Hi [[ session.user.profile.firstName ]]

NNT | New Net Technologies

  • Date
  • Rating
  • Views
  • NNT ITSM Integration for Cherwell
    NNT ITSM Integration for Cherwell
    Mark Kedgley Recorded: May 23 2019 6 mins
    NNT has integrated its award-winning Change Tracker ™ Gen7R2 with Cherwell's leading service management framework to enable a closed-loop environment for change management. Approved and authorized changes issued by Cherwell can be validated by NNT Change Tracker Gen7 R2, with a full audit trail of what actually changed and reconciled with the Change Request(s).

    By leveraging NNT’s Closed-Loop Intelligent Change Control Technology, repeated or recurring change patterns can be captured and identified as either harmless or potentially harmful as well, discriminating pre-approved changes from unexpected and unwanted changes. Pre-approved changes may also be forensically profiled ahead of time in order to spot any deviations that may indicate ‘insider threats’.

    This approach drastically improves the ability to spot potential breaches by reducing the “change noise”
    and exposing insider and zero-day malware activity. This approach also helps enable SecureOps.
  • NNT Vulnerability Tracker™ Overview
    NNT Vulnerability Tracker™ Overview
    Mark Kedgley Recorded: May 9 2019 7 mins
    NNT’s Vulnerability Tracker™ identifies known vulnerabilities within software and configuration settings before they can be exploited by a cyber-attack.

    Vulnerability Tracker continuously tests and assesses your IT network and any device connected to it against over 66,000 Network Vulnerability Tests (NVTs).

    New vulnerabilities are added daily through various content providers and industry trusted resources which include over 111,400 CVE and Bugtraq alerts, aggregate compliance rulesets, controls for scan agents and embedded Nmap NSE test routines.

    Our fully distributed architecture provides centrally controlled, scanning mesh even for the largest global enterprise networks and our hyper-fast scanning technology means you can assess over 50,000 endpoints per 24 hours.

    Learn more about NNT Vulnerability Tracker: https://www.newnettechnologies.com/vulnerability-tracker.html
  • What Makes NNT Different From Other File Integrity Monitoring (FIM) Solutions
    What Makes NNT Different From Other File Integrity Monitoring (FIM) Solutions
    Mark Kedgley Recorded: May 9 2019 2 mins
    File Integrity Monitoring (FIM) is a foundational control that involves analyzing operating system and application software files to determine if and when they have changed, how they changed and who made the change using a verification method between a current file state and a known baseline.

    NNT has introduced a number of revolutionary concepts into its suite of products giving FIM the “Integrity” element it is sadly absent in other ‘so-called’ FIM solutions. It also solves the issue of “noise” and "integrity drift" while delivering the necessary manageability and scalability where traditional solutions fall short.

    Noise Reduction - NNT has developed a unique intelligent change control technology which is proven to reduce change noise as much as 99% leaving only unknown, unwanted or unauthorized changes highlighted.

    Prevent Integrity Drift - NNT has a white-list database of over 9 billion known and trusted files in its Fast Cloud Integrity Assurance product that can validate and verify the integrity and authenticity of system and application files in real-time.

    Scalability/Manageability - NNT’s modern, componentized architecture can support at a minimum 10 times more devices with a single console than any competitive FIM solution. This solves the problem of having multiple consoles deployed to manage what a single NNT console can provide.

    Continuous Compliance & Assurance - NNT can deliver continuous compliance in real-time...whatever the standards, regulations or policies. If systems deviate, NNT provides descriptive details on how to rectify the compliance requirement so the issue will no longer present itself.
  • NNT FAST™ (File Approved-Safe Technology) Cloud Integrity Assurance
    NNT FAST™ (File Approved-Safe Technology) Cloud Integrity Assurance
    Mark Kedgley Recorded: May 9 2019 4 mins
    Change Tracker Gen 7 R2™ provides the most accurate and effective FIM solution guaranteeing the integrity of your secure IT systems and reporting any changes as they occur. But how do you distinguish between:

    ‘good’ - intended, desirable changes such as updates and patches, and
    ‘bad’ - malicious activity following a breach?

    The smart response is to leverage cloud-based Threat Intelligence to automatically validate file changes as they are detected using an authoritative file whitelist. And now you can use the NNT FAST™ (File Approved-Safe technology) Cloud to do just this, in real-time.

