Identifying Known Vulnerabilities Within Software and Configuration Settings
Vulnerability scanning is an essential foundational security control and vital for every organization. Cyber attacks such as WannaCry and Petya, left many asking the question: How they can we stay safely ahead of the next threat?
Using NNT Vulnerability Tracker™ will ensure that any known vulnerabilities can be identified within your IT infrastructure before they are exploited.
99% of the vulnerabilities exploited by the end of 2020 will continue to be ones known by security and IT professionals at the time of the incident - Gartner
NNT’s Vulnerability Tracker™ identifies known vulnerabilities within software and configuration settings before they can be exploited by a cyber-attack. Vulnerability Tracker continuously tests and assesses your IT network and any device connected to it against thousands of Network Vulnerability Tests (NVTs).
New vulnerabilities are added daily through various content providers and industry trusted resources which include CVE and Bugtraq alerts, aggregate compliance rulesets, controls for scan agents and embedded Nmap NSE test routines.
Over 66,000 automated NNT-VT vulnerability tests, continuously expanded in real-time.
Over 111,400 CVEs updated every minute
via live cloud-feed.
Blended credentialed and non-credentialed tests to give flexibility to your scanning program.
Fully distributed architecture provides centrally controlled, scanning mesh even for the largest global enterprise networks.
Directly addresses CIS Critical Security Controls for Inventory, Secure Configurations, Control of Ports and Services and Continuous Vulnerability Assessments.
Hyper-fast scanning technology means you can assess over 50,000 endpoints per 24 hours.
Continuously updated armoury of tests to identify vulnerabilities, with full remediation guidance provided to eliminate the threat
Directly addresses CIS Critical Security Controls for Inventory, Secure Configurations, Control of Ports and Services and of course, Continuous Vulnerability Assessments
Tired of dealing with false positives? NNT Vulnerability Tracker™ delivers class-leading accuracy, guaranteeing the lowest false positive per scan ratio in the vulnerability scanner market
Massive scalability with options for a fully distributed scanning network to cover 100,000s of endpoints.
The top issue in vulnerability management is that organizations aren’t prioritizing their patching and compensating controls to align to vulnerabilities targeted by threat actors - Gartner
Combine industry leading Device Hardening, File Integrity Monitoring, Change Control, Configuration Management & Compliance Management into one easy to use solution that can scale to the most demanding environments!
Automatically evaluate and verify the authenticity of file changes in real-time with NNT FAST™ (File Approved-Safe Technology) Integrity Reference.
Comprehensive and easy to use security information & event log management with intelligent & self-learning correlation technology to highlight potentially harmful activity in seconds.
Continuously scan and identify vulnerabilities with unparalleled accuracy and efficiency, protecting your IT assets on premises, in the cloud and mobile endpoints.
Without integrity you don’t have security and without security you don’t have trusted computing. – Ron Ross, NIST
Access a broad range of CIS Benchmark reports to audit your enterprise and continuously monitor for any drift from your hardened state.
Download Hardened Services checklists, derived by NNT in conjunction with Microsoft, to manually audit your servers for compliance.
Gain access to audit policies derived from the Center for Internet Security to generate audit logs on all relevant security levels.