Resources

Blog

Choosing the Right Industrial Cybersecurity Framework

  It’s no surprise that industrial environments have become increasingly valuable targets for malicious behavior. The State of Security has featured many cybersecurity events across myriad industrial verticals, including but not limited to chemical manufacturing, transportation, power generation and petrochemical. Several of these industries have taken...
Blog

Highlights From the Tripwire Energy & NERC Compliance Working Group

Recently, Tripwire held its Energy and NERC Compliance Working Group virtual event. Tripwire has customers spanning the entire energy industry, including small, medium, and large city municipals, cooperatives, and investor-owned utilities and energy companies. The information shared in these sessions offered valuable insights for both very mature...
Blog

Tripwire Enterprise Use Cases – Advanced Monitoring

Many people remember where they were during historic events. Whether it is a personal, or a public occurrence, it’s just human nature to remember these significant moments.  Every profession also has its share of memorable events.  In medicine, those who were in the profession will remember where they were when they heard about the first heart...
Blog

Security Configuration Management Use Cases: Policy Monitoring for Security

In the business world, compliance means making sure that companies of all sizes are meeting the standards set by regulatory or oversight groups in various laws and standards, such as HIPAA, PCI DSS, SOX, and GDPR. Sometimes, an organization will self-impose its compliance by adhering to guidance and frameworks from organizations such as NIST, ISACA, ISO...
Blog

Developing an Effective Change Management Program

Change detection is easy. What is not so easy, is reconciling change. Change reconciliation is where most organizations stumble. What was the change? When was it made? Who made it? Was it authorized?  The ability to answer these questions are the elements that comprise change management. Historically, the haste of accomplishing a task consisted of a...
Blog

Integrity Monitoring Use Cases: Compliance

What is File Integrity Monitoring? The IT ecosystems of enterprises are highly dynamic. Typically, organizations react to this volatility by investing in asset discovery and Security Configuration Management (SCM). These core controls enable businesses to compile an inventory of authorized devices and monitor the configurations of those assets. In...
On-Demand Webinar

Create Trust in Your Systems with Tripwire Enterprise

94% of unauthorized data access is through compromised servers.  90% of breaches are attributed to known and fixable vulnerabilities.  It has never been more important to know your assets and how they’re configured. Organizations are turning to prescriptive guidance from proven sources, such as: The Center for Internet Security’s (CIS) Benchmarks National Institute of Standards and Technology’s ...
Product Video

Chi-X Australia: Building Trust on the Back of Tripwire

Chi-X Australia is a securities and derivatives exchange transforming the Australian investment market through a focus on customers and innovation. The company delivers easy, cost-effective access to local and global investment opportunities. As a result, it has need for a scalable, flexible compliance and security solution that can enable it to function effectively around the world. Chi-X needed...
Product Video

AAA: Getting Roadside Assistance from Tripwire

Tim Masey, Director of Enterprise Information Security at AAA, shared his company’s PCI journey: beginning with a small implementation of Tripwire, then running into roadblocks by Management for the expansion of products, and eventually moving forward with the implementation of Tripwire’s policy driven dashboards, rules and tasks for over 500 servers.
Case Study

How WFEC Brings Power to Half a Million Americans with Tripwire Security

Western Farmers Electric Cooperative (WFEC) is an electric generation and transmission cooperative founded in 1941 in Anadarko, Oklahoma. WFEC operates and maintains transmission lines, substations, and switch stations, delivering renewable energy resources to rural Americans in Oklahoma and New Mexico. Its energy resources include a coal-based power plant, natural gas units, wind resources and...
Case Study

Why This U.S. Military Agency Chose Tripwire Enterprise

Ensuring the cybersecurity of the U.S. Military is a unique responsibility with unique compliance requirements across a wide variety of platforms and systems. As a key component of the Federal Government’s overall data and system integrity protections, meeting the Defense Information Systems Administration Security Technical Implementation Guide (DISA STIG) file integrity monitoring (FIM)...
Case Study

Tripwire helps Verifone ensure secure operations around the world

San Jose, California-based Verifone is a leading enabler of electronic payment transactions and point-of-sale services. With over 29 million devices and terminals deployed across more than 150 countries, Verifone’s clients include some of the world’s best- known retail brands, financial institutions and payment providers. Delivering the services necessary for Verifone’s employees to support the...
Case Study

Major Banking Institution Case Study

This multinational banking institution has been around for over 100 years, dedicated to helping a customer base of over 20 million people in countries all over the world. In order to serve such a large customer base and keep financial services at competitive rates, they’ve taken advantage of the latest in cloud technology to reduce the operating costs of their IT infrastructure and outward-facing...
Case Study

How Two Leading Energy Companies Protect Their Systems with Tripwire

Tripwire is best known for delivering industry-leading security solutions within enterprise IT, but did you know Tripwire is an established leader in OT environments as well? There’s more need for OT security now than ever, with energy production and distribution systems experiencing an increasing risk of cyberattack as they become remotely accessible via standard internet protocols. The energy...
Case Study

Payment Processor for Businesses

As a recognized leader in the payment processing sector, this company offers its clients hundreds of secure payment methods across multiple platforms, around the globe. Onan average day it processes tens of millions of mobile, online and in-store transactions in 100+ currencies. After experiencing a security incident that was quickly contained, the company took the opportunity to revamp its...
Case Study

Rabobank: A Multinational Banking and Financial Services Company

Netherlands-based Rabobank is a leader in sustainability-oriented banking and has been listed by Global Finance magazine as one of the world’s ten safest banks. Rabobank’s thousands of servers—located in several dozen datacenters distributed around the globe—are critical to every aspect of the bank’s operations. Each system, typically running either Microsoft Windows, Linux or Solaris, is...
Case Study

Two Large Financial Services Organizations

To remain competitive, organizations must be able to quickly adapt to support volatile business demands. For IT organizations, the unprecedented speed that images can be deployed into the cloud also brings complexity. Until the initial baseline of an image is captured, there is the potential for unauthorized modifications to pass undetected. Even without malicious intent, a seemingly insignificant...