Tripwire

Displaying 1-40 of 113 results

  • White Papers // Oct 2012

    Security Configuration Management: Getting Back to IT Security Basics

    In IT security, obvious weaknesses like weak configurations often get overlooked. Yet for hackers, they are an open door into networks and systems. Learn how security configuration management (SCM), a critical security control, hardens configurations to prevent breaches, and immediately detects and corrects any subsequent changes that weaken them.

    Provided By Tripwire

  • White Papers // Oct 2012

    Meeting the True Intent of File Integrity Monitoring

    As organizations struggle to pass compliance audits, they often overlook the true intent of the requirements spelled out in those regulations or standards. Lately, this has been the case for the requirement for file integrity monitoring, or FIM. Most organizations use FIM simply to check the checkbox, particularly for PCI...

    Provided By Tripwire

  • White Papers // Oct 2012

    Become PCI Compliant and Secure with Enhanced File Integrity Monitoring

    Many organizations pass a PCI DSS audit, but still find themselves in the news after suffering a security breach. Part of the issue may be that the configuration settings were compliant with the settings specified in the PCI DSS, but only for a point in time. But what happens as...

    Provided By Tripwire

  • White Papers // Sep 2012

    Continuous Monitoring: Responding to New Threats in More Complex IT Environments

    As organizations today face the challenge of protecting their valuable data, they must balance that protection with giving business users and customers access to the data. Yet the threat environment now has more complex, persistent attackers alongside the usual suspects. The computing environment is more complex, too, with services and...

    Provided By Tripwire

  • White Papers // Sep 2012

    Continuous Monitoring: What It Is, Why It Is Needed, and How to Use It

    Continuous monitoring enables information security professionals and others to see a continuous stream of near real-time snapshots of the state of risk to their security, data, the network, end points, and even cloud devices and applications. Assessing security controls as well as ongoing monitoring of security controls are both directly...

    Provided By Tripwire

  • White Papers // Sep 2012

    Own Your Network with Continuous Monitoring

    This white paper produced by the SANS Analyst Program distills continuous monitoring down to its four basic components. It also gives those who want to implement continuous monitoring, but are suffering information overload, a clear path to follow. After reading this paper, you'll understand: Why continuous monitoring has...

    Provided By Tripwire

  • White Papers // Jun 2012

    SCM: The "Blocking and Tackling" of IT Security

    In IT security, obvious weaknesses like weak configurations often get overlooked. Yet for hackers, they're an open door into networks and systems. Learn how security configuration management (SCM), a critical security control, hardens configurations to prevent breaches, and immediately detects and corrects any subsequent changes that weaken them.

    Provided By Tripwire

  • White Papers // Jun 2012

    Security-In-Depth Using Integrated Risk-Conscious Controls

    Most organizations take a perimeter-centric approach to security, assuming most attacks come from outside the organization. Yet there's no longer a clear boundary between what's inside or outside the organization, and attackers range from unhappy employees to well-funded, state-sponsored hackers. Organizations need a new approach to IT security.

    Provided By Tripwire

  • White Papers // Jun 2012

    Security Configuration Management: Foundational Security with Tripwire Enterprise

    SCM provides the most security "bang for the buck" against today's threats, which is why the SANS Institute places so much importance on using it. With Tripwire Enterprise as your SCM solution, that foundational control extends across the enterprise infrastructure.

    Provided By Tripwire

  • White Papers // Jun 2012

    Why Configuration Assessment And Change Auditing Is Key to Operational Stability

    Network administrators and IT managers know that the ramifications of one small change to a company's critical servers or network devices-such as routers, switches, and firewalls-depend on whether the change is desired or not. Without a way to know when change occurs and whether it's desired, not desired, accidental,...

    Provided By Tripwire

  • White Papers // Apr 2012

    Reducing Federal Systems Risk with the SANS 20 Critical Controls

    As attacks on U.S. Federal information systems intensify, it's never been more critical to protect their information. In this white paper, learn why both U.S. and Canadian government agencies are leaning toward the 20CSC rather than FISMA to protect their information systems and valuable data. Specifically, you'll learn: ...

    Provided By Tripwire

  • Case Studies // Apr 2011

    Ocean Freight E-Commerce Solutions

    INTTRA is a leading global provider of E-commerce solutions to the ocean freight industry. Their business challenge is to deliver information services to meet commercial goals of company while containing IT scale and costs, fully engage with what the Tripwire Enterprise solution has to offer without distracting IT team from...

    Provided By Tripwire

  • Case Studies // Feb 2011

    Global Managed Hosting and Cloud Service Provider

    INetU is a managed hosting and cloud service provider with six datacenters in the US. Their business need is to provide security and compliance services to increase revenue automate internal security and compliance monitoring and reporting and sustain and improve reliability and customer satisfaction. INetU turned to Tripwire's industry-leading compliance...

    Provided By Tripwire

  • Case Studies // Feb 2011

    Worldwide IT Infrastructure Services

    Terremark, the leading global provider of IT infrastructure services their business need is to increase security and prevent attacks with improved monitoring and alerting, gain immediate visibility to suspicious events for investigation and mitigation and use a single, flexible solution for managing security and compliance needs. Tripwire Log Center lets...

    Provided By Tripwire

  • White Papers // Nov 2010

    Automation Makes Perfect: Taking the Time Crunch Out of IT Compliance with Automation

    Automation makes compliance part of day-to-day operations, enabling CIOs to shift time to more important things-like a security strategy that protects the business, rather than simply pleases an auditor. Read this exclusive white paper from compliance leader Tripwire to learn how a Protect, Detect, and Correct compliance strategy can give...

    Provided By Tripwire

  • White Papers // Nov 2010

    On Common Ground: Where Compliance and Data Protection Overlap

    Today's CISOs face more challenges than ever, including increased and more sophisticated threats, complex IT environments, decreased budgets, and greater compliance pressures. But these challenges present opportunity. Learn how CISOs can play these challenges to their advantage to meet both data protection and compliance demands.

    Provided By Tripwire

  • White Papers // Nov 2010

    Pulling the Plug on Legacy Log Management

    When it comes to log management today, CSOs have been left in the lurch. According to a new IDG Research Services survey, organizations are poised to "rip and replace" legacy technology to get a better handle on compliance and security. This paper includes key research findings and strategies to overcome...

    Provided By Tripwire

  • White Papers // Nov 2010

    Cyberwar Threats: New Security Strategies for Governments

    Threats posed by cyberwar cannot be defended using the traditional all-or-nothing security that's aimed solely at keeping attackers out of the government enterprise. Learn why that's so, what's needed to tackle the new threats, and why Tripwire's solutions provide the real-time awareness necessary to fight cyberwar.

    Provided By Tripwire

  • White Papers // Nov 2010

    Data Protection 2.0: It's Not Just Names and Numbers Anymore

    Data Protection 2.0: It's Not Just Names and Numbers Anymore Meet this data protection challenge head on with a new way to categorize sensitive data that helps you reduce data breach risk and take more control of your most critical assets. Discover how.

    Provided By Tripwire

  • White Papers // Nov 2010

    Five Challenges for Continuous PCI DSS Compliance

    With adoption of the PCI DSS expanding throughout the United States and into Europe, organizations subject to PCI compliance face several key challenges. Learn more about these challenges, how to address them, and how Tripwire IT security and compliance automation solutions can help.

    Provided By Tripwire

  • White Papers // Nov 2010

    A Pragmatic Approach to SIEM: Buy for Compliance, Use for Security with Anton Chuvakin

    Too often, organizations purchase SIEM and log management solutions to check a compliance checkbox. These organizations miss a huge opportunity to improve security while meeting compliance requirements. In this white paper, security and compliance expert Dr. Anton Chuvakin explains how to take advantage of this opportunity.

    Provided By Tripwire

  • White Papers // Oct 2010

    Managed Compliance: Streamlining Multiple Compliance Mandates with Visibility, Intelligence and Auto

    A perfect storm is brewing, with increasingly complex, persistent cyber threats and more numerous and prescriptive compliance mandates to protect against them. In this white paper, learn how to ride out this storm with automated solutions that reduce threats, meet multi-compliance demands, and help pass audits.

    Provided By Tripwire

  • White Papers // Oct 2010

    Mind the Gap: CISOs Work to Narrow the Breach-to-Detection Gap for Better Security

    What's more important, security or compliance? Most IT shops are focused on compliance but breaches are still happening. A recent study by Verizon Business concludes that evidence of those breaches tends to be right there in log files. But CISOs aren't tapping into that intelligence and many breaches go undetected...

    Provided By Tripwire

  • White Papers // Feb 2010

    Tripwire's Solutions for Automated, Continuous PCI Compliance

    Many organizations today focus their energy on simply passing each PCI audit, losing sight of the main objectives of the PCI DSS - to secure the cardholder data environment. As a result, organizations still suffer security breaches and experience the negative fallout associated with a data compromise. Read this technology...

    Provided By Tripwire

  • White Papers // Feb 2010

    Tripwire Log Center: High Performance Log and Event Management for Security and Compliance

    Enterprise organizations of all sizes need to achieve compliance with regulations and standards and to secure their IT infrastructure and the data it contains. As security breaches continue to rise, this need has never been more critical. Log collection, retention and reporting have become mandatory requirements of almost all regulatory...

    Provided By Tripwire

  • White Papers // Feb 2010

    Tripwire Log Center: Next Generation Log and Event Management

    Tripwire Log Center, a complete log and event management solution, offers sophisticated security event analysis and ultra-efficient log management. With Tripwire Log Center, you can query and search the event database, drill down to investigate suspicious activity, and even use graphical tools to correlate events with an incident and pinpoint...

    Provided By Tripwire

  • White Papers // Feb 2010

    Achieving NERC Compliance Through Tripwire IT Security and Compliance Automation Solutions

    IT organizations in every sector of the energy industry face routine pressure to comply with the requirements of NERC standards, but must do so with limited staff and decreasing budgets. Read this technology brief to learn more about how Tripwire solutions can help quickly achieve IT configuration integrity, immediately identify...

    Provided By Tripwire

  • White Papers // Jan 2010

    Information Security and Multi-Compliance: Avoiding Audit Fatigue with a Single IT Compliance Strategy

    This Prescriptive Guide provides nine steps that information security managers can use to break the compliance blame cycle and build an information security program that more effectively mitigates security risk. Completing the nine steps requires business stakeholders, IT management, and information security management to all mutually support the same...

    Provided By Tripwire

  • White Papers // Jan 2010

    Hassle-free compliance: Make compliance just another part of your processes by taking an operational approach to security

    Does your organization treat compliance as a set of check boxes designed to meet the auditors' requirements? If so, you are wasting a lot of time, money and precious IT resources. This white paper is a roadmap for making compliance a painless, efficient, and routine part of your IT processes.

    Provided By Tripwire

  • White Papers // Jan 2010

    For PCI, the Future is Now: How to comply with the global standard without breaking the bank

    Running scared from an upcoming PCI audit? There's a better way. It's called continuous compliance built directly into every day operations. The result is a virtual elimination of costly (not to mention scary) fire drills, even as credit card standards continue to evolve.

    Provided By Tripwire

  • White Papers // Oct 2009

    HIPAA Security Provisions: Is Your Network Ready for a Physical?

    The security-focused Health Insurance Portability and Accountability Act (HIPAA) federal regulation became effective April 2005, requiring many companies to review the health of their systems that create, receive, transmit or maintain health information. If your company is subject to HIPAA, is it prepared to meet the requirements of the Security...

    Provided By Tripwire

  • Case Studies // Sep 2009

    Tripwire Security Case Study: Aria System

    Aria Systems is the leading provider of subscription billing solutions and offers the only "Monetization Platform" encompassing the full spectrum of Billing and Customer Lifecycle Management services. The challenge was to demonstrate PCI DSS compliance as a Level 1 Merchant, to implement PCI solution quickly and without additional staff and...

    Provided By Tripwire

  • Case Studies // Sep 2009

    Tripwire Passes Blackboard's Configuration Control Test

    Blackboard is a leading provider of e-Learning enterprise software applications, campus commerce systems, and related services to educational organizations. The challenge was to track configuration changes across mission-critical infrastructure, to implement automated detective controls to support IT security and compliance strategies and to increase maturity of change management and compliance...

    Provided By Tripwire

  • Case Studies // Sep 2009

    Using Configuration Control to Meet Compliance and Improve Operations

    CAPITAL Card Services, Inc. is a leading servicer of MasterCard and Visa accounts for financial and non-financial institutions nationwide. The challenge was to become compliant with various regulations, including PCI, to increase and enforce change management processes and discipline and to reduce unplanned work. Tripwire Enterprise provides configuration control to...

    Provided By Tripwire

  • Case Studies // Sep 2009

    Tripwire Helps Put This Student Loan Servicing Company at the Head of Its Class

    EdFinancial Services strives to be best in class by streamlining the student loan delivery process across the life of a loan in a completely digital environment. The challenge was to ensure successful deployment of web content changes, to leverage automated controls to minimize audit overhead and increase change management discipline...

    Provided By Tripwire

  • Case Studies // Sep 2009

    Tripwire Proves Configuration Control Is a Best Seller With Auditors and IT

    Since 1995, MarketLive, Inc. has focused exclusively on providing enterprise-class e-commerce retail technology and services that help mid-sized businesses successfully sell goods and services online. The challenge was to deliver a single PCI compliant solution that serves all clients, to improve change control processes and to reduce unplanned work caused...

    Provided By Tripwire

  • Case Studies // Sep 2009

    Pulte Mortgage Builds a Strong IT Foundation With Tripwire Enterprise

    Pulte Mortgage, LLC has been helping homebuyers turn their dreams of owning a home into reality for over 33 years. The challenge was to satisfy change control demands of SOX regulations, to improve methods for verifying configuration changes and to track change success rates to evaluate staff effectiveness. Tripwire Enterprise...

    Provided By Tripwire

  • Case Studies // Sep 2009

    Keeping Banking Infrastructure Secure With Tripwire Software

    Members of the British and French Rothschild families set up Rothschild Bank AG in Zurich in 1968. The challenge was to attain visibility across a multi-location, multi-platform IT infrastructure, to implement an automated, cost-efficient method for monitoring change activity and to establish accountability through more stringent change and access control....

    Provided By Tripwire

  • Case Studies // Sep 2009

    Tripwire Rings Up Compliance and Fuels Efficiency for This Busy Regional Company

    Starting as a refinery outlet in 1952, Wesco has grown to a regional company that includes wholesale energy division, filling stations, convenience stores, distribution center, training facility and bakery. The challenge was to become PCI compliant with minimal impact to IT staff, to increase and enforce change management processes and...

    Provided By Tripwire

  • Case Studies // Sep 2009

    On-Demand Billing & Customer Services

    Aria Systems provides a SaaS subscription billing and customer lifecycle management platform that helps businesses establish better control of their finances. Their business need is to demonstrate PCI DSS compliance as a Level 1 Merchant, implement PCI solution quickly and without additional staff and improve physical and virtual server configuration...

    Provided By Tripwire

  • Webcasts // Jan 2009

    Achieving PCI Compliance With Enhanced File Integrity Monitoring and Configuration Assessment

    The attendee of this webcast will discover why file integrity monitoring is not only important to PCI DSS specifications, but is also an essential IT control. The presenter will give proven methods for automating compliance that not only satisfy the auditor's checklist but also alerts to non-compliant configurations.

    Provided By Tripwire

  • Webcasts // Jan 2009

    Failing Grade or Honors Graduate? How Educational Institutions Use File Integrity Monitoring to Achieve PCI Compliance

    The number of educational institutions that have suffered a system breach continues to increase. Schools conduct millions of transactions every year, from online tuition pay to cafeteria and bookstore purchases, making them vulnerable to the same electronic break-ins as any major retailer. That's why it is important, and now mandatory,...

