IT Security and Compliance Videos

Watch webinars and video guides from industry experts New Net Technologies, on a range of IT security and compliance topics.

webinar

Halloween has been and gone: the time where we share scary stories knowing they’re confined to story books and movie screens, but unfortunately, there are some IT horror stories that are all too real: the scariest being ransomware.

FAST Cloud

Change Tracker Gen7 provides the most accurate and effective File Integrity Monitoring solution, ensuring the integrity of your security IT systems and reporting any changes as they take place. But how do you differentiate between ‘good’, intended or planned changes, and ‘bad’, possibly malicious activity?

Leverage cloud-based Threat Intelligence to automatically validate file changes as they are detected using an authoritative file whitelist. And now you can use the NNT FAST™ (File Approved-Safe technology) Cloud to do just this, in real-time.

In this Educational Moment we discuss Comparing and Contrasting Compliance Reports to provide ongoing real time compliance intelligence. Learn how to leverage the information provided for enhanced security and compliance management as well as comparing results from different devices to ascertain any configuration or compliance drift.

Any therapist will tell you that there are a range of emotions adopted when dealing with grief of any kind.  Nothing changes when dealing with the grief caused by having to manage a GRC Compliance Audit. But the good news is you can get through it!

CIS Webinar

During this Webinar, you’ll hear directly from our panel of experts as we discussed the increased importance of applying the Center for Internet Security Controls as a modern cyber security approach. The session also highlighted the benefits of combining the CIS standards with ongoing, real-time compliance monitoring.

Educational Moment - July

This Educational Moment will be on the topic of Configuration Policy Remediation. With NNT's latest Threat Mitigation Kits, organizations are equipped with the necessary configuration & vulnerability checklists, which NNT further automates to automatically fix any weaknesses identified within your systems.

Latest threats from ransomare

Abiding by compliance standards is a must and at NNT, we know it’s more than just a check-list exercise. By combing Continuous Compliance Tracking, Intelligent Change Control & Continuous System Integrity Monitoring, NNT has made achieving, proving & remaining compliant a straightforward and closed-loop process.

Webinar Threat

It should come as no surprise that cyber threats are continuing to evolve both in sophistication and the level of threat they represent. Despite these continued threats, there’s an equally improving maturity within the cyber security community & growing evidence that a simple, pragmatic and best practice approach to security is more than capable of fending off the threat.

ct video

See the next generation of breach prevention technology - Change Tracker Gen 7™

change-tracker-gen-7

Change Tracker Gen7 represents an intelligent approach to system integrity monitoring through the use of our Closed-Loop Intelligent Change Control (CLICC). NNT has significantly reduced the previously overwhelming workload associated with forensic-level change control to allow the organization to focus on what matters most- unexpected changes.

Join NNT’s Mark Kerrison and Mark Kedgley who are keen to acquaint you with this landmark release!

NNT Webinar Video

Join NNT in this educational session, as we partner directly with the Center for Internet Security (CIS) and Blake Frantz to address the topic of 'Why Security Automation is a critical asset to have'.

Layered security

Your organization is under attack right now. The range of techniques and battlefronts is bigger than ever

  • New malware strains exceed 25 million, and increasing by over 20%, each year, phishing attacks also increasing – AV becomes more impotent each day
  • Hacktivist groups and corporate blackmail cyber-attacks are increasing
  • The Insider Threat - What defenses do you have against a trusted employee gone rogue?
  • And then we have the Advanced Persistent Threat or APT

The NNT view is that there is an art to delivering effective security. File Integrity Monitoring, combined with best practice processes in device hardening and change management, are the only way to maintain truly secure systems.

NNT Change Tracker Enterprise

Every gap in defenses leaves the enterprise with a Cyber Security Achilles Heel, a weak spot or vulnerability that an attacker can exploit. We call this the Enterprise Attack Surface.

How prone is your organization to an attack right now? How do you assess or measure this?

This overview shows how Change Tracker Version 6.5 uses real-time file integrity monitoring technology to discover vulnerabilities using CIS Benchmark reports, for servers, database systems and network devices, thereafter providing real-time FIM to detect any breach or malware.

NNT Products
USA Offices
New Net Technologies LLC
Naples
Suite #10115, 9128 Strada Place
Naples, Florida, 34108
Atlanta
201 17th Street, Suite 300
Atlanta, Georgia, 30363.

Tel: 1-888-898-0674
email USinfo@nntws.com
UK Office
New Net Technologies LLC
Rivers Lodge
West Common
Harpenden
Hertfordshire
AL5 2JN

Tel: 01582 287310
email UKinfo@nntws.com
Connect
Google+ Linkedin Twitter - Change Tracker Facebook rss feed YouTube
CIS benchmarking SEWP Cybersecurity 500 Sans Institute
Copyright 2017, New Net Technologies LLC. All rights reserved. 
NNT and Change Tracker are registered trademarks of New Net Technologies LLC.
All other product, company names and trademarks are the property of their respective owners.