Resources

Guide

Beyond the Basics: Tripwire Enterprise Use Cases

Security, compliance, and IT operations leaders need a powerful and effective way to accurately identify security misconfigurations and indicators of compromise. Explore the many ways Tripwire Enterprise can protect your organization with superior security and continuous compliance.
Guide

Zero Trust and the Seven Tenets

Whether you are new to information security, or you’re a long-time practitioner, it seems that “zero trust” is the latest initiative at the top of everyone’s priority list. Special Publication 800-207, created by the National Institute of Standards and Technology (NIST) offers guidance for instituting a zero trust architecture. The document outlines the basic tenets that form the foundation of...
Product Video

Tripwire ServiceNow Demo

The integration between Tripwire Enterprise and ServiceNow creates a workflow for the smooth exchange of system change and security configuration state information with a wide variety of compliance, operations, and reporting/analytics solutions. This combination enables organizations to validate authorized change and immediately determine the efficacy of the change management process. To...
Product Video

Tripwire & Splunk For Security

Learn how you can access high quality security information with the necessary business context to reduce time detecting and responding to threats and violations. With the Tripwire Enterprise App for Splunk Enterprise, you can quickly visualize the overall health of your IT environment by integrating real-time endpoint data from Tripwire into easy-to-implement reports and dashboards with Splunk. ...
On-Demand Webinar

Create Trust in Your Systems with Tripwire Enterprise

94% of unauthorized data access is through compromised servers. 90% of breaches are attributed to known and fixable vulnerabilities. It has never been more important to know your assets and how they’re configured. Organizations are turning to prescriptive guidance from proven sources, such as: The Center for Internet Security’s (CIS) Benchmarks National Institute of Standards and Technology...
Product Video

Intrusion Detection with Tripwire

Watch a short demonstration of RAM scraping: an exceedingly popular technique used by modern intruders in the retail sector to steal millions of credit cards. By watching this video, you'll understand how these attacks work, and also to see how their behavior can be caught and alerted upon with Tripwire Enterprise. ...
Product Video

Malware Analysis with Tripwire Enterprise and Lastline

If you are a user of Security tools, you will be interested in this short (4 minutes) demo. You’ll discover the power of the solution: Tripwire Enterprise endpoint and server monitoring and detection, integrated with Lastline Breach Detection Platform. See how you can greatly reduce the time needed to accurately detect and protect against advanced and persistent threats, from the network edge, to...
Product Video

Tripwire Delivering Security Needs. On Time. For FedEx.

FedEx has become a global leader in package and other types of delivery, with its familiar logo gracing thousands of trucks and planes. But there is so much more complexity in running such a large corporation with enormous security needs. It operates in more than 200 countries, each of which has its own ecommerce and security regulations. Learn how FedEx took its Tripwire Enterprise deployment to...
Product Video

How Tripwire Helped Walgreens Take a Proactive Approach to Security

Walgreens, founded in 1901, is one of the largest pharmacy companies in the U.S., handling online and in-store sales as well as processing the prescription needs of millions of customers. It needed a security solution that would give them an integrated, all-up view into its IT ecosystem. Its Tripwire ExpertOps solution has given the company a much more proactive view and approach to its security...
Product Video

Chi-X Australia: Building Trust on the Back of Tripwire

Chi-X Australia is a securities and derivatives exchange transforming the Australian investment market through a focus on customers and innovation. The company delivers easy, cost-effective access to local and global investment opportunities. As a result, it has need for a scalable, flexible compliance and security solution that can enable it to function effectively around the world. Chi-X needed...
Product Video

AAA: Getting Roadside Assistance from Tripwire

Tim Masey, Director of Enterprise Information Security at AAA, shared his company’s PCI journey: beginning with a small implementation of Tripwire, then running into roadblocks by Management for the expansion of products, and eventually moving forward with the implementation of Tripwire’s policy driven dashboards, rules and tasks for over 500 servers.
Guide

Why Integrity Should Be Your Organizing Cybersecurity Principle

While integrity has been a common word in the cybersecurity lexicon for years, its meaning and use have been relatively limited. It may be time to reconsider its central role in security. The reality of always-connected networks, fluid data transfers across cloud and hybrid environments, and broadly deployed endpoints presents an opportunity to take a fresh look at integrity as an organizing...
Guide

How Finance Companies Bank on Tripwire ExpertOps

Finance companies opt for managed services to stay compliant, bolster overburdened security teams, and get ongoing support in keeping their data safe from damaging breaches. The finance sector regularly finds itself on the front lines of emerging attack techniques; attackers commonly search for edge vulnerabilities and test new malware variations against financial systems. However, most breaches...
Guide

Understanding Your Attack Surface: The First Step in Risk-based Security Intelligence

As chief information security officer (CISO), it’s now a job requirement to effectively communicate with your non-technical C-suite and board of directors—preferably not just after there’s been a breach. This is the first in a series of executive white papers designed to share strategies for reducing your attack surface risk as well as how to clearly and objectively communicate your overall security posture to non-technical executives. Download this white paper and learn about: The definition of “attack surface” — and risks associated Design goals of attack surface analytics What non-technical C-suite executives and board members want
Guide

Threat Prevention is Foundational

How proper foundational controls help block today’s advanced threats
Guide

Tripwire 2020 Skills Gap Survey

The skills gap remains one of the biggest challenges within the cybersecurity industry. To gain more perspective on what organizations are experiencing, Tripwire partnered with Dimensional Research to survey 342 security professionals on this issue. This study explores hiring trends, how security teams are changing, and how they plan to address the issue in the face of growing cyber threats. ...
Guide

Visible Ops Security: Four-Phase Approach to FIM File Integrity and Change Management Security

While annual business plans focus on strategic initiatives designed to keep the enterprise competitive or to mitigate risk, it’s the day-to-day operations that consume the most time and resources. For many IT organizations, it seems that just keeping the computers running and the lights on occupies the majority of their time. What can you do to gain control? Control change. When you can...