Resources

Blog

Tripwire Enterprise 9.0: What you need to know

Tripwire recently announced the release of Tripwire Enterprise (TE), version 9.0, Axon Agent 3.27, and TE Agent 9.0.0. While the full list of features may be viewed on our web site, as a product manager, I wanted to take some time to introduce some of the changes in this new release. What’s new in Tripwire Enterprise 9.0? The first significant...
Blog

How FIM Protects Assets in a Borderless World

Recent advancements in the digital landscape have led to a new kind of paradigm, one where enterprise perimeters are no longer clearly defined or limited. The rapid uptake of remote working, cloud, and IoT led to these prominent shifts, resulting in users, applications, and data no longer residing exclusively within the perimeters of the enterprise....
Blog

Choosing the Right Industrial Cybersecurity Framework

It’s no surprise that industrial environments have become increasingly valuable targets for malicious behavior. The State of Security has featured many cybersecurity events across myriad industrial verticals, including but not limited to chemical manufacturing, transportation, power generation and petrochemical. Several of these industries have...
Blog

Highlights From the Tripwire Energy & NERC Compliance Working Group

Recently, Tripwire held its Energy and NERC Compliance Working Group virtual event. Tripwire has customers spanning the entire energy industry, including small, medium, and large city municipals, cooperatives, and investor-owned utilities and energy companies. The information shared in these sessions offered valuable insights for both very mature...
Blog

Tripwire Enterprise Use Cases – Advanced Monitoring

Many people remember where they were during historic events. Whether it is a personal, or a public occurrence, it’s just human nature to remember these significant moments. Every profession also has its share of memorable events. In medicine, those who were in the profession will remember where they were when they heard about the first heart...
Blog

Security Configuration Management Use Cases: Policy Monitoring for Security

In the business world, compliance means making sure that companies of all sizes are meeting the standards set by regulatory or oversight groups in various laws and standards, such as HIPAA, PCI DSS, SOX, and GDPR. Sometimes, an organization will self-impose its compliance by adhering to guidance and frameworks from organizations such as NIST, ISACA,...
Blog

Developing an Effective Change Management Program

Change detection is easy. What is not so easy, is reconciling change. Change reconciliation is where most organizations stumble. What was the change? When was it made? Who made it? Was it authorized? The ability to answer these questions are the elements that comprise change management. Historically, the haste of accomplishing a task consisted of...
Blog

Integrity Monitoring Use Cases: Security

Compliance is an essential aspect of every organization, and in business terms, it entails ensuring that organizations of all sizes, and their personnel, comply with national and international regulations, such as GDPR, HIPAA, and SOX. When guaranteeing compliance, many firms frequently overlook security. Gary Hibberd states that compliance...
Blog

Why Law Firms Should Use Integrity Monitoring to Maintain Confidentiality

Law firms owe their clients several types of duties, such as the duty of care, duty to provide competent representation, as well as other ethical responsibilities. Their duties even extend to former clients and must be upheld long after they no longer have a formal attorney-client relationship. More specifically, lawyers have a duty to not disclose...
Blog

Integrity Monitoring Use Cases: Compliance

What is File Integrity Monitoring? The IT ecosystems of enterprises are highly dynamic. Typically, organizations react to this volatility by investing in asset discovery and Security Configuration Management (SCM). These core controls enable businesses to compile an inventory of authorized devices and monitor the configurations of those assets. In...
Product Video

Tripwire ServiceNow Demo

The integration between Tripwire Enterprise and ServiceNow creates a workflow for the smooth exchange of system change and security configuration state information with a wide variety of compliance, operations, and reporting/analytics solutions. This combination enables organizations to validate authorized change and immediately determine the efficacy of the change management process. To...
Product Video

Tripwire & Splunk For Security

Learn how you can access high quality security information with the necessary business context to reduce time detecting and responding to threats and violations. With the Tripwire Enterprise App for Splunk Enterprise, you can quickly visualize the overall health of your IT environment by integrating real-time endpoint data from Tripwire into easy-to-implement reports and dashboards with Splunk. ...
On-Demand Webinar

Create Trust in Your Systems with Tripwire Enterprise

94% of unauthorized data access is through compromised servers. 90% of breaches are attributed to known and fixable vulnerabilities. It has never been more important to know your assets and how they’re configured. Organizations are turning to prescriptive guidance from proven sources, such as: The Center for Internet Security’s (CIS) Benchmarks National Institute of Standards and Technology...
Product Video

Intrusion Detection with Tripwire

Watch a short demonstration of RAM scraping: an exceedingly popular technique used by modern intruders in the retail sector to steal millions of credit cards. By watching this video, you'll understand how these attacks work, and also to see how their behavior can be caught and alerted upon with Tripwire Enterprise. ...
Product Video

Malware Analysis with Tripwire Enterprise and Lastline

If you are a user of Security tools, you will be interested in this short (4 minutes) demo. You’ll discover the power of the solution: Tripwire Enterprise endpoint and server monitoring and detection, integrated with Lastline Breach Detection Platform. See how you can greatly reduce the time needed to accurately detect and protect against advanced and persistent threats, from the network edge, to...
Product Video

Tripwire Delivering Security Needs. On Time. For FedEx.

FedEx has become a global leader in package and other types of delivery, with its familiar logo gracing thousands of trucks and planes. But there is so much more complexity in running such a large corporation with enormous security needs. It operates in more than 200 countries, each of which has its own ecommerce and security regulations. Learn how FedEx took its Tripwire Enterprise deployment to...
Product Video

How Tripwire Helped Walgreens Take a Proactive Approach to Security

Walgreens, founded in 1901, is one of the largest pharmacy companies in the U.S., handling online and in-store sales as well as processing the prescription needs of millions of customers. It needed a security solution that would give them an integrated, all-up view into its IT ecosystem. Its Tripwire ExpertOps solution has given the company a much more proactive view and approach to its security...
Product Video

Chi-X Australia: Building Trust on the Back of Tripwire

Chi-X Australia is a securities and derivatives exchange transforming the Australian investment market through a focus on customers and innovation. The company delivers easy, cost-effective access to local and global investment opportunities. As a result, it has need for a scalable, flexible compliance and security solution that can enable it to function effectively around the world. Chi-X needed...