Tripwire Resources

Save Months of Labor by Automating for NERC CIP-007-5-R1 – With Great River Energy

Video
The complexities of NERC CIP-007-5 Requirement 1 (R1) make this one of the most violated requirements in all the NERC standards. NERC CIP-007-5 is the standard focused on Systems Security Management. R1 is intended to minimize the attack surface of…
Read More

Tripwire IP360 App for Splunk Enterprise

Datasheet
The Tripwire® IP360™ App for Splunk Enterprise is a free app that pulls in data from Tripwire IP360 and offers out of the box dashboards, reports and fast access to critical system and application data. Tripwire IP360 provides…
Read More

Tripwire IP360 Learning Labs: Searching FOCUS for Security Analytics & Incident Response

Video
This session takes a close look at Tripwire FOCUS, the dynamic security analytics tool built into Tripwire IP360, and how existing scan and host information can be leveraged to speed incident response.
Read More

Practical Steps to Improving Your Compliance Process

Video
SOX 404, PCI, HIPAA...keeping up with today's regulations requires continuous improvement of your IT processes, such as asset discovery, event logging, and change and configuration management. In this Videocast, gain more insight into how to improve…
Read More

10 Steps to Risk-Based Security Management EMEA

Video
An organisation's investment in security should not stop at simply meeting the compliance standards.  A risk based approach to information security will not only help you achieve continuous compliance but also protect the information security…
Read More

10 Steps to Risk-Based Security Management

Video
Despite the belief of many security professionals in the value of a risk-based approach to information security, many organizations still act in ways that do not reflect this commitment.  This dichotomy often leads to misplaced effort, spending…
Read More

Avoiding Vulnerability Information Overload: How to Prioritize and Respond to Risk

Webcast
Many Tripwire customers have asked us how Tripwire measures risk.  They have told us that they’ve deployed vulnerability assessment tools that provide a lot of information, but the information provided has not helped them become more…
Read More

Reaching Peak Security with the 20 Critical Security Controls Infographic

Infographic
The 20 Critical Security Controls are a respected framework for rapidly and effectively implementing an effective security program in organizations. See highlights of an implementation survey conducted by SANS Institute of 300 organizations in…
Read More

Caught in the Crossfire: The Business Impact of Cyberwar and High Tech Espionage

Video
The greatest cyber threat to business is no longer just criminal hackers armed with a laptop and exploits but also nation-states and intelligence agencies around the world, seeking the upper hand through cyberwar and espionage tactics.
Read More

Tripwire IP360 App for Splunk Enterprise

Tool
Quickly and easily visualize the overall health of your IT environment with the right data and the business context around that data. Tripwire IP360 offers rich host and vulnerability intelligence data, and Splunk provides the means to visualize the…
Read More

Vulnerability Management Article Anthology, vol. 2: Tripwire Cyber Security Pros Share Their Expertise

Book
This anthology of blog posts from Tripwire's award-winning blog, "The State of Security" provides four cyber security experts' views on vulnerability management. 
Read More

When Cyber Attacks Get Physical: ICS Attack Scenarios and CIP-007 R1

White Paper
Due to a dramatic uptick in targeted attacks against power grids, banks and transportation networks around the world, there is a good chance that a cyber attack against nearly any country’s critical infrastructure could be imminent. These…
Read More