Tripwire, Inc. Company SummaryWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
Company Summary
Tripwire, Inc.

Overview: Tripwire is the leading global provider of IT security and compliance automation solutions that help businesses and government agencies take control of their entire IT infrastructure.

KnowledgeStorm's detailed company reports contain important information including: stock symbols, company size, addresses, and more. You may access this additional information about this company by viewing one of the detailed solution reports or research abstracts listed below.

Solutions offered by Tripwire, Inc..
Research offered by Tripwire, Inc.

10 Steps for Early Incident Detection by Tripwire, Inc.. October 02, 2012 - The earlier a security breach is detected, the faster an organization can recover. View this informative white paper to learn more about the ten steps to faster detection of security incidents. IT security is only as effective as it's response time, so be sure you're prepared for a breach.

  View 10 Steps for Early Incident Detection research abstract

A Pragmatic Approach to SIEM by Tripwire, Inc.. February 08, 2011 - In this paper we will take a look at this disturbing trend and provide useful guidance for maximizing the value of SIEM and log management tools, while focusing on protecting systems and data not on simply checking the compliance check box.

  View A Pragmatic Approach to SIEM research abstract

A Pragmatic Approach to SIEM: Buy for Compliance, Use for Security by Tripwire, Inc.. October 01, 2012 - Consult this informative white paper so you can gain a better understanding of the definition of SIEM and log management tools and what they can do for you. Find out more about the features of SIEM and what you should look for when selecting a product.

  View A Pragmatic Approach to SIEM: Buy for Compliance, Use for Security research abstract

Achieving Compliance in a Virtualized Environment by Tripwire, Inc.. September 2008 - The goal of this paper is to present the unique considerations that virtualization presents to regulatory and standards compliance, and then prescriptively describe how to mitigate risks.

  View Achieving Compliance in a Virtualized Environment research abstract

Addressing Compliance Initiatives with Center for Internet Security Benchmarks by Tripwire, Inc.. January 01, 2009 - This whitepaper details the background you need to build an effective compliance program by understanding benchmarks, the basic building blocks of compliance initiatives. You'll learn about the benchmarks specified by the Center for Internet Security (CIS), which are often used as a starting point for creating a compliance initiative.

  View Addressing Compliance Initiatives with Center for Internet Security Benchmarks research abstract

Automated Compliance: Making the Case and Reaping the Rewards by Tripwire, Inc.. March 30, 2009 - Regulatory compliance is a priority that never goes away for banking institutions. In this podcast, learn about the core competencies of regulatory compliance and the regulatory compliance trends to watch for in 2009.

  View Automated Compliance: Making the Case and Reaping the Rewards research abstract

Automation Makes Perfect: Taking the Time Crunch Out of IT Compliance with Automation by Tripwire, Inc.. August 03, 2010 - Continuous compliance can help you narrow the gap between identifying compliance vulnerabilities and repairing systems to an audit-passing state. Read this paper to learn more.

  View Automation Makes Perfect: Taking the Time Crunch Out of IT Compliance with Automation research abstract

Compliance Policy Management: Continuous Compliance with Tripwire Enterprise by Tripwire, Inc.. February 24, 2011 - Improperly configured physical and virtual IT infrastructure is the leading cause of security breaches. As a result, organizations are subject to an increasing number of complex regulations or standards designed to secure the IT infrastructure.

  View Compliance Policy Management: Continuous Compliance with Tripwire Enterprise research abstract

Configuration and Change Management for IT Compliance and Risk Management by Tripwire, Inc.. November 2007 - This white paper discusses key issues surrounding configuration management and compliance, such as the IT department's need to lower costs, increase management flexibility and control, and increase responsiveness to business needs and requirements.

  View Configuration and Change Management for IT Compliance and Risk Management research abstract

Configuration Assessment: Choosing the Right Solution by Tripwire, Inc.. July 2008 - Check out this white paper to discover how automated configuration assessment solutions like Tripwire Enterprise help ease the burden on IT of achieving and maintaining compliance, securing the IT infrastructure, and generating evidence for mandatory audits.

