Gain Unparalleled Visibility by Combining Solutions from Tripwire and Splunk
Cyberthreats are constantly evolving. Visualize the current security status of your IT environment by adding Tripwire’s deep configuration and change data with IT information stored in Splunk Enterprise.
Department of Defense (DOD) Cybersecurity Compliance
Protecting the Department of Defense (DoD) community is a unique responsibility with unique compliance requirements across a wide variety of platforms and systems. A deep understanding of those requirements is a prerequisite for vendors seeking to support the DoD’s security initiatives and is critical to the success of its mission.
Tripwire has demonstrated its expertise in meeting DoD requirements for nearly two decades, helping over 500 DoD customers evolve as requirements evolve, achieve compliance, and improve cybersecurity. Tripwire compliance solutions cover over 2,000 federally-mandated security compliance OS combinations including NIST 800-53, FISMA, DISA STIGS, and others.
Based on recent work with DoD customers, Tripwire has identified three of the DoD’s top-of-mind compliance requirements that are presenting a variety of hurdles that few DoD partners have the expertise to help agencies overcome. If the following requirements have one thing in common, all three bring both tremendous challenge and promise to the DoD’s cybersecurity mission. Download your copy of the white paper to learn more.
Why Fortra's Tripwire?
Fortra's Tripwire protects the world’s leading organizations against the most damaging cyber attacks. Our solutions work on-site and in the cloud to find, monitor and minimize a wide range of threats without disrupting daily operations or productivity. Think of us as the invisible web of detection that keeps systems safe.
Tripwire IP360 for ForeScout CounterACT
Vulnerability Assessment (VA) is considered a security best practice and is an important part of any modern security program. However, an increasingly mobile enterprise with a proliferation of transient devices, coupled with the speed of today’s targeted attacks, creates new challenges for vulnerability management programs. Tripwire IP360 is a next-generation VA tool. The...
Datasheet
Tripwire Enterprise Integration Framework
Organizations have continually found new ways to unlock the value of Tripwire Enterprise, adding additional leverage to a valuable strategic business solution. And now you can extend Tripwire Enterprise to achieve better, faster and more cost-effective cyberthreat protection and compliance.
Datasheet
How Tripwire Helps Control Change
A standard enterprise IT environment is typically composed of widely disparate hardware from multiple vendors running a variety of operating systems and can be spread across multiple datacenters, worksites and the cloud. Because of this growing distribution of IT assets and ever-growing sensitivity of data assets, there is an increased need for adherence to industry standards,...
Guide
Guide to Mastering Configuration Management
Download this free guide to learn best practices, how to use SCM to stay compliance and implementation steps.
Case Study
Tripwire Helps Girl Scouts 'Be Prepared' to Meet Growing Security Needs
The Girl Scouts of the USA was founded in 1912 to empower girls and teach values by encouraging participation in a wide variety of new activities. The instantly recognizable motto of “Be Prepared” extends across every aspect of the organization, including its change and compliance management strategies.
We don’t approach compliance as an isolated event or as a necessity at...
Blog
What Is FIM (File Integrity Monitoring)?
By David Bisson on Tue, 01/11/2022
Image
Change is prolific in organizations’ IT environments. Hardware assets change. Software programs change. Configuration states change. Some of these modifications are authorized insofar as they occur during an organization’s regular patching cycle, while others cause concern by popping up unexpectedly.
Organizations commonly...
Press Release
Tripwire’s IP360™ Vulnerability Management Solution Awarded 5-Star Review from SC Media
SC Lab testers give Tripwire IP360 top rating, highlighting sophisticated reporting and risk prioritization.
PORTLAND, Ore. – July, 27, 2020 – Tripwire, Inc., a global cybersecurity solutions provider protecting the world’s leading organizations, today announced that its vulnerability management solution Tripwire® IP360™ received a five-star rating by SC Media.
“Vulnerability...
Blog
Prioritizing Changes: File Integrity Monitoring Tools & Best Practices
Tue, 06/30/2020
What does file integrity mean?
There’s not enough time in the day to investigate every system change, which means you need laser-sharp focus to quickly find the greatest risks to your business. However, the ever-evolving capabilities of cyber adversaries—coupled with the dynamic nature of corporate networks—makes security prioritization increasingly difficult.
To combat...
Blog
Quick Guide to Modern Security Configuration Management
Fri, 01/31/2020
Security configuration management is the cybersecurity process of ensuring systems are properly configured to meet security and compliance standards, reducing cyber risk in the process. The practice of detecting and remediating misconfigurations combines elements of integrity monitoring, configuration validation, vulnerability assessment, and system remediation.
"The...
Pagination
- First page
- Previous page
- …
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12