Tripwire Assets & Resources

Filter resources by product, type or topic:

Datasheet:

Tripwire CCM Policies and Platform Support

Tripwire® Configuration Compliance Manager (CCM) automates discovery of all assets within the environment and can apply compliance and security standards to configuration compliance and patch compliance audit.

Datasheet:

Tripwire Configuration Compliance Manager Datasheet

Tripwire® Configuration Compliance Manager (CCM) rapidly audits your environment, increases visibility into asset compliance gaps, reduces unplanned work, and automates compliance policy.

Datasheet:

Tripwire Enterprise System Requirements
and Configuration Guidelines

The Tripwire Enterprise Hardware Configuration Parameters document gives configuration guidance for deploying Tripwire Enterprise. This document gives requirements and recommendations for Small, Intermediate, and Enterprise deployments and such parameters as Usage, CPU type and size, Memory, Storage, OS, and Database.

Solution Brief:

FireEye/iSIGHT 2016 ICS Vulnerability Trends Report

White Paper:

SANS 2017 "State of ICS Security" Survey Report

Case Study:

Keeping the lights on with Verve and Tripwire Enterprise

Datasheet:

Tripwire Connect: Actionable Reporting Made Simple

Understanding security and compliance risks is essential for enterprise-wide security and compliance risk management. CISOs and IT security directors require a foundational level of security along with the ability to demonstrate how it protects the organization’s assets, services and business initiatives. In today’s world, this task is increasingly difficult. The solution is Tripwire® Connect, the visualization and reporting platform purpose-built for Tripwire Enterprise, the industry-leading security configuration management solution.

Book:

Log Management Buyer's Guide

The explosive growth of the SIEM market and analytics capabilities has driven the emergence of a Security Analytics market—and with it, a challenge with data collection. Organizations where the SIEM has traditionally been the single destination are now faced with the challenge of how to deliver the right data to the right destinations, plural, while traditional SIEM licensing models are a poor fit for the requirement to send data to multiple destinations. 

These dynamics around Security Analytics have placed new focus on the foundational control of log management, specifically log collection, storage and forwarding. While the analytics tools have excelled at delivering value, they have not focused on solving the challenges of log collection. These and other forces are driving organizations to reconsider the need for, and best practices of, log management. Foundational controls like log management done well are the cornerstone of secure organizations, and the immense value of analytics can only be realized with reliable data.

This Buyer’s Guide will help you navigate this complex subject, and also provides a useful checklist when it comes time to assess your options. 

Solution Brief:

Tripwire Log Center: Quick Start Services

Tripwire's Quick Start implementations are ideal for new customers with smaller implementations or for larger customers who want to jump-start a larger project with our professional guidance. Quick Start packages reduce your time to value and quickly implement the core capabilities of the latest version of Tripwire Log Center.

Solution Brief:

23 NYCCR 500 and Tripwire Solutions

Solution Brief:

Defending Against Risking Cyber Attacks on Pharmaceutical Companies

Datasheet:

Tripwire Log Center: Security Intelligence Made Simple

Organizations need to detect incidents and respond to threats immediately. They also need to prove compliance with standards and regulations. Tripwire® Log Center®, powered by the new Advanced Log Collector, reliably and securely collects, analyzes and correlates log data from devices, servers, applications and automated security processes to improve security and dramatically simplify compliance. Collected data is analyzed and filtered so only actionable and relevant events are sent to IT security teams or forwarded to a SIEM.