  View Configuration Assessment: Choosing the Right Solution research abstract

Configuration Audit and Control: 10 Critical Factors to Change and Configuration Management Success by Tripwire, Inc.. October 2008 - As businesses have instituted internal, industry, and government mandated regulatory compliance, the need for audit data to prove conformity has also become a necessity. Read this white paper to learn how configuration audit and control provides a single, independent source for enforcing and reporting on a change policy across an organization.

  View Configuration Audit and Control: 10 Critical Factors to Change and Configuration Management Success research abstract

Continuous Monitoring: Responding to New Threats in More Complex IT Environments by Tripwire, Inc.. February 24, 2012 - Governments today are focusing on the practice of continuous monitoring as a means to providing the much needed balance between data access and protection. In this paper, learn more about continuous monitoring, including what is it and why it’s needed, guidelines for implementing it, key capabilities of an effective solution, and more.

  View Continuous Monitoring: Responding to New Threats in More Complex IT Environments research abstract

Data Protection 2.0: It’s Not Just Names and Numbers Anymore by Tripwire, Inc.. February 08, 2011 - The external forces of advanced threats and compliance obligations, combined with the internal forces of new business initiatives, lead to a complex set of data protec­tion requirements. This paper provides an overview of the many data protection challenges CISOs face and suggests a sequence of five actions to take to address these challenges.

  View Data Protection 2.0: It’s Not Just Names and Numbers Anymore research abstract

E-Guide: Exploring Configuration Changes to Reduce Attacks by Tripwire, Inc.. September 15, 2011 - Configuration changes help organizations with limited IT staff and resources not only mitigate against known threats, but also future attacks. This expert e-guide explains why firms continue to struggle with zero-day vulnerabilities and offers advice on how to lock down systems to eliminate threats posed by high-profile attacks.

  View E-Guide: Exploring Configuration Changes to Reduce Attacks research abstract

E-Guide: IT Decision Checklist: SIMs and Log Management by Tripwire, Inc.. April 30, 2010 - Security information management systems are effective platforms for the collection, analysis and storage of events from a broad range of systems and devices. We’ll outline what you should look for to get the most relevant data from SIMs. Read this paper to find out more.

  View E-Guide: IT Decision Checklist: SIMs and Log Management research abstract

E-Guide: Striving for Better Information Security Intelligence by Tripwire, Inc.. September 15, 2011 - The need for realistic awareness of the threat landscape has led many businesses to expand their investment to broader insight outside the organization, and deeper visibility within. This expert tip explains how to turn data deluge into business opportunity and offers advice on managing threat exposure in complex IT environments.

  View E-Guide: Striving for Better Information Security Intelligence research abstract

Effective Security with a Continuous Approach to ISO 27001 Compliance by Tripwire, Inc.. July 2008 - In this white paper, learn how with Tripwire Enterprise, organizations can quickly achieve IT configuration integrity by proactively assessing how their current configurations measure up to specifications as given in ISO 27001.

  View Effective Security with a Continuous Approach to ISO 27001 Compliance research abstract

Enforcing IT Change Management Policy by Tripwire, Inc.. March 18, 2009 - Read this white paper to learn how to enforce IT Control Management policies effectively by fostering a culture of change and enforcing change management processes resulting in greater auditability, improved quality, and IT infrastructure integrity.

  View Enforcing IT Change Management Policy research abstract

Five Challenges to Continuous PCI DSS Compliance by Tripwire, Inc.. April 14, 2010 - As the Payment Card Industry Data Security Standard (PCI DSS, or PCI) becomes more widely adopted in both the United States and Europe, organizations face five major challenges when navigating the PCI compliance landscape. Read this white paper to learn what they are and how to overcome them.

  View Five Challenges to Continuous PCI DSS Compliance research abstract

Five Challenges to Continuous PCI DSS Compliance by Tripwire, Inc.. February 07, 2011 - As the Payment Card Industry Data Security Standard (PCI DSS, or PCI) becomes more widely adopted in both the United States and Europe, organizations face five major challenges when navigating the PCI compliance landscape.

