Vulnerability Tracker™
Identifying Known Vulnerabilities Within Software and Configuration Settings

Vulnerability scanning is an essential foundational security control and vital for every organization. Cyber attacks such as WannaCry and Petya, left many asking the question: How they can we stay safely ahead of the next threat?

Using NNT Vulnerability Tracker™ will ensure that any known vulnerabilities can be identified within your IT infrastructure before they are exploited.

 

99% of the vulnerabilities exploited by the end of 2020 will continue to be ones known by security and IT professionals at the time of the incident - Gartner

 

NNT’s Vulnerability Tracker™ identifies known vulnerabilities within software and configuration settings before they can be exploited by a cyber-attack. Vulnerability Tracker continuously tests and assesses your IT network and any device connected to it against thousands of Network Vulnerability Tests (NVTs).

New vulnerabilities are added daily through various content providers and industry trusted resources which include CVE and Bugtraq alerts, aggregate compliance rulesets, controls for scan agents and embedded Nmap NSE test routines.

Automates Critical Security Controls

Countless Tests

Over 66,000 automated NNT-VT vulnerability tests, continuously expanded in real-time.

Automates Critical Security Controls

Real-Time Intelligence

Over 111,400 CVEs updated every minute
via live cloud-feed.

Automates Critical Security Controls

Versatile

Blended credentialed and non-credentialed tests to give flexibility to your scanning program.

Automates Critical Security Controls

Distributed Architecture

Fully distributed architecture provides centrally controlled, scanning mesh even for the largest global enterprise networks.

Automates Critical Security Controls

CIS Control

Directly addresses CIS Critical Security Controls for Inventory, Secure Configurations, Control of Ports and Services and Continuous Vulnerability Assessments.

Automates Critical Security Controls

Rapid Scanning

Hyper-fast scanning technology means you can assess over 50,000 endpoints per 24 hours.

NNT Vulnerability Tracker Overview
 
 
Key Highlights
Wannacry screen

Continuously updated armoury of tests to identify vulnerabilities, with full remediation guidance provided to eliminate the threat

CIS Controls

Directly addresses CIS Critical Security Controls for Inventory, Secure Configurations, Control of Ports and Services and of course, Continuous Vulnerability Assessments

tracker icon

Tired of dealing with false positives? NNT Vulnerability Tracker™ delivers class-leading accuracy, guaranteeing the lowest false positive per scan ratio in the vulnerability scanner market

icon

Massive scalability with options for a fully distributed scanning network to cover 100,000s of endpoints.

 

The top issue in vulnerability management is that organizations aren’t prioritizing their patching and compensating controls to align to vulnerabilities targeted by threat actors - Gartner

 

National Vulnerability Database

 
 
 

Additional Resources

Device Hardening, Vulnerability Remediation & Mitigation for Security and Compliance.

icon

Vulnerability Scoring and Improvement-Based Vulnerability Management.

icon

 
NNT Suite of Products
 

change tracker gen7r2 logo

Combine industry leading Device Hardening, File Integrity Monitoring, Change Control, Configuration Management & Compliance Management into one easy to use solution that can scale to the most demanding environments!

 
 
R2 Dashboard

fastcloud logo

Automatically evaluate and verify the authenticity of file changes in real-time with NNT FAST™ (File Approved-Safe Technology) Integrity Reference.

 

log tracker logo logo

Comprehensive and easy to use security information & event log management with intelligent & self-learning correlation technology to highlight potentially harmful activity in seconds.

 
 

vulnerability tracker logo

Continuously scan and identify vulnerabilities with unparalleled accuracy and efficiency, protecting your IT assets on premises, in the cloud and mobile endpoints.

 
 

Without integrity you don’t have security and without security you don’t have trusted computing. – Ron Ross, NIST

 
Latest Resources

CIS

Access CIS Resources

Access a broad range of CIS Benchmark reports to audit your enterprise and continuously monitor for any drift from your hardened state.

Download Reports

Server Hardening

Server Hardening Resources

Download Hardened Services checklists, derived by NNT in conjunction with Microsoft, to manually audit your servers for compliance.

Download Checklists

Audit Policy

Audit Policy Template Resources

Gain access to audit policies derived from the Center for Internet Security to generate audit logs on all relevant security levels.

Download Audit Policies

USA Offices
New Net Technologies LLC
Naples
Suite #10115, 9128 Strada Place
Naples, Florida, 34108
Atlanta
1175 Peachtree St NE
Atlanta, Georgia, 30361.
Portland
4145 SW Watson, Suite 350
Beaverton, Oregon, 97005.

Tel: (844) 898-8358
email [email protected]
UK Office
New Net Technologies Ltd
Rivers Lodge, West Common
Harpenden, Hertfordshire
AL5 2JD

Tel: 01582 287310
email [email protected]
Connect
Google+ Linkedin Twitter - Change Tracker Facebook rss feed YouTube
CIS benchmarking SEWP Cybersecurity 500Sans Institute Now Certified
Copyright 2019, New Net Technologies LLC. All rights reserved. 
NNT and Change Tracker are registered trademarks of New Net Technologies LLC.
All other product, company names and trademarks are the property of their respective owners.