Resources

Datasheet

Monitoring Ephemeral Assets in Dynamic Cloud Infrastructure

In the cloud, flexibility is key. A major driver of cloud infrastructure adoption is the degree to which it can elastically scale with usage needs as they fluctuate from one day to the next. Sharing security responsibilities with the cloud provider can also relieve some of the burdens of busy security teams. But for all the merits of cloud infrastructure’s flexibility, it also means compliance and...
Datasheet

Tripwire Enterprise and Cisco AMP Threat Grid

Overview There is mounting concern at the senior executive and board level regarding cybersecurity, driven by highly visible advanced targeted attacks. These attacks threaten precious IP, valuable customer information, company valuation and trade secrets. To truly protect valuable resources, organizations have to accept the nature of modern networked environments and devices, and start defending...
Datasheet

Tripwire Enterprise and HP ArcSight ESM Integration

SIEMs are the incident detection tool of choice, but as organizations broadly deploy them throughout large distributed networks, IT security teams face a growing challenge: isolating the real threats from the volumes of noise generated by the IT infrastructure. Industry research and practitioners say the best way to reduce that noise is by comparing security events to other trusted sources of...
Datasheet

Tripwire Asset Discovery Appliance

Tripwire® Asset Discovery Appliance discovers all networked hosts, applications and services. By providing a comprehensive view of devices and software on your network, you gain the foundation for effective security configuration management and compliance processes. Only this appliance provides low bandwidth, non-intrusive host and network profiling for use with Tripwire Enterprise. Tripwire...
Datasheet

Automated TISAX Compliance

TISAX, the Trusted Information Security Assessment Exchange, is a mandatory compliance requirement for companies that touch any point of the German automotive supply chain. Its industry-wide enforcement applies to auto manufacturers and OEMs (original equipment manufacturers), but reaches further to encompass development and procurement departments as well: Even if your company isn’t Germany based...
Datasheet

Automating Active Directory Integration with Tripwire Enterprise

Microsoft Active Directory (AD) gives organizations a major advantage in terms of orderly, on demand user credential management. The Tripwire® Enterprise integration with AD allows Tripwire Enterprise to gather group and member information based on existing roles within AD. Without this integration, organizations using security products in tandem with AD can run into excess administrative...
Datasheet

Tripwire Axon

Many organizations have misdiagnosed a critical endpoint security and IT problem, the collection of endpoint data. The mistake is thinking, “We have too much data!” While organizations may have a large volume of data, they are still not collecting complete data, or in some cases not collecting data at all, from the many endpoints in their environment. Many organizations have: Silos of...
Datasheet

Tripwire Enterprise

Security, compliance, and IT operations leaders need a powerful and effective way to accurately identify security misconfigurations and indicators of compromise. Tripwire® Enterprise is the leading compliance monitoring solution, using file integrity monitoring (FIM) and security configuration management (SCM). Backed by decades of experience, it's capable of advanced use cases unmatched by other...
Datasheet

Tripwire Managed Services

Today’s IT and InfoSec Executives are challenged with an ever changing cybersecurity landscape. When combined with the proliferation of new sources of information every day, it can be increasing difficult to maintain and operate technology solutions that are designed protect the organization from risk. Many IT organizations are struggling to revise processes to establish governance practices, but...
Datasheet

Tripwire Remote Operations

Your Tripwire implementation captures data from thousands of systems with millions of unique elements. Figuring out which configurations, security events or changes need your attention can distract from more strategic business tasks—or from using the valuable intelligence it provides to manage IT risk throughout your enterprise. So if you’d like to spend more time managing your business and less...
Datasheet

Comprehensive, Flexible and Complete: Tripwire Training Your Way

At Tripwire, we understand that people learn in different ways and have myriad demands on their time. So Tripwire offers a wide spectrum of training offerings across its product line to get you the knowledge you want and need, delivered in a way that best suits your situation—whether physical classroom training at your site or ours, virtual instructor-led training, through online eLearning courses...
Datasheet

Tripwire’s Solutions for Automated, Continuous PCI Compliance

The Payment Card Industry Data Security Standard (PCI DSS) was created to help organizations that process credit card payments secure the cardholder environment to prevent credit card fraud, cyber threats, and other security vulnerabilities. The latest version, 4.0, provides specific security guidance on handling, processing, transmitting, and storing credit card data to minimize the theft,...
Datasheet

Reducing Your Workload Through Auto-Promotion of Expected Changes

Changes to configurations, files and file attributes across the IT infrastructure are just part of everyday life in enterprise organizations. But hidden within the large volume of daily changes can be a few unauthorized changes that impact the confidentiality, integrity or availability of a system. To protect critical systems and data, you need to detect every change, capture relevant details...
Datasheet

NERC CIP 013 Compliance

More attention is being paid to risks around the supply chain in the bulk electricity system (BES). When third-party vendors introduce new products, software and personnel into a power supplier’s environment, the potential for new cyber risks increases. For this reason, the North American Electric Reliability Corporation (NERC) recently added a new set of requirements to its Critical...
Datasheet

Achieving Resilience While Fulfilling NERC CIP Requirements

Some of our nation’s most critical physical infrastructure is represented by the national Bulk Electric Systems (BES). Today’s digital world relies upon this interconnected network of power generation and transmission systems more than ever. To ensure the reliability and resilience of that network, providers must continually manage threats to the infrastructure, including many that relate to...
Datasheet

NERC CIP Best Practices: The Tripwire Approach

Industrial operators subject to the North American Electric Reliability Corporation Critical Infrastructure Protection (NERC CIP) standard know that achieving compliance is no minor feat, and serious strategic consideration is required to ensure efficient resource use in the compliance process. By meeting NERC CIP compliance, these companies take important steps towards securing their IT/OT...
Datasheet

Tripwire and Eaton

Transmission and Distribution asset owners have to juggle disconnected or disparate tools to satisfy NERC CIP and internal cybersecurity requirements. Specifically for substation automation applications, monitoring the various intelligent electronic devices (IEDs) like relays, RTUs, and connected I/O can prove difficult and time consuming. Tripwire and Eaton offer a unique combination of...
Datasheet

NERC CIP Compliance with Tripwire and NovaTech

Tripwire solutions protect sensitive data and assets from breaches, vulnerabilities, and threats while delivering risk visibility, business context and security business intelligence. The integration between Tripwire and Novatech’s NERC CIP Password, Configuration and Remote Access Management solution brings a consistent approach to the management, auditing and maintenance of secure configurations...
Datasheet

NERC CIP Compliance with Tripwire and RedSeal

The NERC Critical Infrastructure Protection standards are designed to enhance reliability of the electrical supply by securing the connected assets on which that supply relies. When building a program for NERC CIP compliance, registered entities must balance the need to be audit ready with the resources required to achieve and maintain compliance. NERC CIP version 6 increases the amount of work...