  View Five Challenges to Continuous PCI DSS Compliance research abstract

Information Security and Multi-Compliance: Avoiding Audit Fatigue with a Single IT Compliance Strategy by Tripwire, Inc.. May 13, 2010 - This Prescriptive Guide provides nine steps that information security managers can use to break the compli­ance blame cycle and build an information security program that more effectively mitigates security risk. Read on to learn more.

  View Information Security and Multi-Compliance: Avoiding Audit Fatigue with a Single IT Compliance Strategy research abstract

Internal Controls Checklist for Corporate Data Protection and Compliance by Tripwire, Inc.. May 09, 2011 - In this expert tip, Eric Holmquist details four key governance items that should be on every enterprise’s internal controls checklist to ensure corporate data protection.

  View Internal Controls Checklist for Corporate Data Protection and Compliance research abstract

Layered Security: Protecting Your Data in Today's Threat Landscape by Tripwire, Inc.. November 15, 2011 - In this white paper, learn how threats have evolved over time, shortcomings of the perimeter-centric approach to security, steps to implementing a layered security approach to security, and much more.

  View Layered Security: Protecting Your Data in Today's Threat Landscape research abstract

Managed Compliance: Streamlining Multiple Compliance Mandates with Visibility, Intelligence, and Automation by Tripwire, Inc.. February 07, 2011 - This paper provides IT security and compliance professionals a roadmap and practical advice for implementing an approach to compliance that helps overcome IT security issues.

  View Managed Compliance: Streamlining Multiple Compliance Mandates with Visibility, Intelligence, and Automation research abstract

Meeting the True Intent of File Integrity Monitoring by Tripwire, Inc.. October 28, 2010 - In this paper, we give an overview of FIM, an explanation of how FIM provides data protection and improves security, and what capabilities FIM must offer to effectively provide that data protection and security.

  View Meeting the True Intent of File Integrity Monitoring research abstract

Mind the Gap: CISOs Work to Narrow the Breach-to-Detection Gap for Better Security by Tripwire, Inc.. February 08, 2011 - Compliance is indeed a conscientious effort toward securing corpo­rate assets. IT organizations have committed much time and money to the cause. Despite security breaches still happening many still fly under the radar. This paper outlines what precautions need to be taken to avoid future security breaches.

  View Mind the Gap: CISOs Work to Narrow the Breach-to-Detection Gap for Better Security research abstract

On Common Ground: Where Compliance and Data Protection Overlap by Tripwire, Inc.. August 03, 2010 - In this white paper, we first explore the landscape in which CISOs now work—the new standards and regulations they face, increased attacks from hackers, and a more complex IT environment that includes virtualized infrastructure and outsourcing.

  View On Common Ground: Where Compliance and Data Protection Overlap research abstract

PCI Basics: What it Takes to Be Compliant by Tripwire, Inc.. February 07, 2011 - This paper discusses the basic requirements of the PCI DSS, with a focus on the administrative and technical elements of the program. It also reviews the validation requirements of the standard and potential sanctions for failure to comply.

  View PCI Basics: What it Takes to Be Compliant research abstract

PCI Compliance: Are UK Businesses Ready? by Tripwire, Inc.. April 09, 2010 - As of September 30, 2010, the Payment Card Industry Data Security Standard (PCI DSS) will apply to organizations in the UK. Recent research reveals that so far only 12 percent of UK organizations that handle credit card data currently have been certified PCI compliant. Read on to learn how your organization should be preparing for September 30th.

  View PCI Compliance: Are UK Businesses Ready? research abstract

PCI Compliant Yesterday. Still Compliant Today? by Tripwire, Inc.. January 29, 2010 - This webcast talks about the need for automated compliance. The webcast answers questions like: Why is PCI compliance necessary? Should PCI regulations be viewed as a final checklist, or a beginning set of best practices? Watch this webcast to learn more.

