Guide
Cybersecurity Is Everyone's Job
Cybersecurity responsibilities can’t fall on security teams alone. Contrary to the common misunderstanding that cyber threats are a technology problem looking for a technology solution, the data clearly and consistently shows that employees are the greatest vulnerability of any organization.But how do other stakeholders—like professionals in HR, sales...
Guide
Climbing Vulnerability Management Mountain
Building out your vulnerability management program is a lot like climbing a mountain. There’s a great deal of planning and work involved, but once you get to the top, it was well worth the journey. Climbing the vulnerability management mountain will be a lot of work, so we’ve outlined the Vulnerability Management Maturity Model to help guide your...
Blog
The Hidden Cost of Oversharing: How Your Social Posts Fuel Doxxing Campaigns
By Kirsten Doyle on Thu, 11/20/2025
Many don’t question what they share online. Others think, what could possibly happen? The answer: “plenty.” We all leave traces. A birthday photo here, a check-in there, a proud post about a promotion. None of it seems dangerous on its own, but online, fragments add up. Each click, tag, or comment starts to paint a fuller picture: one more detailed than most of us know, or would like. Throw in a...
Datasheet
Maintaining the Security and Integrity of Electronic Health Record Systems
The value of electronic health record (EHR) systems is immense. These digital records are designed to be available anytime and anywhere, connecting healthcare providers with patient data. EHRs are a central repository of patient medical histories, medications, diagnoses, immunization dates, allergies, lab results and radiology images. With access to this accurate patient information, providers can...
Datasheet
Tripwire ExpertOps and HIPAA Compliance
The Health Insurance Portability and Accountability Act (HIPAA) was enacted to safeguard Protected Health Information (PHI) by mandating procedures and controls to assure the public that critical and private information is controlled from loss of confidentiality, integrity or availability. With few exceptions, an organization is subject to HIPAA if it exchanges data related to the health care...
Datasheet
The Tripwire HIPAA Solution
The United States Health Insurance Portability and Accountability Act of 1996, or HIPAA, was enacted to safeguard Protected Health Information (PHI) by mandating procedures and controls to assure the public that critical and private information is controlled from loss of confidentiality, integrity or availability. With few exceptions, an organization is subject to HIPAA if it exchanges data...
Datasheet
Compliance and Integrity Monitoring for EMR Systems
The value of electronic medical record (EMR) systems is immense. These digital records are designed to be available anytime and anywhere, connecting healthcare providers with patient data. EMRs are a central repository of patient medical histories, medications, diagnoses, immunization dates, allergies, lab results and radiology images. With this accurate and up to date patient information,...
Blog
3 Years In: How Is AI Doing? SANS Weighs In
By Katrina Thompson on Mon, 12/15/2025
It’s no secret that AI is “here.” It’s been here for three years now, and yet security operators are still figuring out how to use it.That’s the theme of the most recent SANS survey on AI. In the report, we find that despite its popularity, only half of all organizations using AI are using it for cybersecurity. And among those who do use it, 66% say that it still produces too many false positives...
Blog
Securing the Smart Home (and Office)
By Editorial Staff on Mon, 09/28/2015
Today, a segment will air on Crime Watch Daily where Tripwire Senior Security Researcher Craig Young and I reveal on camera how vulnerable smart homes can be when not properly secured. We show firsthand that the key weaknesses in most smart homes are a combination of insecure networks and default configurations, including systems that installers may say are "unhackable." So, what exactly is an IoT...
Guide
Insider Insights for the PCI DSS 4.0 Transition
Is your organization ready for the new PCI DSS 4.0 Standard? To help you make the journey easier and more straightforward, Fortra’s Tripwire gathered strategic implementation advice from top industry insiders.Get detailed guidance on overcoming the challenges posed by each of the PCI DSS 4.0 requirements. Hear from CISOs, cybersecurity analysts,...
Guide
Don’t Get Hooked: How to Recognize and Avoid Phishing Attacks
Improve employee awareness of phishing risks with this full sizephishing prevention infographic. This infographic includes valuable information on:What is phishing?Common phishing techniques and how to recognize themWhat to do if you suspect a phishing scam
We hope you find this tool useful in promoting cybersecurity awareness at your organization! ...
Datasheet
NERC CIP 013 Compliance
More attention is being paid to risks around the supply chain in the bulk electricity system (BES). When third-party vendors introduce new products, software and personnel into a power supplier’s environment, the potential for new cyber risks increases.For this reason, the North American Electric Reliability Corporation (NERC) recently added a new set of requirements to its Critical Infrastructure...
Datasheet
Achieving Resilience While Fulfilling NERC CIP Requirements
Some of our nation’s most critical physical infrastructure is represented by the national Bulk Electric Systems (BES). Today’s digital world relies upon this interconnected network of power generation and transmission systems more than ever. To ensure the reliability and resilience of that network, providers must continually manage threats to the infrastructure, including many that relate to...
Datasheet
NERC CIP Compliance with Tripwire and RedSeal
The NERC Critical Infrastructure Protection standards are designed to enhance reliability of the electrical supply by securing the connected assets on which that supply relies. When building a program for NERC CIP compliance, registered entities must balance the need to be audit ready with the resources required to achieve and maintain compliance. NERC CIP version 6 increases the amount of work...
Datasheet
NERC CIP Compliance with Tripwire and SigmaFlow
The NERC Critical Infrastructure Protection standards are designed to enhance the reliability of the electrical supply by securing the connected assets on which that supply relies. When building a program for NERC CIP compliance, registered entities must balance the need to be audit-ready with the resources required to achieve and maintain compliance. NERC CIP compliance, especially when...
Datasheet
Tripwire Asset Discovery Appliance
Tripwire® Asset Discovery Appliance discovers all networked hosts, applications and services. By providing a comprehensive view of devices and software on your network, you gain the foundation for effective security configuration management and compliance processes. Only this appliance provides low bandwidth, non-intrusive host and network profiling for use with Tripwire Enterprise.
Tripwire...
Datasheet
Tripwire Enterprise and Cherwell
Business/ Technical Challenges
The real problem? Fragmented tools.
Many complex systems to manage
Multiple sources of truth that don’t always match up
With the spike in advanced, zero day and targeted attacks, it’s more difficult than ever to detect them quickly and respond in time—and no one has unlimited resources to address the large number of malicious incidents. It’s now a problem of...
Tripwire IP360 for ForeScout CounterACT
Vulnerability Assessment (VA) is considered a security best practice and is an important part of any modern security program. However, an increasingly mobile enterprise with a proliferation of transient devices, coupled with the speed of today’s targeted attacks, creates new challenges for vulnerability management programs. Tripwire IP360 is a next-generation VA tool. The Tripwire® IP360™ VM...
Why Fortra's Tripwire?
Fortra's Tripwire protects the world’s leading organizations against the most damaging cyber attacks. Our solutions work on-site and in the cloud to find, monitor and minimize a wide range of threats without disrupting daily operations or productivity. Think of us as the invisible web of detection that keeps systems safe.