Resources

On-Demand Webinar

ATT&CKing the Center for Internet Security

From the Critical Security Controls to the Community Defense Model, CIS has provided plenty of mappings that show how knowledge from MITRE ATT&CK can be integrated with their offerings. Last year, CIS went a step further, integrating mappings from MITRE ATT&CK into their Benchmarks. This provides a wealth of information to defenders, but too much information can sometimes lead to information...
Datasheet

Tripwire NERC CIP Report Catalog

Fortra’s Tripwire NERC CIP Solution Suite is an advanced offering that augments Tripwire’s tools for meeting 23 of NERC CIP’s 44 requirements. The Tripwire NERC CIP Solution Suite allows you to achieve and maintain NERC CIP compliance with high efficacy and reduced effort. This suite includes continuous monitoring of cyber assets, automated assessment of security, and audit-ready evidence with...
On-Demand Webinar

Insights for Navigating PCI-DSS 4.0 Milestones

With the PCI-DSS 4.0 implementation deadline looming just around the corner in 2024, financial companies have no time to waste when it comes to reaching key compliance milestones. Watch this on-demand webinar presented by Fortra’s Tripwire and BankInfoSecurity.com designed to help you get—and stay—on track for PCI 4.0 compliance. Hear from industry experts on preparing for PCI 4.0 using a simple...
On-Demand Webinar

When Security and Compliance Align: The Perfect Partnership

Every organization wants to be secure in the long term, but compliance mandates mean they often stay focused on the short-term requirements. It’s crucial to go beyond simple checkbox compliance. Organizations must create a partnership between compliance and security if they want to protect their systems and data. Explore the benefits of adopting a security-first approach and how to put one into...
Datasheet

The Egypt Financial Cybersecurity Framework

Central Bank of Egypt (CBE) identified key areas of focus to tailor a cybersecurity framework to the unique requirements of the Egyptian financial sector. This framework will serve as the foundational guidance for cybersecurity capability development within this critical sector. This is the kick-off of a larger-scale effort by the CBE to build a robust and sustainable cybersecurity ecosystem...
Datasheet

Tripwire LogCenter: System Requirements

Determining the proper configuration and resources required for a new log management system can be tricky. Take advantage of Tripwire LogCenter’s software-based deployment to meet current demands and grow capacity when needed. Tripwire LogCenter can collect data from almost any source using standard formats. For in-depth data collection, use the advanced Log Collector Agent.View the platforms...
Datasheet

Tripwire LogCenter Data Collection Capabilities

Tripwire® LogCenter® supports a variety of data collection methods, including agent-based collection using the Tripwire Axon® agent, and agentless collection via syslog, SNMP, WMI, file collectors and remote connectors for Cisco, Check Point and databases. The Tripwire Axon agent available with Tripwire LogCenter supports the following platforms: CentOS Linux 5.3–5.11+ (32- and 64-bit) CentOS...
Product Video

Tripwire ServiceNow Demo

The integration between Tripwire Enterprise and ServiceNow creates a workflow for the smooth exchange of system change and security configuration state information with a wide variety of compliance, operations, and reporting/analytics solutions. This combination enables organizations to validate authorized change and immediately determine the efficacy of the change management process. To...
Product Video

Tripwire & Splunk For Security

Learn how you can access high quality security information with the necessary business context to reduce time detecting and responding to threats and violations. With the Tripwire Enterprise App for Splunk Enterprise, you can quickly visualize the overall health of your IT environment by integrating real-time endpoint data from Tripwire into easy-to-implement reports and dashboards with Splunk. ...
On-Demand Webinar

Create Trust in Your Systems with Tripwire Enterprise

94% of unauthorized data access is through compromised servers. 90% of breaches are attributed to known and fixable vulnerabilities. It has never been more important to know your assets and how they’re configured. Organizations are turning to prescriptive guidance from proven sources, such as: The Center for Internet Security’s (CIS) Benchmarks National Institute of Standards and Technology...
Product Video

Tripwire Threat Intelligence

Hundreds of thousands of new malware are being introduced every day. And half of legacy malware prevention systems are failing to detect zero day threats. Learn how you can better defend against these threats using Tripwire's Adaptive Threat Protection solutions.
On-Demand Webinar

Industrial Cybersecurity - What You Don't Know Might Hurt You

Getting a clear assessment of your assets is the first step toward developing a mature OT network or control system. A well maintained asset inventory allows your organization to quickly manage risk affecting your operations availability, reliability and safety. Industrial environments often need to map assets to NIST, ITIL, ISO, COBIT or process automation standards like ANSI/ISA99-IEC-62443. You can achieve significant efficiency improvement and save time within industrial environments by automating asset management instead of following manual spreadsheet processes. Cyber security experts David Meltzer, Chief Research Officer at Tripwire, Tony Gore, CEO at Red Trident Inc., and John Powell, Senior Critical Infrastructure Engineer at Red Trident Inc., will discuss the practical 1-2-3 basics of industrial cyber security and how to get started automating asset management. Attendees will also learn how to build an effective strategy for protecting industrial assets - networks, endpoints and controllers. Key Takeaways: Learn how to automate and simplify the inventory process and secure your assets Understand what cyber security standards may apply to your unique environment Hear real-world tips on how to prioritize and work across functional silos within your company Receive an industrial cyber security assessment checklist to help gauge your starting point
Product Video

Intrusion Detection with Tripwire

Watch a short demonstration of RAM scraping: an exceedingly popular technique used by modern intruders in the retail sector to steal millions of credit cards. By watching this video, you'll understand how these attacks work, and also to see how their behavior can be caught and alerted upon with Tripwire Enterprise. ...
On-Demand Webinar

Leveraging Change Control for Security

Implementing IT changes is imperative to the infrastructure of a business, but it can also open the door to breaches, viruses and malware, such as ransomware. So, how can organizations manage change effectively, maintain compliance and still reduce security risk? One answer lies in change management across your IT systems. Join Jeff Lawson, Sr. Director, Product Management at Tripwire, and Geoff...
Product Video

Malware Analysis with Tripwire Enterprise and Lastline

If you are a user of Security tools, you will be interested in this short (4 minutes) demo. You’ll discover the power of the solution: Tripwire Enterprise endpoint and server monitoring and detection, integrated with Lastline Breach Detection Platform. See how you can greatly reduce the time needed to accurately detect and protect against advanced and persistent threats, from the network edge, to...
Product Video

Tripwire Delivering Security Needs. On Time. For FedEx.

FedEx has become a global leader in package and other types of delivery, with its familiar logo gracing thousands of trucks and planes. But there is so much more complexity in running such a large corporation with enormous security needs. It operates in more than 200 countries, each of which has its own ecommerce and security regulations. Learn how FedEx took its Tripwire Enterprise deployment to...