  View PCI Compliant Yesterday. Still Compliant Today? research abstract

PODCAST: SOX, GLBA and HIPAA: Multiple Regulations, One Compliance Solution by Tripwire, Inc.. August 24, 2009 - What do SOX, GLBA, and HIPPA all have in common? These important regulations all require technical safeguards to protect or guarantee the veracity of critical information. In this Q&A podcast, gain an understanding of the above regulations and discover what capabilities and organization must have in place to address the requirements.

  View PODCAST: SOX, GLBA and HIPAA: Multiple Regulations, One Compliance Solution research abstract

Practical Steps to Achieve and Maintain NERC Compliance by Tripwire, Inc.. December 08, 2008 - This paper describes seven practical steps information security professionals can take to integrate controls into IT production operations, to simultaneously achieve NERC compliance goals, and also IT operational and security goals.

  View Practical Steps to Achieve and Maintain NERC Compliance research abstract

Practical Steps to Mitigate Virtualization Security Risks by Tripwire, Inc.. April 2008 - Read this whitepaper to learn seven practical steps that IT organizations can take to mitigate the unique security challenges of virtualization. While some are directed specifically at virtualized environments, many of these steps are best practices.

  View Practical Steps to Mitigate Virtualization Security Risks research abstract

Protect, Detect, and Correct: What's New in Tripwire Enterprise 8 by Tripwire, Inc.. February 24, 2011 - Configurations that "drift" from compliance, by the accrual of gradual, sometimes minute changes often lead to exploits, audit failures, and unplanned repair time. Worse still, it takes even more time to bring new, fresh, out-of-the-box servers up to a compliant, audit-passing state—sometimes a half a day or more per machine.

  View Protect, Detect, and Correct: What's New in Tripwire Enterprise 8 research abstract

Pulling the Plug on Legacy Log Management by Tripwire, Inc.. April 09, 2010 - When it comes to log management today, CSOs have been left in the lurch. According to this IDG Research Services survey, organizations are poised to “rip and replace” legacy technology to get a better handle on compliance and security. Read on to learn why so many are scrapping their old log management system and starting fresh.

  View Pulling the Plug on Legacy Log Management research abstract

Security-In-Depth Using Integrated Risk-Conscious Controls by Tripwire, Inc.. December 30, 2011 - This white paper explores how your organization can change the way it protects its critical data, combining preventive, detective and corrective controls to stop breaches from happening, detect threats as they arise, and correct settings that introduce security risk or non-compliance. Read now to learn more.

  View Security-In-Depth Using Integrated Risk-Conscious Controls research abstract

Security-In-Depth Using Integrated Risk-Conscious Controls by Tripwire, Inc.. November 09, 2011 - Most organizations seem stuck in the traditional castle-and-moat approach to security. This approach assumes there's a clear boundary between what's inside and outside the organization and that attacks come from external sources. Clearly today's threat environment requires a new approach.

  View Security-In-Depth Using Integrated Risk-Conscious Controls research abstract

Seven Practical Steps for Federal Cyber Security and FISMA Compliance by Tripwire, Inc.. April 27, 2009 - This paper provides seven practical steps any information security organization can take to improve information system security and achieve compliance with relevant regulations, standards and internal security and operational policy.

  View Seven Practical Steps for Federal Cyber Security and FISMA Compliance research abstract

Smart, Visible and Automated: The New Log Management by Tripwire, Inc.. September 28, 2012 - View this informative white paper to learn more about moving to a more advanced risk protection policy. Improve your log management capabilities by implementing functionality with SIEM, file integrity monitoring and more!

  View Smart, Visible and Automated: The New Log Management research abstract

SOX, GLBA and HIPAA: Multiple Regulations, One Compliance Solution by Tripwire, Inc.. August 24, 2009 - SOX, GLBA and HIPAA share a common regulatory compliance thread - the need to use automation to ensure continuous compliance with required IT controls. View this webcast for an overview of each regulation. Also, gain an understanding of the capabilities an organization must have in place to address these requirements.

  View SOX, GLBA and HIPAA: Multiple Regulations, One Compliance Solution research abstract

Sustaining Sarbanes-Oxley Compliance: Best Practices to Mitigate Risk, Automate Compliance, and Reduce Costs by Tripwire, Inc.. January 08, 2008 - To successfully sustain compliance, organizations must implement best practices to ensure IT systems not only achieve a known and trusted state but they also maintain that state. Check out this white paper to learn how Tripwire solutions enable organizations to achieve and sustain SOX compliance.

