Blog
Gaining Network Transparency with Asset Discovery and Compliance for IT/OT
By Faisal Parkar on Mon, 06/24/2024
I recently came across the "Johari Window Model" and thought this would be a good way to gain inspiration to explain the conundrum faced by many cybersecurity customers. The table below shows us the breakdown of the stages that are applicable not just to IT and OT environments but also to other facets of our daily lives.
This model can be applied...
Blog
Integrity and FIM: It’s More than Just Data Security
By Jeff Moline on Tue, 06/18/2024
Integrity is a vital component of any cybersecurity policy, making up one-third of the CIA Triad. However, until recently, the industry has had a limited understanding of the term, using it primarily in the context of data security. Integrity means so much more than this principle alone: it impacts every facet of an information system and can drive an organization's entire security program.
...
Blog
What Is an Axon Agent, and Why Do You Need One?
By Michael Betti on Mon, 04/15/2024
The number of endpoints in an organization often exceeds the number of employees. Managing these often disparate entities is more than a full-time job. Moreover, keeping them secure is equally difficult, yet securing all of your endpoints against cyber threats has become paramount for organizations worldwide. A common oversight that undermines these...
Blog
Exploring Advanced Tripwire Enterprise Capabilities
By John Salmi on Fri, 04/05/2024
In today's digital landscape, it is important for organizations to depend upon the tools they use for cybersecurity. Large businesses can employ many security solutions, practices, and policies that must combine to create a robust and layered security strategy. While many of these tools are important and necessary, organizations often don't use them...
Blog
Know Thyself and Thy Network
By Chris Hudson on Wed, 01/10/2024
The shifting sands of IT make the adage "you never know it all" ever more true as time goes by. I recall days when it felt like you could click through every major directory of Yahoo and know a little something about everything. I was a young man with a voracious reading appetite and an active imagination – both of which were thoroughly outpaced by...
Guide
5 Things Your FIM Solution Should Do for You
File integrity monitoring (FIM) is a critical security control that helps organizations detect system changes in real-time that indicate impacts to compliance and potential cybersecurity incidents, empowering teams to respond rapidly.
FIM is required by many major compliance standards such as North American Electric Reliability Corporation Critical Infrastructure Protection (NERC CIP), the...
Blog
Tripwire Enterprise: Five ‘Other’ Things You Should Know
By Faisal Parkar on Thu, 08/10/2023
Network engineers and security analysts have a lot in common. Both require the ability to not only understand the problems at hand but to ascertain the moments leading to them. A typical scenario would include a request to help with a problem a customer has been experiencing. The person you are trying to assist is probably a member of the IT team in...
Blog
Tripwire Enterprise: Reimagining a Winning Product
By Jeff Moline on Thu, 07/27/2023
How many security products does it take to monitor an organization? Even a small company often finds itself working with multiple monitoring tools to gain visibility into its security posture. This creates multiple blind spots, as a security analyst needs to jump between different tools with different formats and configurations to research a...
Blog
Tripwire Enterprise 9.0: What you need to know
By David Bruce on Wed, 01/04/2023
Tripwire recently announced the release of Tripwire Enterprise (TE), version 9.0, Axon Agent 3.27, and TE Agent 9.0.0. While the full list of features may be viewed on our web site, as a product manager, I wanted to take some time to introduce some of the changes in this new release.
What’s new in Tripwire Enterprise 9.0?
The first significant...
Blog
How FIM Protects Assets in a Borderless World
By Tripwire Guest Authors on Mon, 12/19/2022
Recent advancements in the digital landscape have led to a new kind of paradigm, one where enterprise perimeters are no longer clearly defined or limited. The rapid uptake of remote working, cloud, and IoT led to these prominent shifts, resulting in users, applications, and data no longer residing exclusively within the perimeters of the enterprise....
Blog
Tripwire Enterprise Use Cases – Advanced Monitoring
By David Bruce on Tue, 11/29/2022
Many people remember where they were during historic events. Whether it is a personal, or a public occurrence, it’s just human nature to remember these significant moments. Every profession also has its share of memorable events. In medicine, those who were in the profession will remember where they were when they heard about the first heart...
Blog
Integrity Monitoring Use Cases: Compliance
By David Bruce on Wed, 10/19/2022
What is File Integrity Monitoring?
The IT ecosystems of enterprises are highly dynamic. Typically, organizations react to this volatility by investing in asset discovery and Security Configuration Management (SCM). These core controls enable businesses to compile an inventory of authorized devices and monitor the configurations of those assets. In...
Guide
Beyond the Basics: Tripwire Enterprise Use Cases
Security, compliance, and IT operations leaders need a powerful and effective way to accurately identify security misconfigurations and indicators of compromise. Explore the many ways Tripwire Enterprise can protect your organization with superior security and
continuous compliance.
Guide
Why Integrity Should Be Your Organizing Cybersecurity Principle
While integrity has been a common word in the cybersecurity lexicon for years, its meaning and use have been relatively limited. It may be time to reconsider its central role in security. The reality of always-connected networks, fluid data transfers across cloud and hybrid environments, and broadly deployed endpoints presents an opportunity to take a fresh look at integrity as an organizing...
Guide
Threat Prevention is Foundational
How proper foundational controls help block today’s advanced threats
Guide
File Integrity Monitoring (FIM) Software Buyer's Guide
There’s a lot more to file integrity monitoring than simply detecting change. Although FIM is a common policy requirement, there are many FIM capabilities and processes you can elect to implement or not. These can vary from a simple “checkbox” compliance tool to the option to build effective security and operational controls. These decisions directly affect the value your organization gains from...
Guide
The Value of True File Integrity Monitoring
File Integrity Monitoring (FIM) is a technology that monitors for changes in files that may indicate a cyberattack. In many organizations, however, FIM mostly means noise: too many changes, no context around these changes, and little insight into whether a detected change actually poses a risk.
What does file integrity monitoring do? FIM, and often referred to as “change audit” was around long...
Guide
Integrity: The True Measure of Enterprise Security
Federal cybersecurity integrity is often defined as the incorruptibility of data (as part of the CIA triad), and file integrity monitoring (FIM), a control which has become a compliance requirement in standards such as FISMA and PCI DSS. Read the full white paper to learn more.
Blog
What Is FIM (File Integrity Monitoring)?
By David Bisson on Tue, 01/11/2022
Change is prolific in organizations’ IT environments. Hardware assets change. Software programs change. Configuration states change. Some of these modifications are authorized insofar as they occur during an organization’s regular patching cycle, while others cause concern by popping up unexpectedly.Organizations commonly respond to this dynamism by...