    Provided By Tripwire

  • Webcasts // Jan 2009

    Achieving PCI Compliance With Enhanced File Integrity Monitoring

    Compliance with PCI DSS is mandatory for merchants, no matter how many (or few) payment card transactions are processed each year or how much infrastructure is in scope. Failure to comply continues to result in stiff penalties. Even if one pass the first audit there's always next year. That's why...

    Provided By Tripwire

  • Webcasts // Jan 2009

    Does Virtualization Put Security at Risk?

    The cost benefits of virtualization are so great that the current economic situation will drive IT departments to greater adoption of the technology. However, security continues to be of utmost concern, especially as virtualization is used beyond pre-production environments. This webcast discusses the types of virtual environments where security is...

    Provided By Tripwire

  • Webcasts // Jan 2009

    How the Economic Crisis Will Affect IT Security

    The global economic downturn may affect IT departments more than just having to manage under decreased budgets. Sudden acquisitions and mergers that require quick IT integration, opportunistic attacks and phishing, additional and potentially more severe regulations, and the impact of these factors on critical priorities, all place greater emphasis on...

    Provided By Tripwire

  • Webcasts // Jan 2009

    Virtually Compliant: How Virtualization Technologies Impact PCI DSS Compliance

    More and more, organizations are deploying mission-critical applications in virtualized production environments. In many cases, it is without a full understanding of how virtualization impacts compliance and security - including uncertainty over whether or not virtualized systems can be in scope for PCI compliance and what the top security risks...

    Provided By Tripwire

  • Webcasts // Jan 2009

    Staying PCI Compliant in Virtual and Physical Environments

    Many organizations responsible for PCI compliance have stalled adoption of virtualization simply because they do not know if virtual servers are in scope for PCI compliance or how they would be audited. But increasingly, organizations are taking deliberate steps to stay PCI compliant while successfully rolling out virtualization across the...

    Provided By Tripwire

  • Webcasts // Jan 2009

    Insights From an Auditor: Ensuring a Successful PCI Audit

    Appropriate processing and storing of cardholder data has become a very hot issue, especially given recent headlines regarding companies who have suffered expensive and debilitating security breaches. That's why the pressure is on for merchants to become compliant with the Payment Card Industry (PCI) Data Security Standard. But who needs...

    Provided By Tripwire

  • Webcasts // Jan 2009

    SOX Compliance: Reducing Risk and Cost With Tripwire

    While many businesses have completed at least one Sarbanes-Oxley audit, the challenge is in maintaining compliance while keeping associated costs under control. In a business environment facing new and varied regulatory challenges, getting the right tools, processes and policies in place in order to sustain compliance has never been more...

    Provided By Tripwire

  • Webcasts // Jan 2009

    Configuration Audit and Control: 10 Critical Factors to CCM Success

    As businesses have instituted internal, industry and government mandated regulatory compliance, the need for audit data to provide conformity has also become a necessity. However, traditional change management and configuration management tools do not comprehensively address all aspects of the vast configuration details inherent in complex IT infrastructures. Configuration audit...

    Provided By Tripwire

  • Webcasts // Jan 2009

    Improving IT Infrastructure With Change Management

    With more and more enterprise systems moving to virtual IT environments, it is important to take the necessary steps to safeguard the entire enterprise. The presenters describe how virtualization is changing the management of IT environments, and what the organization can do to successfully take advantage of this enterprise-changing technology,...

    Provided By Tripwire

  • Webcasts // Jan 2009

    Virtual Realities: Securing Your Virtualized Environment

    To keep up with their expanding computing needs, more and more companies are turning to virtualization. But as they do, they find very real security concerns. Does virtualization puts one more at risk to security threats? What issues do companies tend to overlook as they secure virtualized environments? The presenters...