  View Sustaining Sarbanes-Oxley Compliance: Best Practices to Mitigate Risk, Automate Compliance, and Reduce Costs research abstract

Tripwire Enterprise and Tripwire Log Center: Integrated for Unparalleled Security by Tripwire, Inc.. February 24, 2011 - Tools for monitoring and protecting the IT infrastructure have evolved into powerful, yet isolated, islands of defense. Because modern threats can take advantage of this isolation, IT security needs a single, comprehensive view of infrastructure security.

  View Tripwire Enterprise and Tripwire Log Center: Integrated for Unparalleled Security research abstract

Tripwire IT Security & Compliance Automation Solutions –Empowering IT Security in an Insecure World by Tripwire, Inc.. February 24, 2012 - In this solution brief, discover how Tripwire IT security and compliance automation solutions provides the visibility, intelligence and automation of IT security controls needed to gain confidence in the protection of your data.

  View Tripwire IT Security & Compliance Automation Solutions –Empowering IT Security in an Insecure World research abstract

Tripwire IT Security and Compliance Automation Solutions: Empowering IT Security by Tripwire, Inc.. September 26, 2012 - View this informative white paper to learn how you can improve your IT security practices. Uncover some of the toughest challenges to maintaining Confidentiality, Integrity, and Availability (CIA). Uncover the sensitive data that needs protection as well as security policies and controls that could lead to a false of security.

  View Tripwire IT Security and Compliance Automation Solutions: Empowering IT Security research abstract

Tripwire Log Center by Tripwire, Inc.. February 08, 2011 - A decade or more ago, logs of events recorded by firewalls, intrusion detection systems and other network devices were considered more of a nuisance than a help. There were too many of them, they weren’t easily collected, and there was no easy way to make sense of which were important.

  View Tripwire Log Center research abstract

Tripwire Log Center Product Brief by Tripwire, Inc.. October 02, 2012 - Consult this informative white paper to learn how log management is helping to better identify threats and deploy security information and event management systems (SIEM). Learn how you can uncover suspicious activities and improve security by reading this asset now.

  View Tripwire Log Center Product Brief research abstract

Tripwire VIA System State Intelligence executive brief by Tripwire, Inc.. September 28, 2012 - What's missing from today's approach to IT security is real-time security intelligence that immediately shows you when you have a security problem, what caused it and what to do about it. This white paper reveals how you can easily utilize cutting-edge technologies to take the guesswork out of identifying the activity that needs your attention.

  View Tripwire VIA System State Intelligence executive brief research abstract

What Changed? Leveraging the Power of Change Auditing by Tripwire, Inc.. December 31, 2008 - Change is necessary not only to keep up with day-to-day corporate evolution, but also to enable IT to transform the organization. As the business continues to demand change, it's in your own best interest to get control of the changes that pose risk. Read this solution brief to learn more about detecting what was changed.

  View What Changed? Leveraging the Power of Change Auditing research abstract

What's Good for Security Is Good for Operations: Why Configuration Assessment Followed by Change Auditing Is Key to Operational Stability by Tripwire, Inc.. July 2008 - Discover why configuration assessment followed by change auditing is key for operational stability, and that gaining visibility into all change to IT systems is the first step toward employing best practices across the organization.

  View What's Good for Security Is Good for Operations: Why Configuration Assessment Followed by Change Auditing Is Key to Operational Stability research abstract

White Paper: SCM: The "Blocking and Tackling" of IT Security by Tripwire, Inc.. November 10, 2011 - In IT security, obvious weaknesses like weak configurations often get overlooked. Yet for hackers, they’re an open door into networks and systems. Learn how security configuration management (SCM), a critical security control, hardens configurations to prevent breaches, and immediately detects and corrects any subsequent changes that weaken them.

  View White Paper: SCM: The "Blocking and Tackling" of IT Security research abstract

  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts