See it, Stop It and Monitor It From the Executive Office to the Shop Floor
Tripwire industrial solutions help asset owners and operators strengthen and maintain secure, functioning, and resilient critical infrastructure throughout the Critical Infrastructure Sectors defined by DHS. Whether your security strategy is driven by complex compliance standards such NIST, DISA or NERC CIP, your agency seeks to follow industry best practices such as the Center for Internet Security’s CIS Controls, or even if you’re just beginning to explore how to implement cybersecurity strategies for your OT environment, Tripwire offers a suite of trusted security solutions for your industrial control systems.
Tripwire provides deep visibility through a comprehensive suite of highly integrated products that detect cyber threats and breaches, prevent future incidents by discovering and prioritizing risks, and continuously monitor to help keep your security program on track. Across dispersed on-premises deployments, hybrid cloud architectures and industrial control systems, our known and trusted IT/OT security capabilities are well suited for complex environments in the nation’s critical infrastructure sectors.
Trusted across the DoD, numerous intelligence agencies and their mission partners, nearly every federal department, and in most of the independent agencies as well as components of the Legislative and Judicial branches, Tripwire offers over 20 years of experience in leading global cybersecurity solutions—and over 100 years in supporting the government’s critical infrastructure sectors.
The Three Principles of ICS Security
- Visibility: You need to know what’s on your network to secure it. Tripwire solutions deliver superior visibility and asset detection, reading 135 industrial protocols and mapping protocol communication patterns.
- Prevention: Tripwire solutions enforce security controls to harden your ICS against anomalous behavior and keep you compliant with standards such as NERC CIP and IEC 62443.
- Monitoring: Tripwire solutions are non disruptive while reading configuration and log changes, and provide actionable alerts in real time so you always know what’s happening on your network
Tripwire compliance policies support the frameworks of over 42 entities, including:
Tripwire Industrial Visibility
Tripwire Industrial Visibility gathers asset inventory and threat data to improve the safety and availability of your OT environment. It does so by analyzing network traffic and conducting protocol deconstruction to inventory assets, create network topology, and more. It’s fluent in over 135 of the native industrial protocols commonly found in ICS—the highest number covered by any solution in the industry—making sense of the floods of data produced by your entire range of IIoT connected industrial devices.
Tripwire Industrial Visibility analyzes network communication by listening through mirror or SPAN ports of your industrial switches, interpreting and dissecting protocols without disrupting normal operations. Legacy OT networks can be sensitive to latency and bandwidth change—which is why Tripwire Industrial Visibility uses agentless monitoring to help keep your network undisturbed.
Tripwire Industrial Visibility provides ICS operators with holistic visibility into the devices and activity on their network. It can detect controller configuration and mode changes, comes with event logging capabilities for trending/dashboards, and performs threat modeling to help you keep your most sensitive assets out of intruders’ reach. This solution protects the core integrity and cyber resilience of your OT environment, using sophisticated monitoring and detection to keep you operating at peak availability and uptime.
Tripwire Enterprise is an industry leading security configuration management (SCM) suite that provides a full integrated solution for configuration policy, file integrity, and remediation management. With compliance polices that support the frameworks of more than 42 entities, the suite lets IT and OT cybersecurity, compliance and IT/OT operations teams rapidly achieve a foundational level of security throughout their IT and OT infrastructures by reducing the attack surface, increasing system integrity and delivering continuous compliance.
The suite has an unprecedented number of configuration policies from regulatory and industry guidelines, such as NIST 800-82, NERC CIP, IEC-62443, RMF Building Automation mandates, and many others. To help provide holistic visibility to which assets are running within your ICS, Tripwire Enterprise integrates with Rockwell Automation FactoryTalk AssetCentre, MDT Autosave, and KEPServerEX, as well as industrial protocol support with Modbus TCP and Ethernet/IP CIP. This is also inclusive of leveraging other agentless data collection mechanisms with SNMP and web user interfaces
While your assets in the lower levels of the Purdue model (cell/area zones) may not be suitable for active scanning techniques, devices like HMIs and engineering workstations in the manufacturing zone and DMZ will benefit from an in depth vulnerability scan from a vulnerability management tool like Tripwire IP360™.
Tripwire IP360’s unique scanning methodology produces the most granular and accurate vulnerability score prioritization in the market. The use of multiple scoring systems allows for audience specific reporting, and it offers an open API for custom integrations.
The quality of the data collected is at the heart of any vulnerability management tool. Tripwire IP360 finds more vulnerabilities with greater accuracy… period. And it will show you exactly how it detected every condition. Automated discovery, profiling and scanning save security teams time and resources.
