Tripwire Resources

Tripwire Axon: Foundational Endpoint Intelligence for IT Ops, Security and Compliance

White Paper
Tripwire has set a new standard in how IT Operations, Security and Compliance can work together and integrate around a single source of endpoint intelligence. The Tripwire Axon™ platform is that bridging technology to efficiently gather…
Read More

Leveraging IT Operations Change Controls to Improve Security and Compliance

White Paper
Whether intentionally or not, today’s organizations subject their IT environments to constant change. The pace of change isn’t slowing, either. Formerly “safe,” proprietary operational technologies used in manufacturing,…
Read More

NIST: Improve Your Cybersecurity Posture

White Paper
The broadcast industry has quickly learned that they are not immune from cyber threats, ranging from commandeering for propaganda purposes, to theft of customer data and IP. And a cyber attack on broadcast systems coordinated with a terrorist…
Read More

EMA Report Summary: Achieving High-Fidelity Security

White Paper
When investigating an incident, context is essential in making the most appropriate decisions. Collecting and using high-fidelity data from both the network and the endpoints provides better context to quickly detect and responds to malicious…
Read More

Combating Patch Fatigue: Is IT Overwhelmed to the Detriment of Enterprise Security?

White Paper
Patch management plays a critical role in minimizing security risk for enterprise information technology systems. However, many organizations struggle to keep up with—or find themselves completely overwhelmed by—the volume of…
Read More

Preparing for the CCRI Program

White Paper
Because the Command Cyber Readiness Inspection (CCRI) program increases the stakes for cyber security accountability by holding senior mission commanders at major DOD headquarters, installations and facilities personally responsible for end-to-end…
Read More

Building a Mature Vulnerability Management Program

White Paper
An enterprise vulnerability management program is best able to reach its full potential when it's built on well established foundational goals that address the information needs of all stakeholders, its output is tied back to the goals of the…
Read More

Defending Industrial Control Systems with Tripwire

White Paper
Threats to Industrial Control Systems (ICS) are increasing—a reality that ICS-centric industries have begun to recognize. As a response to the growing need for protection from cyberattacks, the Department of Homeland Security (DHS),…
Read More

Point of Sale or Point of Compromise? Securing POS Systems

White Paper
Retail breaches are the highest profile security stories because they affect hundreds of millions of customers around the world. However, retail security challenges go far beyond preventing credit card theft. The complexities of point-of-sale (POS)…
Read More

SANS - A Maturity Model for Endpoint Security

White Paper
In this paper, SANS introduces a security maturity model specifically for endpoints and reveals how to assess the current state of endpoint security. It also suggests where and how to establish enterprise endpoints as part of the security curve, and…
Read More

Solid Foundations for Cloud Security: Houses Built on Sand or Rock

White Paper
Moving mission critical applications to the cloud provides a whole host of benefits but it also means trusting cloud providers with key aspects of security and compliance. This paper provides tools you can use to evaluate the security and…
Read More

Backdoors: Are You Prepared?

White Paper
Today, there are tens of thousands of individuals, organizations and even governments that are after the data on company servers, personal computers and personal devices. It’s imperative that security engineers and IT professionals deploy,…
Read More