Change Tracker

  • SKU: CHANGETRCK

NNT?s Change Tracker Gen7R2 Solution takes Change Control to a new level and addresses the problems that plague all organisations ? overwhelming change noise and ensuring the integrity of IT systems.

Change Tracker Gen7 R2 integrates with leading Service desks and Change Management solutions to reconcile the changes that are actually occurring within your environment, with those that were expected and part of an approved Request for Change. Security and IT Service Management (ITSM) have traditionally observed and managed change in two very different ways. By linking the changes approved and expected within the ITSM world with those that are actually happening from a security perspective, SecureOps is delivered and underpins effective, ongoing security and operational availability.

Change Tracker Gen7 R2 Features & Benefits:

Automate Critical Security Controls Ensure all IT assets are secure and breach free at all times by leveraging state of the art, recommended security and configuration hardening settings along wit real-time system vulnerability an configuration drift management.
Breach Prevention Identify suspicious activity using highly sophisticated contextual change control underpinned by threat intelligence to spot breach activity while reducing change noise.
Breach Detection By creating a secure and compliant state for all IT systems and combining that with ongoing, context-based change control plus baseline management, Change Tracker ensures systems remain in a secure and compliant state at all times.
Real-Time Contextual File Integrity Monitoring (FIM) Identify suspicious activity using highly sophisticated contextual change control underpinned by threat intelligence to spot breach activity while reducing change noise.
Automated CIS Benchmarking, System Hardening & Continuous Vulnerability Management Full range of CIS Benchmark hardening reports are built-in at no extra cost. NNT are one of a handful of CIS Certified Vendors The Center for Internet Security are the industry’s authoritative source of secure configuration guidance. STIGs and any other SCAP/OVAL automated content can also be used.