Tripwire Assets & Resources

Filter resources by product, type or topic:

Self-Guided Demo:

Tripwire Enterprise Free Trial

Download the leading security configuration management and integrity monitoring solution on the market today.

Datasheet:

Flexible Pricing for Elastic Environments

Lower the TCO of your integrity monitoring and security configuration management controls

White Paper:

SANS White Paper

See how focusing on the first six CIS Critical Security Controls can protect you from the majority of cyber attacks.

 

Book:

Foundational Controls Buyer's Guide

Learn how to build a solid foundation for your security and compliance programs.

Datasheet:

Tripwire Enterprise 8.5 Product Brief

Tripwire Enterprise is a security configuration management suite that provides fully integrated solutions for policy, file integrity and remediation management. The suite lets IT security directors and CISOs rapidly achieve a foundational level of security throughout their IT infrastructure and easily demonstrate how it protects the organization’s key assets, services and initiatives. It then continually maintains that level, in spite of the patches, updates, fixes, and application and configuration changes that tend to destabilize security configurations and whittle away at overall organizational security.

White Paper:

Building a Mature Vulnerability Management Program

An enterprise vulnerability management program is best able to reach its full potential when it's built on well established foundational goals that address the information needs of all stakeholders, its output is tied back to the goals of the enterprise, and there is a reduction in the overall risk of the organization. A vulnerability management technology can detect risk, but requires a foundation of people and process to ensure that the program is successful.

Book:

The Executive's Guide to the Top 20 Critical Security Controls

This publication was designed to assist executives by providing guidance for implementing broad baseline technical controls that are required to ensure a robust network security posture.

Book:

Security Configuration Management For Dummies

Securing your server and network configurations may be the smartest security work you can do. Why? Continually protected and hardened systems keep your data safe, repel exploits and provide measurable confidence.

Video:

SCM for Dummies

Two enormous challenges face IT departments of all sizes and industries—hardening systems against increasingly sophisticated cyber threats, and being compliant with regulations. Fortunately, there's a single solution for both: Security Configuration Management (SCM) and there's a smart, easy way to learn all about it.

Solution Brief:

Meeting Federal NIST 800-171 Requirements for Contractors & Others

Infographic:

PCI DSS 3.0 and the 20 Critical Security Controls Infographic

This infographic provides a visual layout of how the PCI DSS 3.0 requirements align with the foundational Top 20 Critical Security Controls. Build greater efficiency in your security program by seeing how one security control can help you meet several security goals.

Tool:

Tripwire IP360 App for Splunk Enterprise

Quickly and easily visualize the overall health of your IT environment with the right data and the business context around that data. Tripwire IP360 offers rich host and vulnerability intelligence data, and Splunk provides the means to visualize the data in easy-to-implement dashboards. The combined solution helps deliver unprecedented security visibility for continuous risk assessment, incident investigation and correlation with other data sources through a CIM-compliant Splunk App.