-
Tyler Reguly
-
Steven Sletten
Blog
Know Thyself and Thy Network
By Chris Hudson on Wed, 01/10/2024
Image
The shifting sands of IT make the adage "you never know it all" ever more true as time goes by. I recall days when it felt like you could click through every major directory of Yahoo and know a little something about everything. I was a young man with a voracious reading appetite and an active imagination – both of which were...
Blog
Tripwire Products: Quick Reference Guide
By Megan Freshley on Mon, 05/15/2023
Image
Here at The State of Security, we cover everything from breaking stories about new cyberthreats to step-by-step guides on passing your next compliance audit. But today we’d like to offer a straight-forward roundup of Fortra's Tripwire product suite. Get to know the basics of Tripwire’s core solutions for file integrity...
Blog
How FIM Protects Assets in a Borderless World
By Tripwire Guest Authors on Mon, 12/19/2022
Image
Recent advancements in the digital landscape have led to a new kind of paradigm, one where enterprise perimeters are no longer clearly defined or limited. The rapid uptake of remote working, cloud, and IoT led to these prominent shifts, resulting in users, applications, and data no longer residing exclusively within the...
Blog
Integrity Monitoring Use Cases: Security
By David Bruce on Thu, 11/03/2022
Image
Compliance is an essential aspect of every organization, and in business terms, it entails ensuring that organizations of all sizes, and their personnel, comply with national and international regulations, such as GDPR, HIPAA, and SOX. When guaranteeing compliance, many firms frequently overlook security.
Gary Hibberd...
Blog
Why Law Firms Should Use Integrity Monitoring to Maintain Confidentiality
By Tripwire Guest Authors on Mon, 10/24/2022
Image
Law firms owe their clients several types of duties, such as the duty of care, duty to provide competent representation, as well as other ethical responsibilities. Their duties even extend to former clients and must be upheld long after they no longer have a formal attorney-client relationship. More specifically, lawyers have a...
Blog
Integrity Monitoring Use Cases: Compliance
By David Bruce on Wed, 10/19/2022
Image
What is File Integrity Monitoring?
The IT ecosystems of enterprises are highly dynamic. Typically, organizations react to this volatility by investing in asset discovery and Security Configuration Management (SCM). These core controls enable businesses to compile an inventory of authorized devices and monitor the configurations...
Product Video
How Tripwire Helped Walgreens Take a Proactive Approach to Security
Mon, 08/15/2022
Walgreens, founded in 1901, is one of the largest pharmacy companies in the U.S., handling online and in-store sales as well as processing the prescription needs of millions of customers. It needed a security solution that would give them an integrated, all-up view into its IT ecosystem. Its Tripwire ExpertOps solution has given the company a much more proactive view and...
Case Study
How One IT Operations Team Upgraded its Vulnerability Management with Tripwire ExpertOps
Assessing and managing vulnerabilities is a core cybersecurity practice, but it can put a heavy strain on IT security and operations teams. In many cases, introducing vulnerability management as a service is what’s necessary to overcome the challenge of accumulating vulnerabilities across complex IT environments—especially when time and resources are limited.
This was the case...
Case Study
Financial Change Control With Tripwire ExpertOps
Founded over a century ago, this Fortune 100 organization is a world-leading provider of financial services in the academic, research, medical, cultural and governmental fields. With $938 billion in combined assets under management with holdings in more than 50 countries, their IT processes require significant complexity to match the scale of their footprint.
It’s often the...
Case Study
Tripwire and Astro Making Best Practices a Daily Show
Assessing and managing vulnerabilities is a core cybersecurity practice, but it can put a heavy strain on IT security and operations teams. In many cases, introducing vulnerability management as a service is what’s necessary to overcome the challenge of accumulating vulnerabilities across complex IT environments—especially when time and resources are limited.
This was the case...
Case Study
Tripwire Helps Girl Scouts 'Be Prepared' to Meet Growing Security Needs
The Girl Scouts of the USA was founded in 1912 to empower girls and teach values by encouraging participation in a wide variety of new activities. The instantly recognizable motto of “Be Prepared” extends across every aspect of the organization, including its change and compliance management strategies.
We don’t approach compliance as an isolated event or as a necessity at...
Blog
What Is FIM (File Integrity Monitoring)?
By David Bisson on Tue, 01/11/2022
Image
Change is prolific in organizations’ IT environments. Hardware assets change. Software programs change. Configuration states change. Some of these modifications are authorized insofar as they occur during an organization’s regular patching cycle, while others cause concern by popping up unexpectedly.
Organizations commonly...