...
Core to the Nanitor platform is the need for meaningful intelligence that pushes organisations towards improved cyber security. Compliance, risk, and security officers can use Nanitor to effectively categorise assets, which directly impact security issue importance. With dynamic risk-based prioritisation organisations can focus on the most important issues using the intelligence configured and derived from functional areas, impacted assets and identified vulnerabilities inc. security configurations, known vulnerabilities and asset securityat any time.
Security Operations Dashboard
...
Compliance Frameworks & Regulatory Requirements
Enhanced Nanitor introduces support for the use of multiple parallel compliance frameworks, giving assurance that you are addressing the issues that are most important to your company as part of regulatory and cyber security requirements.
...
ISO 27001 Information Security Management Standard,
PCI DSS Payment Card Industry Data Security Standard,
NIST 800.53 Recommended Security Controls for Federal Information Systems and Organisations,
SAMA CSF Saudi Arabian Monetary Authority Cyber Security Framework,
NCA ECC National Cybersecurity Authority of Saudi Arabia, Essential Cybersecurity Controls, and
CIS CSC Center for Information Security Critical Security Controls.
IT asset activity log & new reportsNew Reports
New reports included in the Nanitor platform are:
Issue prioritisation
Prioritised list of issues using asset criticality (Confidentiality, Integrity, Availability) rating.
Activity log
Detailed log of events that Nanitor is monitoring and using for issue identification and prioritisation.
Compliance Framework
Key reporting for corporate stakeholders that shows compliance status.
...
New Cloud Security Configuration Benchmark support for Office365.
New OS support for Red Hat Enterprise 8 and CentOS 8.
New Application support for Microsoft IIS 10.0.
New Database support for MySQL 5.6, 5.7, and 8.0, enterprise and community.