Tripwire Assets & Resources

Filter resources by product, type or topic:

Solution Brief:

Industrial Control Systems (ICS) Security with Tripwire: Assure Reliability, Uptime and Safety

While concern about reliability and availability is understandable, cyber attacks against critical infrastructure are escalating and could have disastrous implications like public safety.

Video:

Industrial Cyber Security - What You Don't Know Might Hurt You

Getting a clear assessment of your assets is the first step toward developing a mature OT network or control system. A well maintained asset inventory allows your organization to quickly manage risk affecting your operations availability, reliability and safety.

White Paper:

Defend Industrial Control Systems with Tripwire's ICS Security Suite

Threats to Industrial Control Systems (ICS) are increasing—a reality that ICS-centric industries have begun to recognize. As a response to the growing need for protection from cyberattacks, the Department of Homeland Security (DHS), National Cybersecurity and Communications Integration Center (NCCIC) and the National Security Agency (NSA) have published Seven Steps to Effectively Defend Industrial Control Systems, a paper aimed at providing practical steps organizations can take to protect their infrastructure.

White Paper:

Preparing for the CCRI Program

Because the Command Cyber Readiness Inspection (CCRI) program increases the stakes for cyber security accountability by holding senior mission commanders at major DOD headquarters, installations and facilities personally responsible for end-to-end cyber readiness, they must be able to develop, maintain and update consistent and reliable cybersecurity situational awareness (SA) of the area for which they are responsible.

Book:

Endpoint Detection and Response For Dummies

Endpoint security means much more than proactively and reactively protecting and hardening devices. To protect the growing attack surface associated with mobile devices, IoT devices and sensors, organizations need continuous endpoint discovery, monitoring, assessment and prioritization to proactively reduce endpoint attack surfaces. In addition, effective endpoint security must leverage threat, vulnerability and intelligence data to better analyze and respond to attacks that do get through defenses. The goal of end point security is a proactive defense that makes it possible to detect and respond to a breach before significant damage occurs.

Solution Brief:

Department of Defense Overview: Integrated Security Controls to Protect Your Organization

Tripwire provides an integrated suite of solutions to help solve security challenges facing organizations within today’s Department of Defense. Tripwire tools have been used within government and military organizations in both tactical and non-tactical environments to ensure system hardening through security configuration management, real-time threat detection with continuous monitoring, and data storage and analytics for faster incident response.

Solution Brief:

Tripwire Managed Services

Tripwire Managed Services understands these challenges and offers multiple levels of service that are compatible with your operational needs and process maturity. Expectations are clearly defined by SLAs, and our services are delivered by certified experts that can respond to your complex requirements and ensure that your security risks are properly managed. 

Get the most out of your team and Tripwire Enterprise. Download this brief and learn how Tripwire Managed Services can pick up the ball so you can stop operating and start analyzing. 

Datasheet:

Tripwire Enterprise and ServiceNow

If you’re looking to improve the visibility into your organization’s security and compliance status, the integration between Tripwire® Enterprise and ServiceNow creates a workflow for the smooth exchange of system change and security configuration state information with a wide variety of compliance, operations and reporting/analytics solutions.

Video:

Tripwire Enterprise with FireEye and iSight

Get a quick demonstration of the integration between Tripwire Enterprise and FireEye Malware Analysis AX and iSight Intelligence, using Tripwire Threat Intelligence Integration.

White Paper:

The Next Generation's Perspective on Combating the Insider Threat

Infosec student proposes a strategy for countering malicious insiders.

Datasheet:

Are You Prepared for the Latest Cyber Attack: WannaCry?

WannaCry is ransomware targeting Microsoft Windows systems. In just one week, it infected millions of computers in 150 countries. The ransom payment system demands are made through Bitcoin and are supported in 28 languages suggesting the significant global target. Once on your system it is very difficult to decrypt your files. It is best to preempt this threat! 

:

Tripwire IP360 for ForeScout CounterACT

Improve real-time visibility over known and unknown devices while automating network access control and threat response.