Vulnerability Tracker™
Identifying Known Vulnerabilities Within Software and Configuration Settings

Vulnerability scanning is an essential foundational security control and vital for every organization. Cyber attacks such as WannaCry and Petya, left many asking the question: How they can we stay safely ahead of the next threat?

Using NNT Vulnerability Tracker™ will ensure that any known vulnerabilities can be identified within your IT infrastructure before they are exploited.

vulnerability tracker logo

 

99% of the vulnerabilities exploited by the end of 2020 will continue to be ones known by security and IT professionals at the time of the incident - Gartner

 

NNT’s Vulnerability Tracker™ identifies known vulnerabilities within software and configuration settings before they can be exploited by a cyber-attack. Vulnerability Tracker continuously tests and assesses your IT network and any device connected to it against thousands of Network Vulnerability Tests (NVTs).

New vulnerabilities are added daily through various content providers and industry trusted resources which include CVE and Bugtraq alerts, aggregate compliance rulesets, controls for scan agents and embedded Nmap NSE test routines.

Countless Tests

Countless Tests
Over 66,000 automated NNT-VT vulnerability tests, continuously expanded in real-time.

Real-Time Intelligence

Real-Time Intelligence
Over 111,400 CVEs updated every minute
via live cloud-feed.

Automates CIS Controls

Versatile
Blended credentialed and non-credentialed tests to give flexibility to your scanning program.

Automates CIS Controls

Distributed Architecture
Fully distributed architecture provides centrally controlled, scanning mesh even for the largest global enterprise networks.

Automates CIS Controls

CIS Control
Directly addresses CIS Controls for Inventory, Secure Configurations, Control of Ports and Services and Continuous Vulnerability Assessments.

Automates CIS Controls

Rapid Scanning
Hyper-fast scanning technology means you can assess over 50,000 endpoints per 24 hours.

Key Highlights
Wannacry screen

Continuously updated armoury of tests to identify vulnerabilities, with full remediation guidance provided to eliminate the threat

CIS Controls

Directly addresses CIS Controls for Inventory, Secure Configurations, Control of Ports and Services and of course, Continuous Vulnerability Assessments

tracker icon

Tired of dealing with false positives? NNT Vulnerability Tracker™ delivers class-leading accuracy, guaranteeing the lowest false positive per scan ratio in the vulnerability scanner market

icon

Massive scalability with options for a fully distributed scanning network to cover 100,000s of endpoints.

 

The top issue in vulnerability management is that organizations aren’t prioritizing their patching and compensating controls to align to vulnerabilities targeted by threat actors - Gartner

 

National Vulnerability Database

 
 
 

Additional Resources

Vulnerability Tracker™
Solution Brief.

icon

Device Hardening, Vulnerability Remediation & Mitigation for Security and Compliance.

icon

Vulnerability Scoring and Improvement-Based Vulnerability Management.

icon

 
NNT Suite of Products

change tracker gen7r2 logo

Combine industry leading Device Hardening, File Integrity Monitoring, Change Control, Configuration Management & Compliance Management into one easy to use solution that can scale to the most demanding environments!

fastcloud logo

Automatically evaluate and verify the authenticity of file changes in real-time with NNT FAST™ (File Approved-Safe Technology) Integrity Assurance.

log tracker logo logo

Comprehensive and easy to use security information & event log management with intelligent & self-learning correlation technology to highlight potentially harmful activity in seconds.

vulnerability tracker logo

Continuously scan and identify vulnerabilities with unparalleled accuracy and efficiency, protecting your IT assets on premises, in the cloud and mobile endpoints.

 

Without integrity you don’t have security and without security you don’t have trusted computing. – Ron Ross, NIST

 
Latest Resources

CIS

Access CIS Resources

Access a broad range of CIS Benchmark reports to audit your enterprise and continuously monitor for any drift from your hardened state.

Download Reports

Server Hardening

Server Hardening Resources

Download Hardened Services checklists, derived by NNT in conjunction with Microsoft, to manually audit your servers for compliance.

Download Checklists

Audit Policy

Audit Policy Template Resources

Gain access to audit policies derived from the Center for Internet Security to generate audit logs on all relevant security levels.

Download Audit Policies

USA Offices
New Net Technologies LLC
Naples
Suite #10115, 9128 Strada Place
Naples, Florida, 34108
Atlanta
1175 Peachtree St NE
Atlanta, Georgia, 30361.
Portland
4145 SW Watson, Suite 350
Beaverton, Oregon, 97005.

Tel: (844) 898-8358
email [email protected]
UK Office
New Net Technologies Ltd
Rivers Lodge, West Common
Harpenden, Hertfordshire
AL5 2JD

Tel: 01582 287310
email [email protected]
CIS benchmarking SEWP Cybersecurity 500Sans Institute Now Certified
Copyright 2019, New Net Technologies LLC. All rights reserved. 
NNT and Change Tracker are registered trademarks of New Net Technologies LLC.
All other product, company names and trademarks are the property of their respective owners.