    Learn more about NNT FAST™ Cloud here: https://www.newnettechnologies.com/nnt-fast-cloud-threat-intelligence.html
  • Increase Protection Against Cyber Attacks with System Hardening
    Increase Protection Against Cyber Attacks with System Hardening
    Mark Kedgley Recorded: Apr 1 2019 3 mins
    Increase protection against cyber attacks with system hardening and vulnerability management. See how NNT delivers two key solutions, auditing against a range of CIS Benchmarks and continuous change control.

    What is system hardening?

    System Hardening is the process of securing a system’s configuration and settings to reduce IT vulnerability and the possibility of being compromised. This can be done by reducing the attack surface and attack vectors which attackers continuously try to exploit for purpose of malicious activity.

    By creating a secure and compliant state for all IT systems and combining that with ongoing, context-based change control plus baseline management, Change Tracker™ Gen7 R2 ensures systems remain in a secure and compliant state at all times.

    Learn more about NNT's System Hardening: https://www.newnettechnologies.com/device-hardening.html
  • SecureOps™ - A Critical Missing Piece to an Effective Security Strategy
    SecureOps™ - A Critical Missing Piece to an Effective Security Strategy
    Mark Kedgley Recorded: Mar 1 2019 2 mins
    SecureOps™ combines established best practices for security and IT service management to deliver a holistic and comprehensive solution that identifies and highlights unknown, unwanted and potentially malicious events in real-time…without all the NOISE and headaches of endless alerts.

    SecureOps focuses on three key areas to deliver an effective security strategy: Security, IT Service Management (ITSM), and Compliance.

    Security - Focuses on the establishment of policy to detect changes from a known baseline or trusted state by utilizing NNT’s best practices and library of policies. These policies are derived from trusted third-parties like the Center for Internet Security (CIS) top 20 controls that prioritize a set of actions that mitigate an organizations risk from known cyber-attack vectors.

    ITSM - Focuses on creating a closed-loop environment specific to “expected” changes. Any identified changes that are not planned or map to an authorized work order are suspect to investigation and/or remediation.

    Compliance - The by-product of leveraging these two approaches together is that you are able to deliver continuous compliance & assurance on a daily basis...whatever the standard, regulation or policy.

    Learn more about NNT's unique SecureOps strategy: https://www.newnettechnologies.com/secureops.html
  • NNT Vulnerability Tracker™ - Re-Innovating the Vulnerability Scanning Market
    NNT Vulnerability Tracker™ - Re-Innovating the Vulnerability Scanning Market
    Mark Kerrison and Mark Kedgley Recorded: Feb 13 2019 46 mins
    Through a major collaboration with Greenbone Networks, NNT has advanced their security through system integrity strategy with distributed, fast and accurate Enterprise-Class vulnerability scanning.

    NNT Vulnerability Tracker is based on the commercial-grade version of OpenVAS, the world’s most widely adopted vulnerability assessment tool. This forms a significant progression of NNT’s SecureOps Enterprise Security Strategy and complements NNT’s award-winning Change Tracker Gen7R2 to further efforts in solving IT Security through the definition and delivery of Integrity.

    NNT’s Vulnerability Tracker™ identifies known vulnerabilities within software and configuration settings before they can be exploited by a cyber-attack. Vulnerability Tracker continuously tests and assesses your IT network and any device connected to it against more than 66k Network Vulnerability Tests (NVTs) with new vulnerabilities are added daily.

    Join Mark Kerrison, Chief Executive Officer of New Net Technologies and Mark Kedgley, Chief Technology Officer of New Net Technologies, in an interactive webinar as they showcase the all-new Vulnerability Tracker. Key topics and highlights will include:

    • Understanding how vulnerability management aligns with the basic underlying principles required for every security strategy
    • Where and how vulnerability management corresponds with the CIS Top 20 Controls
    • Architectural, features, functionality and competitive differentiators
    • Familiarity with our hyper-fast scanning technology allowing you can assess over 50,000 endpoints per 24 hours

    With Vulnerability Tracker, you will be able to identify and reduce the attack surface giving you better control and assurance that your infrastructure is operating with the least amount of risk.

    Register now to learn more about Vulnerability Tracker’s unique ability to deliver a comprehensive security solution that aligns with your security strategy to mitigate your overall security risk.
  • NNT Unveils the Future of Intelligent System Integrity Monitoring: Gen7R2
    NNT Unveils the Future of Intelligent System Integrity Monitoring: Gen7R2
    Mark Kerrison and Mark Kedgley Recorded: Nov 8 2018 53 mins
    NNT’s newly released Change Tracker Gen7R2 solves IT Security and the problems that plague all organizations – the overwhelming noise of change control and ensuring the integrity of IT systems.

