Tripwire Assets & Resources

Filter resources by product, type or topic:

White Paper:

Defending Industrial Control Systems with Tripwire

Threats to Industrial Control Systems (ICS) are increasing—a reality that ICS-centric industries have begun to recognize. As a response to the growing need for protection from cyberattacks, the Department of Homeland Security (DHS), National Cybersecurity and Communications Integration Center (NCCIC) and the National Security Agency (NSA) have published Seven Steps to Effectively Defend Industrial Control Systems, a paper aimed at providing practical steps organizations can take to protect their infrastructure.

Case Study:

Idaho Power

Manual audits to check for Sarbanes-Oxley Act and internal control compliance of Idaho Power's servers were eating up too much time. One solution was to test a small percentage of representative servers, but Idaho Power wanted more complete…

Video:

SCM for Dummies Video Trailer

Securing your server and network configurations may be the smartest security effort you can make. Why? Continually protected and hardened systems keep your data safe, repel exploits, and provide measurable confidence.

Infographic:

Real-time Threat Detection with Tripwire SCM Solutions

Tripwire helps organizations of all sizes successfully automate the hardening of their servers, databases and network devices. With information gleaned by TechValidate, learn how our patented, award-winning suite of Security Configuration Management (SCM) products and services are used by satisfied customers worldwide to prevent and detect a variety of security threats.

White Paper:

SANS: Secure Configuration Management Demystified

Security experts and analysts agree that a systematic, enterprise-wide program of secure configuration management is one of the most beneficial security solutions you can implement. It provides an objective, concise measure of your overall  security posture. But it continues to be recognized as one of the “hardest things to accomplish” for IT security teams. This white paper discusses why these controls are so important, how to enable them in manageable, bite-size chunks, and how to get cooperation from your cross-functional IT operations teams.

White Paper:

Security Configuration Management: Getting Back to IT Security Basics

In IT security, obvious weaknesses like weak configurations often get overlooked. Yet for hackers, they’re an open door into networks and systems. Learn how security configuration management (SCM), a critical security control, hardens configurations to prevent breaches, and immediately detects and corrects any subsequent changes that weaken them.

Datasheet:

Tripwire Configuration Compliance Manager Datasheet

Tripwire® Configuration Compliance Manager (CCM) rapidly audits your environment, increases visibility into asset compliance gaps, reduces unplanned work, and automates compliance policy.

Solution Brief:

Replacing Symantec ESM, CCS or CSP with Tripwire Enterprise

Security Configuration Management (SCM) is a foundational security control, placing third in the Council on CyberSecurity's ranking of the top 20 Critical Security Controls. With Symantec's announced end-of-life for their ESM product, learn why now is the time to consider Tripwire® Enterprise, an award-winning, end-to-end continuous SCM solution that provides lower TCO and higher ROI.

:

Security Configuration Management Buyer's Guide

Security Configuration Management exists at the point where IT security and IT operations meet. It’s a software-based solution that combines elements of vulnerability assessment, automated remediation, and configuration assessment. The goal of SCM is to reduce security risks by ensuring that systems are properly configured—hardened—to meet internal and/or regulatory security and compliance standards.

White Paper:

Security Configuration Management: Moving from Praise to Results

A whole host of industry recognized sources, including Gartner, Securosis and SANS have been consistently recommending security configuration management (SCM) as one of the top, if not the top, security controls you can implement to protect your IT infrastructure and data. Surprisingly, even though most organizations agree on its value, few have actually implemented SCM. Why not?

Solution Brief:

Security Configuration Management Executive Brief

:

Prescriptive Guide to Security Reference Architecture

Implementing a security architecture capable of protecting against today’s threats in an always evolving technology environment is a huge challenge. Your biggest challenge may be simply knowing how and where to start. Which controls do you need, how do you choose them, how do you deploy them, how do they work together, and how do they work with operational systems? Equally important, how do you create and grow a security program with the necessary people and processes to build, maintain, manage and improve a resilient security architecture?

The lastest in Tripwire’s Prescriptive Guide series, Security Reference Architecture: A Practical Guide to Implementing Foundational Controls, provides those answers. It gives you a path forward and explains important details and considerations when implementing a security reference architecture, providing guidance on expanding and improving it as you advance the capabilities your security program provides the greater organization.