Tripwire Resources

Filter resources by product, type or topic:

Tripwire Enterprise Supported Platforms

Datasheet

This datasheet provides a comprehensive list of platforms and devices monitored by Tripwire® Enterprise Java-based agents, as well as its supported browsers, console platforms and backend databases. For Tripwire Axon™ agent platform support, please refer to the Tripwire Axon Agent Platform Support datasheet.

Read More

Tripwire Axon Agent Platform Support

Datasheet

Tripwire Axon™ is a foundational agent technology and platform that enables flexible data collection and resilient communication across a broad range of devices, cloud and virtualized assets. It’s the extensible next generation endpoint data collection and communication platform that delivers uninterrupted visibility, a resilient architecture and improved responsiveness—while augmenting and leveraging industry-leading technology and content for security, compliance and IT operations.

Read More

Book Excerpt: Hacking Point of Sale

Solution Brief

In order to understand all of the different types of threats that may break the payment application (PA), it is first necessary to learn about the internal structure of these systems. The details of concrete implementations may vary from vendor to vendor, but the main design principles remain closely similar due to the narrow specialization of such applications.

Read More

Reducing the Cost of Compliance: The Top Three Effective Strategies

White Paper

Reports such as the Ponemon Institute’s The True Cost of Compliance indicate that proactive investments in compliance can help organizations reduce their consequential costs of non-compliance. But not all compliance investments yield this benefit. Learn what investments and strategies reduce the cost of compliance, and how Tripwire IT security and compliance automation solutions help effectively utilize compliance investments to improve security and protect sensitive data.

Read More

Security Configuration Management For Dummies

Book

Securing your server and network configurations may be the smartest security work you can do. Why? Continually protected and hardened systems keep your data safe, repel exploits and provide measurable confidence.

Read More

Video: Tripwire Controls for the Hybrid Cloud

Video

See how Tripwire helps secure your assets across physical, virtual, private and public cloud environments.

Read More

Tripwire's 1-2-3 Approach to Industrial Cybersecurity

Solution Brief

This brief outlines an approach that allows industrial and critical industrial infrastructure asset operators to select the right starting point based on their unique environment and priorities.

Read More

SANS White Paper

White Paper

See how focusing on the first six CIS Critical Security Controls can protect you from the majority of cyber attacks.

 

Read More

Securing Industrial Control Systems with Tripwire: Assure Reliability, Uptime and Safety

Solution Brief

While concern about reliability and availability is understandable, cyber attacks against critical infrastructure are escalating and could have disastrous implications like public safety.

Read More

Tripwire Log Center: System Requirements 

Datasheet

Learn the proper sizing guidelines and system requirements for deploying Tripwire Log Center in your environment.

Read More

Tripwire Configuration Compliance Manager for Industrial Automation and Rockwell Automation

Solution Brief

Industrial automation and process control systems largely run our world. However, cyber risks to industrial networks, endpoints and control systems are on the rise and protecting highly specialized plant environments can be very challenging for industrial businesses and critical infrastructure. 

Read More

Tripwire and RedSeal: Report and Model Vulnerability Risk through Network Context

Datasheet

Large, complex networks require the implementation and management of thousands of access rules in routers, firewalls and other network infrastructure—across thousands of endpoints. This combination of rules, endpoints and the vulnerabilities the endpoints may exhibit, make risk management a complicated practice in any enterprise.

Read More