Tripwire Resources

Achieving Trust After a Breach: "Which Systems Can I Trust?"

White Paper
When an organization has been compromised, some of the first questions to ask are critical:  “Which systems can I trust?”  “What was done to compromise my systems or data?”  “How quickly can I…
Read More

PCI DSS Compliance with Tripwire Solutions: A Witham Pty Ltd whitepaper

White Paper
This whitepaper is a useful guide for security personnel who want to learn how Tripwire® Enterprise, Tripwire Log Center® and Tripwire IP360™ could assist in meeting PCI DSS requirements. Qualified Security Assessors (QSAs) might find…
Read More

Layered Security: Protecting Your Data in Today's Threat Landscape

White Paper
The "M&M" approach to security — protecting the soft interior with a hard shell — doesn’t work against today’s threats. When perimeter defenses fail (and they will), or a threat originates internally,…
Read More

IANS Information Security Investment Analysis (ISIA) of Tripwire Solutions

White Paper
In the world of security, it can be difficult to quantify the advantages of a particular solution when so many variables are at play. On behalf of Tripwire, IANS conducted an Information Security Investment Analysis (ISIA) of Tripwire’s…
Read More

System State Intelligence Play-by-Play for Security Peace of Mind

White Paper
Current approaches to security simply aren’t effective. But what can you do differently? In this white paper, learn about System State Intelligence, a new approach to security that decreases the likelihood of compromise, helps you better…
Read More

Reducing Federal Systems Risk with the SANS 20 Critical Controls

White Paper
With U.S. Federal information systems under attack, the need for guidance for securing them has never been greater. SANS recently released its SANS 20 Critical Security Controls (20CSC). Learn why government agencies are leaning toward adopting the…
Read More

10 Steps for Early Incident Detection

White Paper
Despite investing heavily in their security defenses, many organizations still get breached. All too often, they learn they’ve been breached from a third party. Why are security teams unable to detect incidents? In this white paper,…
Read More

Continuous Monitoring: Responding to the New Threat Environment

White Paper
Today, organizations must walk the fine line between securing their valuable data and giving employees and customers access to it. But as the threat environment and computing environments evolve, so must data protection methods. Learn more about…
Read More

SCM: Getting Back to IT Security Basics

White Paper
In IT security, obvious weaknesses like weak configurations often get overlooked. Yet for hackers, they’re an open door into networks and systems. Learn how security configuration management (SCM), a critical security control, hardens…
Read More

Security-In-Depth Using Integrated Risk-Conscious Controls

White Paper
Most organizations take a perimeter-centric approach to security, assuming most attacks come from outside the organization. Yet there's no longer a clear boundary between what's inside or outside the organization, and attackers range from unhappy…
Read More

Securing ePHI for HIPAA/HITECH Compliance

White Paper
Because the Department of Health and Human Services has finally begun to enforce HIPAA with fines and a new “wall of shame” for those who have been breached, organizations subject to the law are beginning to take the law seriously. In…
Read More

Meeting the True Intent of File Integrity Monitoring

White Paper
Today, organizations simply use file integrity monitoring (FIM) to meet one of the many regulations, like PCI, that require it. But for most, the term "FIM" has become synonymous with "noise" due to the volume of change data it…
Read More