Tripwire Assets & Resources
Maintain the Security of Electronic Medical Record Systems
Electronic Medical Record (EMR) systems bring great benefits to the healthcare providers by enabling optimal care and automated workflows to address treat the patients effectively. EMRs are also a prime target for cyber attacks.
Defending Against Risking Cyber Attacks on Pharmaceutical Companies
Compliance and Integrity Monitoring for EMR Systems
Given the sensitive information EMRs contain, privacy and security are high priority. This is reflected in HIPAA Privacy and Security rules. Tripwire’s integrity monitoring and SCM solutions help healthcare organizations maintain compliance.
Tripwire Demo: Protecting Your Electronic Health Record Security System
Major Healthcare Provider
Learn why this large, top-rated healthcare provider opted for Tripwire® IP360™, with Tripwire Security Intelligence Hub for advanced analytics, and how the solutions are used in this large-scale deployment.
Major Healthcare Provider
Learn how this hospital system used Tripwire to achieve high integrity of Epic data.
Security Check up for Healthcare Providers
Learn the top three proactive security best practices to prevent an EHR breach.
Walgreens: Adopting Proactive Security with Tripwire
Walgreens' Director of Global Security and Risk Management Ed Yousfi shares how the company was able to incorporate a more proactive approach to security with the help of Tripwire.
Tripwire Enterprise Integration Plug-in for Remedy AR System
Correlating changes with change requests—and distinguishing authorized and intended changes from unauthorized and unintended ones—doesn't need to be a full-time job. The Tripwire® Enterprise Integration Plug-in for Remedy AR System combines authorized change information managed by the Remedy AR System with Tripwire Enterprise's robust change auditing capabilities.
Tripwire CCM Policies and Platform Support
Tripwire® Configuration Compliance Manager (CCM) automates discovery of all assets within the environment and can apply compliance and security standards to configuration compliance and patch compliance audit.
Are US Federal IT Pros Overconfident in Data Breach Detection Skills?
Tripwire studied confidence vs. knowledge of US federal IT security pros on seven key security controls necessary to detect a data breach. For many controls, IT pros believed they had the information necessary to detect a breach quickly but provided contradictory information about the specific data.
SANS Spotlight: Back to Basics
This white paper, authored in partnership with the SANS Institute, lays out a six-step guide to help you achieve cyber integrity across your entire agency or organization