoring technology doesn't just scale, but that it gives you MEGA-SCALE. Watch the video to find out how.

Req 2.2 mandates the need to verify that system configuration standards are consistent with industry-accepted hardening standards. NNT is a CIS-Certified Vendor and as such provides pre-built device hardening templates derived from the CIS Benchmarks to audit for any vulnerabilities present.

Contact Us

Corporate Headquarters

Netwrix
6160 Warren Parkway, Suite 100
Frisco, Texas, 75034

Phone 1: 1-949-407-5125

Phone 2: 888-638-9749 (toll-free)


[email protected]
 

United Kingdom

Netwrix
5 New Street Square
London EC4A 3TW

Phone: +44 (0) 203 588 3023


 [email protected]
SC Magazine Cybersecurity 500 CSGEA Winners 2021 CIS benchmarking SEWP Now Certified IBM Security
Copyright 2024, New Net Technologies LLC. All rights reserved. 
NNT and Change Tracker are registered trademarks of New Net Technologies LLC.
All other product, company names and trademarks are the property of their respective owners.