Tripwire Assets & Resources
Compliance and Integrity Monitoring for EMR Systems
Given the sensitive information EMRs contain, privacy and security are high priority. This is reflected in HIPAA Privacy and Security rules. Tripwire’s integrity monitoring and SCM solutions help healthcare organizations maintain compliance.
Defending Against Risking Cyber Attacks on Pharmaceutical Companies
Tripwire Demo: Protecting Your Electronic Health Record System
Maintain the Security of Electronic Medical Record Systems
Electronic Medical Record (EMR) systems bring great benefits to the healthcare providers by enabling optimal care and automated workflows to address treat the patients effectively. EMRs are also a prime target for cyber attacks.
Security Check up for Healthcare Providers
Learn the top three proactive security best practices to prevent an EHR breach.
Tripwire Enterprise Integration Plug-in for Remedy AR System
Correlating changes with change requests—and distinguishing authorized and intended changes from unauthorized and unintended ones—doesn't need to be a full-time job. The Tripwire® Enterprise Integration Plug-in for Remedy AR System combines authorized change information managed by the Remedy AR System with Tripwire Enterprise's robust change auditing capabilities.
Tripwire CCM and CyberArk: Seamlessly Integrated to Provide Credential-Protected Scans
Learn how Tripwire® Configuration Compliance Manager (CCM) integrates with CyberArk Application Identity Manager to deliver a centralized, secure management of privileged credentials used for comprehensive vulnerability scans. Privileged credentials (password and SSH keys) used by Tripwire CCM are securely stored and automatically rotated by CyberArk Application Identity Manager, reducing the risk of credentials compromise and simplifying regulatory compliance.
Tripwire CCM Policies and Platform Support
Tripwire® Configuration Compliance Manager (CCM) automates discovery of all assets within the environment and can apply compliance and security standards to configuration compliance and patch compliance audit.
Are US Federal IT Pros Overconfident in Data Breach Detection Skills?
Tripwire studied confidence vs. knowledge of US federal IT security pros on seven key security controls necessary to detect a data breach. For many controls, IT pros believed they had the information necessary to detect a breach quickly but provided contradictory information about the specific data.
Foundational Controls: The Key to Defending Against Cyberattacks
Effectively protect your organization using basic security controls.
Security Execs, It's Time We Had the Integrity Talk
Given the challenges facing those responsible for securing enterprise computing environments, there is no better time to have the integrity talk.
Foundational Controls Buyer's Guide
Learn how to build a solid foundation for your security and compliance programs.