    Provided By Tripwire

  • Webcasts // Jan 2009

    Get Compliant, Stay Compliant - Automatically

    Compliance is no longer a one-time event, nor is it the means to an end. It now has much more significance than merely passing an audit. Why? A single failed configuration that goes unnoticed can possibly snowball into an entire data center being non-compliant. In today's complex environment, it is...

    Provided By Tripwire

  • Webcasts // Jan 2009

    An Introduction to Security Visible Ops With Gene Kim

    Based on 10 years of research, the Security Visible Ops methodology describes how to link IT security and operational objectives in four practical steps by integrating security controls into IT operational, software development and project management processes. The attendee of this webcast will discover how the organization can use Security...

    Provided By Tripwire

  • Webcasts // Jan 2009

    How to Manage Virtualization Before It Manages You

    With more and more enterprise systems moving to virtual IT environments, it is important to take the necessary steps to safeguard the entire enterprise. Two industry experts describe how virtualization is changing the management of IT environments, and what the organization can do to successfully take advantage of this enterprise-changing...

    Provided By Tripwire

  • Webcasts // Jan 2009

    PCI for Retailers: Staying Compliant in an Insecure World

    The pressure on retailers to achieve and prove compliance with the Payment Card Industry Data Security Standard (PCI DSS) is intensifying. Servers have been the primary focus of compliance, but now auditors are turning their scope on point of sale systems, which are increasingly vulnerable to security breaches. In the...

    Provided By Tripwire

  • Webcasts // Jan 2009

    Controlling Virtualization Security Risks: Tips From the Experts

    The need for increased computing agility, coupled with the increasing cost and complexity of IT systems, has driven the rapid adoption of virtualization technologies. While virtualization has operational and economic rewards, the reality is that when information security controls are improperly implemented or neglected in virtualized environments, real security risks...

    Provided By Tripwire

  • Webcasts // Jan 2009

    Securing the Power Grid: Automating NERC Cyber Security Compliance

    NERC requirements are designed to ensure that the bulk electric system in North America is reliable and adequate, and that power grids are secure from both external and internal threats. NERC includes more than 160 Critical Infrastructure Protection (CIP) Cyber Security Standards that are mandatory and enforceable, and that relate...

    Provided By Tripwire

  • Webcasts // Jan 2009

    Understanding and Mitigating Security Risks in Virtual Environments

    While virtualization has operational and economic rewards, the reality is that when information security controls are improperly implemented or neglected in virtualized environments, real security risks and exposures can be created faster than ever. The good news is that information security can take some practical steps right away to limit...

    Provided By Tripwire

  • Webcasts // Jan 2009

    A Trusted State of Business: Security Configuration Management and Change Auditing

    In a perfect world, IT security would be simple. There would be one set of guidelines and needs with easily applied best practices to meet those requirements. And everyone will be worry free. But security is anything but simple. People face different threats and demands for differing levels of security....

    Provided By Tripwire

  • Case Studies // Feb 2011

    Worldwide IT Infrastructure Services

    Terremark, the leading global provider of IT infrastructure services their business need is to increase security and prevent attacks with improved monitoring and alerting, gain immediate visibility to suspicious events for investigation and mitigation and use a single, flexible solution for managing security and compliance needs. Tripwire Log Center lets...

    Provided By Tripwire

  • Case Studies // Jul 2009

    Global Provider of Business Process Outsourcing(BPO)

    Sitel business need is to attain a state of standardized audit readiness and compliance across multiple data centers, for meeting PCI DSS requirements, and other forthcoming global regulatory standards and develop multi-tier change and configuration control processes that enables company to meet its goal of providing customers with a low-cost...

    Provided By Tripwire

  • Case Studies // Apr 2011

    Ocean Freight E-Commerce Solutions

    INTTRA is a leading global provider of E-commerce solutions to the ocean freight industry. Their business challenge is to deliver information services to meet commercial goals of company while containing IT scale and costs, fully engage with what the Tripwire Enterprise solution has to offer without distracting IT team from...

