Datasheet
The Egypt Financial Cybersecurity Framework
Central Bank of Egypt (CBE) identified key areas of focus to tailor a cybersecurity framework to the unique requirements of the Egyptian financial sector. This framework will serve as the foundational guidance for cybersecurity capability development within this critical sector. This is the kick-off of a larger-scale effort by the CBE to build a robust and sustainable...
Datasheet
Enterprise Threat Intelligence with Integrated Tripwire Enterprise and Tripwire LogCenter
Tripwire provides out-of-the-box integration of Tripwire® Enterprise, a security configuration management solution, and Tripwire LogCenter®, a complete log management and SIEM solution. By joining these solutions, you can automatically correlate changes detected in Tripwire Enterprise with log and event data captured by Tripwire LogCenter.
Tripwire Patents
Representative Marks/Products
Representative Product Image(s)
Representative U.S. Patents
Tripwire® Enterprise
Image
7,316,016
7,620,715
7,765,460
7,822,724
8,176,158
8,600,996
8,819,491
8,862,941
8,875,129
8,914,341
8,996,684
9,026,646
9,209,996
9,256,841
9,304,850
9,509...
Product Video
Tripwire and Check Point for Unprecedented Protection Against Zero-Day Threats
Mon, 08/15/2022
Tripwire Enterprise for Check Point ThreatCloud Emulation Service delivers advanced and zero day malware detection with threat intelligence to help reduce the time to accurately detect and protect your entire enterprise against advanced threats.
Product Video
Tripwire & Splunk For Security
Mon, 08/15/2022
Learn how you can access high quality security information with the necessary business context to reduce time detecting and responding to threats and violations. With the Tripwire Enterprise App for Splunk Enterprise, you can quickly visualize the overall health of your IT environment by integrating real-time endpoint data from Tripwire into easy-to-implement reports and...
Product Video
Tripwire ServiceNow Demo
Mon, 08/15/2022
The integration between Tripwire Enterprise and ServiceNow creates a workflow for the smooth exchange of system change and security configuration state information with a wide variety of compliance, operations, and reporting/analytics solutions. This combination enables organizations to validate authorized change and immediately determine the efficacy of the change management...
On-Demand Webinar
Create Trust in Your Systems with Tripwire Enterprise
Mon, 08/15/2022
94% of unauthorized data access is through compromised servers. 90% of breaches are attributed to known and fixable vulnerabilities. It has never been more important to know your assets and how they’re configured.
Organizations are turning to prescriptive guidance from proven sources, such as:
The Center for Internet Security’s (CIS) Benchmarks
National Institute of...
Product Video
Intrusion Detection with Tripwire
Mon, 08/15/2022
Watch a short demonstration of RAM scraping: an exceedingly popular technique used by modern intruders in the retail sector to steal millions of credit cards. By watching this video, you'll understand how these attacks work, and also to see how their behavior can be caught and alerted upon with Tripwire Enterprise.
...
Product Video
Malware Analysis with Tripwire Enterprise and Lastline
Mon, 08/15/2022
If you are a user of Security tools, you will be interested in this short (4 minutes) demo. You’ll discover the power of the solution: Tripwire Enterprise endpoint and server monitoring and detection, integrated with Lastline Breach Detection Platform. See how you can greatly reduce the time needed to accurately detect and protect against advanced and persistent threats, from...
Product Video
Tripwire Delivering Security Needs. On Time. For FedEx.
Mon, 08/15/2022
FedEx has become a global leader in package and other types of delivery, with its familiar logo gracing thousands of trucks and planes. But there is so much more complexity in running such a large corporation with enormous security needs. It operates in more than 200 countries, each of which has its own ecommerce and security regulations.
Learn how FedEx took its Tripwire...
Product Video
Chi-X Australia: Building Trust on the Back of Tripwire
Mon, 08/15/2022
Chi-X Australia is a securities and derivatives exchange transforming the Australian investment market through a focus on customers and innovation. The company delivers easy, cost-effective access to local and global investment opportunities. As a result, it has need for a scalable, flexible compliance and security solution that can enable it to function effectively around the...
Product Video
AAA: Getting Roadside Assistance from Tripwire
Mon, 08/15/2022
Tim Masey, Director of Enterprise Information Security at AAA, shared his company’s PCI journey: beginning with a small implementation of Tripwire, then running into roadblocks by Management for the expansion of products, and eventually moving forward with the implementation of Tripwire’s policy driven dashboards, rules and tasks for over 500 servers.
Guide
Why Integrity Should Be Your Organizing Cybersecurity Principle
While integrity has been a common word in the cybersecurity lexicon for years, its meaning and use have been relatively limited. It may be time to reconsider its central role in security. The reality of always-connected networks, fluid data transfers across cloud and hybrid environments, and broadly deployed endpoints presents an opportunity to take a fresh look at integrity as...
Guide
Understanding Your Attack Surface: The First Step in Risk-based Security Intelligence
As chief information security officer (CISO), it’s now a job requirement to effectively communicate with your non-technical C-suite and board of directors—preferably not just after there’s been a breach. This is the first in a series of executive white papers designed to share strategies for reducing your attack surface risk as well as how to clearly and objectively communicate your overall security posture to non-technical executives. Download this white paper and learn about: The definition of “attack surface” — and risks associated Design goals of attack surface analytics What non-technical C-suite executives and board members want