Tripwire Resources

Filter resources by product, type or topic:

Leveraging the Power of File Integrity Monitoring

File integrity monitoring is key to ensuring the IT infrastructure is secure, compliant and operationally optimized. Tripwire® Enterprise provides complete visibility into and an audit trail of all configuration change and integrates with popular change and configuration management tools.

Read More

File Integrity Monitoring (FIM) Buyer's Guide


When you need a file integrity monitoring (FIM) solution, it's important to get the features you need. This Buyer's Guide provides checklists to help you through this process.

Read More

Hacking Point of Sale: Payment Application Architecture & Vulnerabilities

In order to understand all of the different types of threats that may break the payment application (PA), it is first necessary to learn about the internal structure of these systems. The details of concrete implementations may vary from vendor to vendor, but the main design principles remain closely similar due to the narrow specialization of such applications.

Read More

Tripwire Enterprise and Puppet


With Puppet, customers can quickly gain Tripwire Enterprise value by automating the install of Tripwire Enterprise agents.

Read More

Community Bank

Case Study

With most financial institutions ranking security as a top-level concern, banks are seeking ways to protect their IT infrastructure against threats such as data breaches or hacking incidents. Banks are also subject to strict industry standards and…

Read More

Tripwire IP360 App for Splunk Enterprise


Quickly and easily visualize the overall health of your IT environment with the right data and the business context around that data. Tripwire IP360 offers rich host and vulnerability intelligence data, and Splunk provides the means to visualize the data in easy-to-implement dashboards. The combined solution helps deliver unprecedented security visibility for continuous risk assessment, incident investigation and correlation with other data sources through a CIM-compliant Splunk App.

Read More