Tripwire Resources

5 Steps to Defend from Targeted Attacks with Security Integration

Webcast - Archived

This archived webcast features guest speaker Rick Holland, Principal Analyst serving security and risk professionals at Forrester Research, and Tim Erlin, Director of Solution Strategies at Tripwire. They will provide practical steps on how to integrate foundational security controls for better prevention and detection.

Read More

Tripwire: Advanced Threat Protection, Security and Compliance

Book

In today's threat landscape, where over 390,000 pieces of malware are introduced daily, traditional security solutions are no longer sufficient. The solution to this cyber security reality is Adaptive Threat Protection™, Tripwire’s next-generation innovative solution architecture to reduce the cyberthreat gap—enabling our customers to respond faster and with more precision to threats and vulnerabilities. 

Learn how our solution enables highly granular threat analytics and forensics capability, while at the same time the ability to detect and respond adaptively to zero-day and today’s advanced threats. 

 
 
Read More

Stop Chasing the Version: Compliance with NERC CIPv5 through CIPv99

Webcast - Archived

For many energy companies, readying for compliance with the latest version of NERC Critical Infrastructure Protection (CIP) standards, whether they be v5, v6, v7 or beyond is not the first priority – delivering reliable energy to the BES is. So, how does a company deal not only with the impending changes of CIP v5, but do so in a practical manner that best positions them for compliance with future versions and secures their cyber environment?

Hear from ICF, Tripwire, and AssurX industry experts who are helping organizations already grappling with the new and upcoming CIP requirements, implementing a risk based approach, the practical steps they are taking to get ahead of the curve, and addressing the uncertainty.

Read More

Enterprise of Things Report

Research

The Internet of Things describes the growing number of intelligent objects that are being connected to the Internet. These devices are also expected to bring a range of new security and risk challenges to the enterprise.

The objective of this study is to evaluate the emerging impact of IoT devices on the enterprise. Because the security risks associated with smartphones, tablets and laptops are relatively well understood, the study focuses on IoT categories that are already a part of enterprise networks as well as new devices that are expected to hit an adoption inflection point over the next 24 months.

Read More

Yoda's Guide to Improving Cyber Literacy in Boards and Executives

Case Study

A long time ago in a galaxy far, far away, boards and executives worried about maximizing shareholders value, increasing profits and running smooth operations with limited understanding of how cyber security impacted the businesses they were leading. Today, however, their appetite for knowledge is increasing and the need to improve cyber literacy in business executives is greater. In this video, Robb Reck, an information security and risk leader, currently serving as VP and CISO for Pulte Financial Services and VP of the Denver Chapter of ISSA, shares with us his approach to helping improve and educate his organization on cybersecurity.

Read More

Improving Cybersecurity Literacy in Boards and Executives with Brian Engle

Case Study

Understanding security is no small feat and as cyber attacks continue to gain notoriety, the need to improve cyber literacy in the board room and among executives is essential. Brian Engle, information security leader and Tripwire customer, shares his approach to helping improve and educate his organization on cybersecurity.

Read More

How Tripwire Ruined My Day (And Saved My Year)

Case Study

Ever had your day ruined? One of our customers, Ian Robertson from Trion Worlds, had his day ruined by Tripwire. Unfortunately, Tripwire’s alerting system woke him during the middle of the night with a text message warning something wasn’t right. Ian was not a happy camper but thanks to the alert of the malicious activity that Tripwire detected, Trion Worlds quickly worked to resolve the issue before the company ended up in countless headlines. Although Tripwire ruined Ian’s day, we’re glad to say it also saved his year.

Read More

Enterprise Vulnerability Management in the Cloud

Case Study

Stephen Brennan, from CSC, discusses today's cybersecurity challenges, shifting the market as companies begin moving to cloud environments. With vulnerability, compliance and reporting being top priorities for enterprises, CSC is helping its customers with these needs using Tripwire’s Vulnerability Management solution – Tripwire IP360. CSC’s customers have now simplified and automated compliance reporting processes, risk scoring and prioritized remediation efforts. In addition to these benefits, customers are also able to reduce the total cost of ownership.

Read More

DSW's (Re)Deployment of Tripwire Enteprise

Case Study

With thousands of shoes for men and women in more than 350 stores nationwide, this large mid-west retailer strives to find the perfect shoe at the perfect price... but finding the perfect security solution is a whole different story. For years, DSW was using Tripwire Enterprise’s File Integrity Monitoring for PCI compliance but recent headlines of other retailers in the news made them realize it was time to get serious about its security initiatives.

Read More

Tripwire Delivering Security Needs. On Time. For FedEx.

Case Study

We are all familiar with FedEx; we know the trucks and we know the planes. But there is so much more to FedEx and the complexity that comes with running this large corporation. Learn how FedEx took their Tripwire Enterprise deployment to the next level by automating, optimizing and integrating its current solutions to successfully build out a comprehensive security strategy.

Read More

AAA: Getting Roadside Assistance from Tripwire

Case Study

Tim Masey, Director of Enterprise Information Security at AAA, shared his company’s PCI journey: beginning with a small implementation of Tripwire, then running into roadblocks by Management for the expansion of products, and eventually moving forward with the implementation of Tripwire’s policy driven dashboards, rules and tasks for over 500 servers.

Read More

Mind the Gap: Using Vulnerability Management to Close the Enterprise Cyber Threat Gap

White Paper

The problem for most enterprises today is information overload. Attacks are becoming more sophisticated while increasing at a pace that IT professionals simply can’t keep up with. A data breach is not a matter of if but when, so what separates a minor incident from a catastrophic event is the ability to minimize the cyber threat gap and address issues more effectively and efficiently.

This paper covers the security challenges facing enterprises and how to deal with them. Specifically, it describes how automated vulnerability management can be an effective tool for reducing the cyber threat gap, and how to minimize the damage from a data breach. 

Read More