    Completely redesigned with both security and IT operations in mind, Change Tracker Gen7R2 is the only solution designed to reduce chance noise and the complexity of integrity monitoring and policy management all while allowing for unprecedented scalability and management that meets the most demanding enterprise environments.

    Join Mark Kerrison, Chief Executive Officer of New Net Technologies and Mark Kedgley, Chief Technology Officer of New Net Technologies, in an interactive webinar as they showcase the all-new Change Tracker Gen7R2 Key highlights:

    • Embracing the SecureOps strategy: merging basic fundamentals of security and operations to deliver one unified solution
    • Automating the IT service management (ITSM) workflow to enable Closed-Loop Intelligent Change Control
    • Utilizing pattern matching intelligence to identify expected, planned changes against changes that could represent a security breach
    • Adopting the basic underlying principle required for every security strategy- Security through System Integrity
    • Achieve real-time continuous compliance regardless of the standard or policy

    With Gen7R2’s integration and automation with ITSM platforms such as ServiceNow®, change noise is reduced by more than 90%, leaving only changes that are unknown unwanted, unexpected, or malicious in nature.

    Register now to learn more about NNT’s newly released Change Tracker Gen7R2 and how comprehensive and effective our SecureOps strategy can be to achieving operational excellence.
  • What's New in Change Tracker Gen7R2
    What's New in Change Tracker Gen7R2
    Mark Kedgley Recorded: Oct 24 2018 5 mins
    Change Tracker Gen7 has been completely re-designed and improved to more effectively deliver automated, key foundational security controls, encompassing System Integrity Monitoring, Vulnerability Management, Malware Protection and Change Control.

    Change Tracker Gen7R2 delivers a breath-taking range of new innovations to target and solve key cybersecurity issues. Best of all, Gen7R2 elevates system integrity monitoring to new levels of forensic visibility and change control, but also solves the issue of alert fatigue that previously blunted the power of traditional file integrity monitoring systems.

    Our latest self-learning breach detection technology utilizes pattern matching intelligence to identify expected, planned changes, against changes that could represent a breach. Gen7R2 leverages contextual change control underpinned by the world’s largest authoritative file whitelist, enabling organizations to spot breach activity in real-time and act before any serious damage is done.

    Click here to learn more about Change Tracker Gen7R2: https://www.newnettechnologies.com/change-tracker-gen-7.html
  • SecureOps:Driving Unprecedented Security & Operational Results
    SecureOps:Driving Unprecedented Security & Operational Results
    Tony Sager and Mark Kedgley Recorded: Oct 11 2018 53 mins
    The security industry as we know it is broken and the problem is getting worse. We now must look at security through a different set of spectacles. Ones that allow us to manage more by fact and not fiction. Simply put…there are no silver bullets to solve this problem! We have to stop following bright shiny objects and get back to “Basics”.

    This webinar is the first in a series delivered by the Center for Internet Security (CIS) and NNT intended to help educate and articulate how security and operations need to leverage one another to achieve common IT goals. The content of this webinar will provide very specific data points about a SecureOps strategy and the benefits from such an approach. More importantly, it will articulate a framework that prioritizes IT controls that begin to move from descriptive to one that is prescriptive and is prioritized based on risk mitigation and overall defensible effectiveness.

    Join Tony Sager, Senior Vice President and Chief Evangelist for the CIS and Founder of the Secure Controls Framework and Mark Kedgley, Chief Technology Officer and Co-Founder of New Net Technologies in an interactive webinar where we will:

    • Provide the data point(s) that support why SecureOps effort is necessary and long overdue – Manage by Fact Not Fiction
    • Understand what are the common denominators between security and operations - Where 1+1=3
    • Articulate how the CIS “basic” controls are essentially operational controls – The Common Denominators
    • Discuss how the CIS and NNT can help an organization prioritize efforts where 20% of the effort delivers 80% of the value – The Cliffs Notes

    Register now and get a free copy of the new SANS Security Leadership Poster and a fully-functional extended trial of NNT Change Tracker Gen7 to see how easily you can embrace SecureOps in your environment.

Embed in website or blog