Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

Nanitor is committed to continual improvements to our cyber security platform, delivering best-in-class real-time analysis of security configurations, vulnerability risk management, reporting, and analytics.

Dynamic Risk-Based PrioritizationPrioritisation

Core to the Nanitor platform is the need for meaningful intelligence that pushes organisations towards improved cyber security. Compliance, risk, and security officers can use Nanitor to effectively categorise assets, which directly impact security issue importance. With dynamic risk-based prioritization organizations prioritisation organisations can focus on the most important issues using the intelligence configured and derived from functional areas, impacted assets and identified vulnerabilities inc. security configurations, known vulnerabilities and asset security.at any time.

Security Operations Dashboard

Address your security landscape by improving the clarity of your cyber security posture. With the Nanitor RISC dashboard, your operations teams stay focused on the most important issues at any given time, enabling accurate tracking and risk prioritization prioritisation using the Confidentiality, Integrity, Availability triad.

Compliance Frameworks & Regulatory Requirements

Enhanced Nanitor introduces support for the use of multiple parallel compliance frameworks, giving assurance that you are addressing the issues that are most important to your company as part of regulatory and cyber security requirements.

...

  • ISO 27001 Information Security Management Standard,

  • PCI DSS Payment Card Industry Data Security Standard,

  • NIST 800.53 Recommended Security Controls for Federal Information Systems and Organisations,

  • SAMA CSF Saudi Arabian Monetary Authority Cyber Security Framework,

  • NCA ECC National Cybersecurity Authority of Saudi Arabia, Essential Cybersecurity Controls, and

  • CIS CSC Center for Information Security Critical Security Controls.

IT asset activity log & new reportsNew Reports

New reports included in the Nanitor platform are:

  • Issue prioritizationprioritisation

    • Prioritized Prioritised list of issues using asset criticality (Confidentiality, Integrity, Availability) rating.

  • Activity log

    • Detailed log of events that Nanitor is monitoring and using for issue identification and prioritizationprioritisation.

  • Compliance Framework

    • Key reporting for corporate stakeholders that shows compliance status.

...

  • New Cloud Security Configuration Benchmark support for Office365.

  • New OS support for Red Hat Enterprise 8 and CentOS 8.

  • New Application support for Microsoft IIS 10.0.

  • New Database support for MySQL 5.6, 5.7, and 8.0, enterprise and community.