Resources

Case Study

Two Large Financial Services Organizations

To remain competitive, organizations must be able to quickly adapt to support volatile business demands. For IT organizations, the unprecedented speed that images can be deployed into the cloud also brings complexity. Until the initial baseline of an image is captured, there is the potential for unauthorized modifications to pass undetected. Even without malicious intent, a seemingly insignificant...
Case Study

How Two Leading Energy Companies Protect Their Systems with Tripwire

Tripwire is best known for delivering industry-leading security solutions within enterprise IT, but did you know Tripwire is an established leader in OT environments as well? There’s more need for OT security now than ever, with energy production and distribution systems experiencing an increasing risk of cyberattack as they become remotely accessible via standard internet protocols. The energy...
Case Study

How One IT Operations Team Upgraded its Vulnerability Management with Tripwire ExpertOps

Assessing and managing vulnerabilities is a core cybersecurity practice, but it can put a heavy strain on IT security and operations teams. In many cases, introducing vulnerability management as a service is what’s necessary to overcome the challenge of accumulating vulnerabilities across complex IT environments—especially when time and resources are limited. This was the case for one mid-size U...
Case Study

Major Healthcare Provider Enhances Vulnerability Management Program

Recognized as one of the top healthcare providers in the United States, this organization employs tens of thousands of professionals spread across nearly 500 locations. The provider wins frequent awards for the quality of its services and is regularly recognized for being among one of the highest-rated workplaces in the industry. To further elevate the level of security around the vast volumes of...
Case Study

Global Telcom Declares Victory Over Their Change Management Process

Leading global telecommunications companies have a staggering amount of business and customer data to protect. With operations sprawling the globe and tens of thousands of employees, putting cybersecurity best practices into place requires solutions with the substantial breadth and depth of coverage that can stand up to such a challenge.This major telcom relies on Tripwire Enterprise to detect...
Case Study

Security and Compliance in Federal Agencies: 3 Tripwire Use Cases

Use Cases Ensuring compliance and minimizing Automating manual tasks and enhancing breach detection Monitoring critical assets in the public cloud Tripwire understands the security demands faced by federal government agencies. Security decision makers at these agencies aren’t only tasked with securing operations in a complex threat landscape—they also have to prove regulatory compliance at the...
Case Study

Healthcare Provider Achieves Epic System Integrity for Compliance and Security

This major hospital system in the Midwest region of the United States, ranked among the top 100 hospitals in the nation and top 10 for delivering integrated healthcare, provides comprehensive medical and trauma services and embraces innovative technologies like electronic health record (EHR) systems from Epic to deliver optimal patient care and achieve efficiencies. The hospital also manages Epic...
Case Study

Financial Change Control With Tripwire ExpertOps

Founded over a century ago, this Fortune 100 organization is a world-leading provider of financial services in the academic, research, medical, cultural and governmental fields. With $938 billion in combined assets under management with holdings in more than 50 countries, their IT processes require significant complexity to match the scale of their footprint.It’s often the case that particularly...
Case Study

Leading Nationwide Provider of FDIC-Insured Financial Services

This nationally recognized financial solutions provider offers a set of services that enable smaller banks and other related institutions to compete with the industry’s dominant players. The company’s portfolio of FDIC-insured solutions enables its members and other key constituents to offer innovative services that otherwise might be too difficult or too costly to provide on their own.Continuous...
Product Video

Watch a Demo of Tripwire File Integrity Manager

Detecting change in your IT environment is a foundational control necessary to ensure that assets are maintained successfully and securely. Tripwire's suite of essential security controls allows you shorten the time it takes to catch threats, anomalies, and suspicious changes. This video demonstrates how file integrity monitoring can help enhance the overall security and risk management of your...
Product Video

Watch a Demo of Tripwire IP360

Managing the huge number of patches and updates issued by system vendors can seem like an impossible task. Tripwire IP360 allows you to automatically identify assets on your network and their associated vulnerabilities. It then provides granular risk scores based on the severity of the security risk, the ease of exploitation, and the age of the vulnerability. This enables you to direct your...
Case Study

Chi-X Australia Australian Equity Trading Exchange Operator

As a self-described “innovator,” Sydney-based Chi-X Australia is turning the Australiansecurities market landscape on its head. For the first time ever, Australian investors arebeing given a compelling alternative to the ASX, the country’s predominant exchangesince the mid-1980s. Chi-X has gone from a fledging startup in 2011 to now handlingregularly up to over 29% of all on-exchange equity trades...
Case Study

Tripwire and Astro Making Best Practices a Daily Show

Assessing and managing vulnerabilities is a core cybersecurity practice, but it can put a heavy strain on IT security and operations teams. In many cases, introducing vulnerability management as a service is what’s necessary to overcome the challenge of accumulating vulnerabilities across complex IT environments—especially when time and resources are limited.This was the case for one mid-size U.S....
Product Video

Enterprise Vulnerability Management in the Cloud

See how other organizations have simplified and automated compliance reporting processes, risk scoring and prioritized remediation efforts.
Product Video

Watch a Demo of Tripwire Enterprise

Point of sale attacks are on the rise and securing POS devices cannot be a generic effort. This video shows how Tripwire addresses POS threat protection.
Product Video

Watch a Demo of Tripwire Enterprise

Compliance frameworks are notoriously dense and complex, making them difficult to put into action. Compliance is also time-consuming—especially if you’re still attempting manual configuration of your systems, applications, databases and cloud assets. Manual configuration is error-prone and immediately out of date the moment an assessment ends. And a lack of compliance can result in failing audits,...
Blog

Ransomware attack blamed for closure of all 7-Eleven stores in Denmark

Ransomware is to blame for the closure of all 175 7-Eleven stores in Denmark on Monday. The retailer closed all of its stores in Denmark after its cash registers and payment systems were brought down in the attack. Initially, 7-Eleven's Danish division did not say that ransomware was responsible for its problems, simply describing the incident as...
Blog

Cyber Threats – The New Norm in Data Security

“Data: We have never had so much of it, and it has never been so challenging to protect.” These are some of the opening words in the new survey published by ISMG and Fortra in the ‘Data Security Survey 2022’. The survey explores how COVID19 has permanently changed how CISOs approach Data Security. It is an important study because it recognises...