NNT

  |  By New Net Technologies
Reducing your attack surface requires a robust vulnerability management solution to help combat today’s most persistent and devastating cyber threats. Whether you’re a CIO, IT manager or an engineer, you probably know that Vulnerability Management is a critical element of any information security strategy.
  |  By New Net Technologies
Out of all the cat videos you could watch, how do you decide which one to view first? The beauty of social media is its real-time, democratic operation. Everyone gets to vote and the content with the most shares is the People’s Choice, rightfully ‘The Best’. But we now know this Facebook-era notion of ‘most popular equals best’ is open to abuse. It turns out that a significant proportion of social media interaction is in fact, manufactured.
  |  By New Net Technologies
As of late, cybersecurity has come to the forefront of the I.T. Industry, and is one of the key functions of any organization. This article will discuss 5 key processes and potential controls you should implement in order to maximize the effectiveness of your cybersecurity efforts, leading to an all-around secure environment. 1. Educating Employees
  |  By New Net Technologies
If you think you’re having a bad day, you should see what happened to a group of Greek merchants crossing the Black Sea, 2,400 years ago. Providing a stark perspective on the vastness of history, their ship has just been discovered under 2km of water.
  |  By Dirk Schrader
Specialty networking solutions provider, Belden, owners of specialist cyber security vendor Tripwire, recently disclosed a data breach resulting in the theft of employee and business information. Belden said in a press release that the security incident took place after hackers gained access to a “limited number” of its file servers. The intrusion was spotted after IT personnel detected unusual activity on some of its servers.
  |  By Mark Kedgley
Have you heard of the CIS Controls? Even though they’re not part of any specified GRC (Governance, Risk Management, Compliance) mandate, they could actually be used as the foundation for them all. A light, straightforward hors d’oeuvre before you take on the mega-calorific, piled-high, full-fat platters of the multi-course feast that is a full Compliance standard.
  |  By Mark Kedgley
Out of all the cat videos you could watch, how do you decide which one to view first? The beauty of social media is its real-time, democratic operation. Everyone gets to vote and the content with the most shares is the People’s Choice, rightfully ‘The Best’. But we now know this Facebook-era notion of ‘most popular equals best’ is open to abuse. It turns out that a significant proportion of social media interaction is in fact, manufactured.
  |  By Spartak Goskolli
As of late, cybersecurity has come to the forefront of the I.T. Industry, and is one of the key functions of any organization. This article will discuss 5 key processes and potential controls you should implement in order to maximize the effectiveness of your cybersecurity efforts, leading to an all-around secure environment.
  |  By Mark Kedgley
Change Management is blind. It is a key IT Service Management process and, undeniably, it's beneficial to plan and schedule changes. But Change Management’s ‘dirty little secret’ is that, despite the comfort blanket of documentation and approvals, you never know what’s really going on. You have no idea what was actually changed, either during the Change Window or at any other time.
  |  By Mark Kedgley
If you think you’re having a bad day, you should see what happened to a group of Greek merchants crossing the Black Sea, 2,400 years ago. Providing a stark perspective on the vastness of history, their ship has just been discovered under 2km of water.
  |  By NNT
When it comes to cybersecurity, early detection and containment is critical in terms of limiting the depth of any incursion and the opportunity for data theft or disruption.
  |  By NNT
The need for a standardized baseline configuration or Gold build standard is a keystone of all compliance frameworks.
  |  By NNT
Protecting and securing critical electronic health data is more important than ever, as the FBI and other federal agencies have been sounding the alarm on 'imminent' cyber threats targeting healthcare systems. Compounding this, NNT recently discovered sensitive medical data related to 13 million medical exams on hundreds of computers connected to the internet belonging to over 3.5 million patients.
  |  By NNT
Audit, configure and secure your entire network with SecureOps Watch this brief on-demand demo to see how you can get started in securing your IT environment with industry-approved foundational controls, intelligent change control and automation.
  |  By NNT
Did you know that 80% of companies have suffered a cloud-related breach caused by misconfiguration according to research by IDC? Watch our latest webinar on-demand to learn about the most common configuration mistakes which have led to major data breaches; and why continuous monitoring via Security Configuration Management (SCM) tools are critical to help prevent and quickly identify a breach. Watch now to learn.
  |  By NNT
