Resources

Case Study

Payment Processor for Businesses

As a recognized leader in the payment processing sector, this company offers its clients hundreds of secure payment methods across multiple platforms, around the globe. Onan average day it processes tens of millions of mobile, online and in-store transactions in 100+ currencies. After experiencing a security incident that was quickly contained, the company took the opportunity to revamp its entire...
Case Study

Rabobank: A Multinational Banking and Financial Services Company

Netherlands-based Rabobank is a leader in sustainability-oriented banking and has been listed by Global Finance magazine as one of the world’s ten safest banks. Rabobank’s thousands of servers—located in several dozen datacenters distributed around the globe—are critical to every aspect of the bank’s operations. Each system, typically running either Microsoft Windows, Linux or Solaris, is...
Case Study

Two Large Financial Services Organizations

To remain competitive, organizations must be able to quickly adapt to support volatile business demands. For IT organizations, the unprecedented speed that images can be deployed into the cloud also brings complexity. Until the initial baseline of an image is captured, there is the potential for unauthorized modifications to pass undetected. Even without malicious intent, a seemingly insignificant...
Case Study

Tripwire Enterprise Detects Solarwinds Vulnerability

2021 has been a pivotal year for cybersecurity and the emphasis that organizations have placed on its importance. Unfortunately, this push for heightened cybersecurity is reactive by nature, and is the result of a series of increasingly complicated and dangerous cyberattacks. Attacks have been successfully executed on institutions ranging from social media sites to utility plants and are projected...
Case Study

Security and Compliance in Federal Agencies: 3 Tripwire Use Cases

Use Cases Ensuring compliance and minimizing Automating manual tasks and enhancing breach detection Monitoring critical assets in the public cloud Tripwire understands the security demands faced by federal government agencies . Security decision makers at these agencies aren’t only tasked with securing operations in a complex threat landscape—they also have to prove regulatory compliance at the...
Case Study

Global Telcom Declares Victory Over Their Change Management Process

Leading global telecommunications companies have a staggering amount of business and customer data to protect. With operations sprawling the globe and tens of thousands of employees, putting cybersecurity best practices into place requires solutions with the substantial breadth and depth of coverage that can stand up to such a challenge. This major telcom relies on Tripwire Enterprise to detect...
Case Study

Leading Nationwide Provider of FDIC-Insured Financial Services

This nationally recognized financial solutions provider offers a set of services that enable smaller banks and other related institutions to compete with the industry’s dominant players. The company’s portfolio of FDIC-insured solutions enables its members and other key constituents to offer innovative services that otherwise might be too difficult or too costly to provide on their own. Continuous...
Case Study

Healthcare Provider Achieves Epic System Integrity for Compliance and Security

This major hospital system in the Midwest region of the United States, ranked among the top 100 hospitals in the nation and top 10 for delivering integrated healthcare, provides comprehensive medical and trauma services and embraces innovative technologies like electronic health record (EHR) systems from Epic to deliver optimal patient care and achieve efficiencies. The hospital also manages Epic...
Case Study

Tripwire and Astro Making Best Practices a Daily Show

Assessing and managing vulnerabilities is a core cybersecurity practice, but it can put a heavy strain on IT security and operations teams. In many cases, introducing vulnerability management as a service is what’s necessary to overcome the challenge of accumulating vulnerabilities across complex IT environments—especially when time and resources are limited. This was the case for one mid-size U.S...
Case Study

Chi-X Australia Australian Equity Trading Exchange Operator

As a self-described “innovator,” Sydney-based Chi-X Australia is turning the Australiansecurities market landscape on its head. For the first time ever, Australian investors arebeing given a compelling alternative to the ASX, the country’s predominant exchangesince the mid-1980s. Chi-X has gone from a fledging startup in 2011 to now handlingregularly up to over 29% of all on-exchange equity trades...
Datasheet

Tripwire Enterprise Integration Framework

Organizations have continually found new ways to unlock the value of Tripwire Enterprise, adding additional leverage to a valuable strategic business solution. And now you can extend Tripwire Enterprise to achieve better, faster and more cost-effective cyberthreat protection and compliance.
Datasheet

How Tripwire Helps Control Change

A standard enterprise IT environment is typically composed of widely disparate hardware from multiple vendors running a variety of operating systems and can be spread across multiple datacenters, worksites and the cloud. Because of this growing distribution of IT assets and ever-growing sensitivity of data assets, there is an increased need for adherence to industry standards, government...
Case Study

Tripwire Helps Girl Scouts 'Be Prepared' to Meet Growing Security Needs

The Girl Scouts of the USA was founded in 1912 to empower girls and teach values by encouraging participation in a wide variety of new activities. The instantly recognizable motto of “Be Prepared” extends across every aspect of the organization, including its change and compliance management strategies. We don’t approach compliance as an isolated event or as a necessity at the time of an audit –...
Blog

What Is FIM (File Integrity Monitoring)?

Change is prolific in organizations’ IT environments. Hardware assets change. Software programs change. Configuration states change. Some of these modifications are authorized insofar as they occur during an organization’s regular patching cycle, while others cause concern by popping up unexpectedly. Organizations commonly respond to this dynamism by investing in asset discovery and secure...
Blog

Prioritizing Changes: File Integrity Monitoring Tools & Best Practices

What does file integrity mean? There’s not enough time in the day to investigate every system change, which means you need laser-sharp focus to quickly find the greatest risks to your business. However, the ever-evolving capabilities of cyber adversaries—coupled with the dynamic nature of corporate networks—makes security prioritization increasingly difficult. To combat enterprise cyberthreats...
Blog

Quick Guide to Modern Security Configuration Management

Security configuration management is the cybersecurity process of ensuring systems are properly configured to meet security and compliance standards, reducing cyber risk in the process. The practice of detecting and remediating misconfigurations combines elements of integrity monitoring, configuration validation, vulnerability assessment, and system remediation. "The reliability of (Tripwire...