Tripwire Assets & Resources
Major Healthcare Provider
Learn why this large, top-rated healthcare provider opted for Tripwire® IP360™, with Tripwire Security Intelligence Hub for advanced analytics, and how the solutions are used in this large-scale deployment.
Major Healthcare Provider
Learn how this hospital system used Tripwire to achieve high integrity of Epic data.
Security Check up for Healthcare Providers
Learn the top three proactive security best practices to prevent an EHR breach.
Walgreens: Adopting Proactive Security with Tripwire
Walgreens' Director of Global Security and Risk Management Ed Yousfi shares how the company was able to incorporate a more proactive approach to security with the help of Tripwire.
Tripwire Enterprise Integration Plug-in for Remedy AR System
Correlating changes with change requests—and distinguishing authorized and intended changes from unauthorized and unintended ones—doesn't need to be a full-time job. The Tripwire® Enterprise Integration Plug-in for Remedy AR System combines authorized change information managed by the Remedy AR System with Tripwire Enterprise's robust change auditing capabilities.
Tripwire CCM and CyberArk: Seamlessly Integrated to Provide Credential-Protected Scans
Learn how Tripwire® Configuration Compliance Manager (CCM) integrates with CyberArk Application Identity Manager to deliver a centralized, secure management of privileged credentials used for comprehensive vulnerability scans. Privileged credentials (password and SSH keys) used by Tripwire CCM are securely stored and automatically rotated by CyberArk Application Identity Manager, reducing the risk of credentials compromise and simplifying regulatory compliance.
Tripwire CCM Policies and Platform Support
Tripwire® Configuration Compliance Manager (CCM) automates discovery of all assets within the environment and can apply compliance and security standards to configuration compliance and patch compliance audit.
Are US Federal IT Pros Overconfident in Data Breach Detection Skills?
Tripwire studied confidence vs. knowledge of US federal IT security pros on seven key security controls necessary to detect a data breach. For many controls, IT pros believed they had the information necessary to detect a breach quickly but provided contradictory information about the specific data.
SANS Spotlight: Back to Basics
This white paper, authored in partnership with the SANS Institute, lays out a six-step guide to help you achieve cyber integrity across your entire agency or organization
MITRE ATT&CK Matrix with CIS Controls and Tripwire Mapping
It’s not enough to cast a wide cybersecurity net and hope you catch the adversaries trying to compromise your data.