The actionable analytics and reporting available in Tripwire IP360 are backed by our dedicated world class Vulnerability and Exploit Research Team (VERT).
Tripwire Log Center™ collects, analyzes and correlates log data from devices, servers, and applications. Why does this matter in an ICS context? ICS create a staggering amount of data, and Tripwire Log Center helps you cut through the noise and focus only on what matters by pre processing data before filtering it into your security information and event management system (SIEM). This data can be extremely helpful when creating a proactive maintenance strategy—for example it can send an alert if a patch cord is about to fail.
Tripwire Log Center’s passive asset discovery capability allows you to discover previously unidentified assets through analysis of their log data. After discovery, the assets can then be added to your environments for further monitoring.
You can think of Tripwire Log Center as a cyber historian for the industrial network, in that it can capture and analyze log diagnostic and cybersecurity information that helps you stay operational. Log management is a best practice that is referenced by many ICS cybersecurity frameworks and regulations, including IEC62443, NERC CIP and NIST SP 800-82.
Hirschmann EAGLE40 Next Generation Industrial Firewalls
EAGLE40 next generation firewalls deliver a comprehensive cybersecurity solution that ensures maximum protection for production among today’s stringent industrial and process automation systems. Evolving alongside data transfer demands, they include multiple port options with increased bandwidth and encryption capabilities, making the EAGLE40 an ideal firewall solution within machine building and general manufacturing settings, as well as for use across security networks. And by supporting both OSPF dynamic routing and VRRP router redundancy, the EAGLE40 is an economically sound approach to maximize uptime, regardless of network throughput.
With its ruggedized hardware, convection cooled metal housing, and an extensive operating temperature range, it supports the movement towards IT/OT convergence and enables a defense in depth network architecture. The EAGLE40 is a customizable, around the clock solution that meets an infrastructure’s unique cybersecurity demands.
EAGLE40 with embedded Tripwire Industrial Visibility
Tripwire Industrial Visibility extends the same controls IT security teams utilize for minimizing risk in IT environments to OT environments. It solves operational challenges through continuous threat monitoring and advanced logging intelligence, and provides asset visibility and threat management for industrial networks. EAGLE40 firewalls with embedded Tripwire Industrial Visibility software offer a comprehensive industrial cybersecurity solution. With no need to set up a SPAN or mirror port on your switch, the solution simplifies networks by reducing the number of devices (along with their expense) without compromising network security.
Tofino Xenon Industrial Security Appliance
In a class by itself, Tofino Xenon is versatile, rugged, and an ideal solution for protecting the operation of industrial control systems. It is so much more than an industrial firewall—not only can it perform deep packet inspection (DPI) on industrial protocols to ensure, for example, that Modbus traffic is writing and reading to the right set of registers, it can also perform protocol anomaly detection without the need for signature updates, stopping zero day attacks. From initial installation to ongoing operation, its sole purpose is to keep the industrial process running. Network architecture changes are not required, as the Tofino Xenon operates at the data link layer (Layer 2 of the OSI network model) and is therefore transparent on the network as it does not have an IP address. Control engineers can define rules that specify which devices are allowed to communicate and which protocols they may use.
Tripwire offers the only product that can detect a Tofino Xenon—together they provide unparalleled monitoring and detection of anomalous behavior for any industrial automation environment, such as manufacturing plants, oil & gas, water/wastewater, etc.
ICS Professional Services from Tripwire
Many industrial organizations lack the robust security team necessary to implement and maintain rigid ICS security controls. Tripwire offers a range of professional services customized for industrial environments.
Industrial Security Assessments
Conducting a network vulnerability assessment on your industrial organization has changed from a beneficial activity into a necessary one. Tripwire’s skilled team of engineers identifies weaknesses and prioritizes them. We collect data from automated vulnerability scanners, proprietary tools and manual assessment efforts to create a normalized list of identified exposures.
Penetration tests—pen tests—are a type of ethical hacking used to regularly evaluate the security of a network. Our team of highly skilled cybersecurity experts utilizes a combination of tactical and strategic approaches to discover and exploit vulnerabilities in your IT systems through penetration testing and assessing your security program.
Tripwire resident engineers serve as an expert level, dedicated on site resource to manage your Tripwire solution. Our resident engineers are focused on ensuring that you get the most value out of your Tripwire investment as it relates to your business, security and compliance objectives
Tripwire Product Selection Chart
Schedule Your Demo
Ready to learn more? Let us take you through a demo of these industrial security solutions. We’ll show you powerful features and answer any of your questions.