IT Security and Compliance Videos
Watch webinars and video guides from industry experts New Net Technologies, on a range of IT security and compliance topics.
- Category: SecureOps™
NNT's Global Vice President, Dirk Schrader, recently discovered more than 2 petabytes of unprotected medical data found on picture archiving and communication systems (PACS) servers, resulting in 13 million medical examinations relating to around 3.5 million U.S. patients exposed, unprotected, and available to anyone on the internet.
- Category: Change Tracker™ Enterprise Gen7 R2
NNT Change Tracker Gen 7 R2 provides critical and fundamental cyber security prevention and detection. Change Tracker from NNT will ensure that your IT systems remain in a known, secure and compliant state at all times.
- Category: Vulnerability Tracker™
Vulnerability scanning is an essential foundational security control and vital for every organization. Cyber attacks such as WannaCry and Petya, left many asking the question: How can we stay safely ahead of the next threat?
- Category: SecureOps™
Comprehensive and easy-to-use Security Information and Event Management (SIEM) solution for any compliance mandate
- Category: Device Hardening
So how do you prevent a cyber-attack? Start with making security a priority for all IT operations, and the first place to start is by making systems as ‘hacker proof’ as possible:
- Category: SecureOps™
SecureOps™ combines established best practices for security and IT service management to deliver a holistic and comprehensive solution that identifies and highlights unknown, unwanted and potentially malicious events in real-time…without all the NOISE and headaches of endless alerts.
- Category: Vulnerability Tracker™
Vulnerability scanning is an essential foundational security control and vital for every organization. Cyber-attacks such as WannaCry and Petya, left many asking the question: How can we stay safely ahead of the next threat?
- Category: Change and Configuration Management
Change Control is not the same as Change Management. While Change Management focuses on the justification and planning of changes, Change Control majors on the verification of actual changes made.
- Category: Change Tracker™ Enterprise Gen7 R2
If you are serious about change control and automating key security controls, make sure your monitoring technology doesn't just scale, but that it gives you MEGA-SCALE. Watch the video to find out how.
- Category: PCI DSS Compliance
Req 2.2 mandates the need to verify that system configuration standards are consistent with industry-accepted hardening standards. NNT is a CIS-Certified Vendor and as such provides pre-built device hardening templates derived from the CIS Benchmarks to audit for any vulnerabilities present.