top of page
NNT-STS-e1558549900542.png

SYSTEM INTEGRITY MONITORING AND SIEM

WHY NEW NET TECHNOLOGIES ?

  • Compliance is a must for your organization.

  • You want to ensure your IT infrastructure are always secure.

  • Breach detection is serious, and you want a tool to detect it as fast as you can.

NNT CHANGE TRACKER GENERATION 7™

NON-STOP FILE INTEGRITY MONITORING

NNT Change Tracker Generation 7™ delivers market-leading Breach Prevention and Detection

image-asset (20).jpeg

Change Tracker Gen 7™ marks the next generation of continuous breach prevention & detection with intelligent file integrity monitoring, compliance management, system hardening, threat intelligence & security configuration management all powered by Intelligent Closed-Loop Intelligent Change Control.

Intelligent Change Control: Leveraging Threat Intelligence to streamline Security Best Practice

image-asset.jpeg

Change Tracker™ Gen 7 heralds a new ‘Intelligent’ approach to system integrity monitoring, more usable and more effective for real-time breach detection. Closed-Loop Intelligent Change Control (CLICC) reconciles the benefits of forensic-level change control with the hitherto onerous workload associated of reviewing and acknowledging reported changes. Change Tracker™ literally learns the difference between good and bad changes, automatically promoting legitimate changes to Planned Changes, leaving behind only potentially harmful, unplanned changes for review.

NNT LOG TRACKER ENTERPRISE™
ENTERPRISE SIEM

image-asset (1).jpeg

​Comprehensive and easy-to-use Security Information and Event Management (SIEM) solution for any compliance mandate providing

  • Enterprise-class SIEM capabilities

  • Compliance Automation

  • User and System Activity Audit trails

  • Network Anomaly forensics

  • Proactive Threat Detection

NNT Log Tracker Enterprise has built-in support for all major GRC standards, protecting customer data and customer privacy to auditor-ready levels right out of the box, including

image-asset (2).jpeg

Compliance Standard Supported

  • PCI DSS V3.0

  • Sarbanes-Oxley

  • NIST 800-53

  • DISA STIG

  • HIPAA

  • NERC CIP and NRC RG

  • DODI Defense Cybersecurity Program

  • FedRAMP

  • COBIT

Platform and Applications Supported

  • Network devices, including Cisco, Juniper, Nortel, Avaya, Huawei, Dell

  • All Windows, Unix and Linux servers, including Solaris, RHEL, SUSE, Ubuntu, CentOS, HP/UX, AIX and Non Stop

  • Firewall or IPS and IDS devices, including Checkpoint, Cisco ASA, Palo Alto, Fortinet, WatchGuard and SonicWall

  • Database and Data Warehouses servers including SQL Server, Oracle, DB2, MySQL, PostgreSQL, Hadoop, Netezza, Informix, and Teradata

  • Middleware and Web servers including JBOSS, Fusion, WebSphere, IIS, Apache, Tomcat, JBoss, HIS, Websphere, SunOne and Weblogic

  • SCADA, HMI, MES and other industrial control systems, including Schneider Electric, GE and Siemens

  • IBM Mainframes and IBM AS/400-iSeries, for user activity and file integrity monitoring

  • All other potentially useful sources of log information such as door entry systems, environmental sensors

bottom of page