Tripwire Announces Faster, More Resilient Enterprise-Class Vulnerability Assessment
Key features of Tripwire IP360 include:
- Enables high-performance scanning for high-profile vulnerabilities to deliver faster results for urgent and critical vulnerabilities.
- Reduces the manual effort required to manage scans in large enterprise environments via an updated, easy-to-use user interface. The new user interface also complements the Tripwire IP360 Commander application, which automates vulnerability management workflows by integrating Tripwire IP360 with popular enterprise IT and security systems. This reduces manual effort and human errors.
“Tripwire IP360 8.0 makes it possible for the State of Minnesota to complete more scans and scan more devices faster than ever,” said Chris Buse, CISO for the state. “Continuous network scanning, combined with actionable, priority scoring, allows us to identify and address critical vulnerabilities quickly. The new user interface helps make our security experts more productive because they can quickly search, filter and export the information they need.”
Additionally, the scalable architecture of Tripwire IP360 is designed to:
- Minimize network and system impact.
- Centralize data aggregation.
- Provide enterprise-wide, centralized role-based management and reporting.
“Enterprise IT security executives have the mandate to actively and continuously reduce security risk to their businesses, and they must quickly detect and respond to new vulnerabilities as they occur,” said Dwayne Melancon, CTO and vice president of research and development for Tripwire. “It can be challenging with some other solutions to complete vulnerability scans in a timely manner, and this is a significant problem for large, complex networks. Tripwire IP360 makes it possible to quickly and reliably scan across large, distributed and remote networks providing the timeliness, accuracy and insight necessary to dramatically reduce the risk of a security breach.”
In 92 percent of breaches studied in Verizon’s 2016 Data Breach Investigations Report, attackers were able to compromise networks in a matter of minutes. It also found that the median time between the discovery of a new vulnerability and the time that an exploit for it is ‘weaponized’ is about 30 days. This means that organizations that don’t complete vulnerability scans or scan infrequently have an incomplete view of security risks and could be highly vulnerable targets of cyber attacks. This is particularly true for larger organizations that add new assets and applications to their networks every day.
Tripwire IP360 is an industry-leading vulnerability and security risk management solution that comprehensively discovers and profiles network assets. Tripwire IP360 delivers advanced, dynamic prioritization metrics, which combine business asset values with vulnerability scores making it possible to prioritize security risks in the context of customer businesses.
Tripwire IP360 provides the broadest coverage of conditions in the industry. The solution discovers more than 110,000 conditions, including vulnerabilities, configurations, applications and operating systems, and delivers a very low rate of false positives. Through the Tripwire Vulnerability and Exposure Research Team (VERT), the company delivers up-to-date, accurate, non-intrusive discovery signatures relevant to enterprises. VERT has a state-of-the-art lab and gives unwavering attention to the changing threat environment in order to provide customers with the most timely vulnerability intelligence. Recent examples of serious exploit coverage include Java Deserialization issues, ImageTragick and Joomla CVE-2015-8562. Tripwire IP360 is integrated with Tripwire Enterprise, the firm’s leading file integrity and compliance management solution so customers can correlate endpoint changes and vulnerability risks.
For more information, please visit: http://www.tripwire.com/it-security-software/enterprise-vulnerability-management/tripwire-ip360/8/
Tripwire is a leading provider of security, compliance and IT operations solutions for enterprises, industrial organizations, service providers and government agencies. Tripwire solutions are based on high-fidelity asset visibility and deep endpoint intelligence combined with business context; together these solutions integrate and automate security and IT operations. Tripwire’s portfolio of enterprise-class solutions includes configuration and policy management, file integrity monitoring, vulnerability management, log management, and reporting and analytics. Learn more at tripwire.com, get security news, trends and insights at https://www.tripwire.com/blog/ or follow us on Twitter @TripwireInc.