NNT Change Tracker Gen 7 R2 provides critical and fundamental cyber security prevention and detection. It does this by leveraging the required security best practice disciplines of system configuration and integrity assurance combined with the most comprehensive and intelligent change control solution available. Change Tracker from NNT will ensure that your IT systems remain in a known, secure and compliant state at all times.
  |  By NNT
Comprehensive and easy-to-use Security Information and Event Management (SIEM) solution for any compliance mandate. Log Analysis or SIEM, is a key weapon in the fight against any cyber-attack. By gathering logs from all devices including network devices, Unix and Windows servers, applications and databases, and analyzing them for unusual or suspicious activity, the method and source of any attack can be identified, enabling preventative measures to be continually improved.
  |  By NNT
Vulnerability scanning is an essential foundational security control and vital for every organization. Cyber attacks such as WannaCry and Petya, left many asking the question: How can we stay safely ahead of the next threat? Using NNT Vulnerability Tracker™ will ensure that any known vulnerabilities can be identified within your IT infrastructure before they are exploited.
  |  By NNT
Being the victim of a cyber-attack can be scary, expensive and potentially business-crippling. Gold Build Standard? Corporate Build / Hardened Build? Controlled Image? Baseline Configuration? You’ll find the need for a Gold Build Standard in all compliance frameworks
  |  By NNT
Given the latest WannaCry Ransomware epidemic, which infected more than 230,000 users in over 150 countries, it's vitally important that organizations fully understand the risks associated with using out-of-date systems and software.
  |  By NNT
Without our help, controlling changes can be one of the biggest challenges facing multi-functional IT Teams. The size of task, process, and coordination of effort often means that changes continue to occur outside of any planned change approvals and the IT team is unable to prevent this from continuing. The solution? NNT's Managed Change Control Program.
  |  By NNT
In early 2017, NNT assembled a panel of experts to discuss the increased importance of applying the Center for Internet Security Controls as part of a modern approach to cyber security. The session also highlighted the benefits of combining the CIS Controls with ongoing, real-time compliance monitoring.
  |  By NNT
Some of us will need therapy during and after an audit - that's not unusual - but can a Compliance Audit really bring about the same feelings as other forms of grief? Furthermore, if this really is the case then, by extension, could we coach ourselves through the compliance audit process to become more effective at dealing with future audit situations?
  |  By NNT
Right now, Ransomware is the Great White Shark of cyber-attacks, the most feared malware of all, and both corporate and home users are running scared. And rightly so - Anyone who has had experience with Ransomware, will attest to the agony and disruption. But instead of worrying about an attack, what action can be taken to safely venture back into the water and not necessarily "with a bigger Boat"?
  |  By NNT
By combining Threat Intelligence with FIM, a knowledgebase of 'known safe' files can be leveraged to improve the accuracy and speed of change review.
  |  By NNT
Our medical, health and personal information should remain private. While the principle of Doctor-Patient confidentiality has always been regarded as sacrosanct, the electronic age has inevitably led to greater ease of access to all information, including confidential patient details a.k.a. electronic protected health information.
  |  By NNT
Vulnerability management is a key security best-practice that serves to prevent the complete spectrum of cyber-attacks. But how do you strike the right balance between maintaining the security of an IT environment that never stands still, and maximizing system performance, uptime and service delivery?

New Net Technologies (NNT) is the leading provider of Security through System Integrity focused on helping organizations reduce their security risk, increase service availability and achieving continuous compliance.

NNT delivers Security through System Integrity by introducing the essential Critical Security Controls, leveraging intelligent change control technology to track system integrity, and using dynamic policy and baseline management to ensure systems remain secure, available and compliant at all times.

Our Trusted Security Portfolio:

  • Change Tracker™ Gen7 R2 Combine industry leading Device Hardening, File Integrity Monitoring, Change & Configuration Management, Security & Compliance Management into one easy to use solution!
  • NNT FAST™ (File Approved-Safe technology) Cloud Automatically evaluate file changes in real-time with NNT FAST™ (File Approved-Safe Technology) Threat Intelligence.
  • NNT Log Tracker Enterprise™ Comprehensive and easy to use security information & event log management with intelligent & self-learning correlation technology to highlight potentially harmful activity in seconds.

Security through System Integrity: Made possible only with NNT.