    Provided By Tripwire

  • Case Studies // Feb 2011

    Global Managed Hosting and Cloud Service Provider

    INetU is a managed hosting and cloud service provider with six datacenters in the US. Their business need is to provide security and compliance services to increase revenue automate internal security and compliance monitoring and reporting and sustain and improve reliability and customer satisfaction. INetU turned to Tripwire's industry-leading compliance...

    Provided By Tripwire

  • Case Studies // Sep 2009

    On-Demand Billing & Customer Services

    Aria Systems provides a SaaS subscription billing and customer lifecycle management platform that helps businesses establish better control of their finances. Their business need is to demonstrate PCI DSS compliance as a Level 1 Merchant, implement PCI solution quickly and without additional staff and improve physical and virtual server configuration...

    Provided By Tripwire

  • Case Studies // Sep 2009

    Financial Services

    A global financial institution, Rothschild Bank AG has numerous branch offices with IT managed centrally from Zurich. Their business need is to attain visibility across a multi-location, multi-platform IT infrastructure, implement an automated, cost-efficient method for monitoring change activity and establish accountability through more stringent change and access control. Tripwire...

    Provided By Tripwire

  • Case Studies // Jul 2009

    Payment Solutions Provider

    Vesta business need is to achieve and maintain ongoing compliance to PCI and other audit requirements in a cost-effective and sustainable manner ensure reliability and security of business services, keeping customer satisfaction at all-time highs and leverage IT as a competitive differentiator in securing new business and expanding into global...

    Provided By Tripwire

  • Case Studies // Sep 2009

    E-Commerce: Tripwire Proves Configuration Control Is a Best Seller With Auditors and IT

    MarketLive business need is to deliver a single PCI compliant solution that serves all clients, improve change control processes and reduce unplanned work caused by inefficient operations. MarketLive chose Tripwire to overcome these challenges. Tripwire Enterprise provides configuration control for file servers and databases that meets the needs of PCI...

    Provided By Tripwire

  • Case Studies // Jul 2009

    Automotive Information Products

    Carfax business need is to prevent rogue changes from disrupting system availability, increase visibility to change activity across the IT enterprise and enforce change management processes across production systems. Carfax chose Tripwire to overcome these challenges. Tripwire Enterprise tracks all changes across the enterprise and provides complete visibility to change...

    Provided By Tripwire

  • Case Studies // Sep 2009

    Software Development: Tripwire Passes Blackboard's Configuration Control Test

    Blackboard's business need is to track configuration changes across mission-critical infrastructure, implement automated detective controls to support IT security and compliance strategies and increase maturity of change management and compliance practices to meet business growth demands. Blackboard chose Tripwire to overcome these challenges. Tripwire Enterprise provides a single point of...

    Provided By Tripwire

  • White Papers // Sep 2008

    IT Service Management Metrics Metrics That Matter: Four Key Benchmarks for Improving IT Performance

    Does one think great IT performance is achieved through luck or chance? One can bet real money it's not! High performing organizations have figured out which processes and controls really help them achieve their operational effectiveness and efficiency objectives. They have integrated those processes and controls into how they manage...

    Provided By Tripwire

  • White Papers // Dec 2008

    Secure Virtualization: Achieve and Maintain IT Security in Virtual Environments

    Virtualization is the hottest technology for CIOs today with it ranked one of the top 5 important trends for 2008 according to a recent poll from CIO Insight.6 With the cost-savings, agility and convenience virtualization offers, it's no wonder. Smart companies will realize that virtualized environments require the same careful...

    Provided By Tripwire

  • White Papers // Sep 2008

    Is Virtualization Under Control?: Current Opinions on Security and Controls for Virtual Servers in Production Environments

    Tripwire recently surveyed enterprise IT professionals to assess how vigorously virtualization is expanding within production server environments and to gauge if security, change controls and compliance requirements are keeping pace. Virtualization has clearly gained a lasting foothold, and the strength of IT process controls on virtual servers is reported to...

    Provided By Tripwire

  • White Papers // Mar 2009

    The Tripwire HIPAA Solution: Meeting the Security Standards Set Forth in Section 164

    The Health Insurance Portability and Accountability Act of 1996, or HIPAA, was enacted to safeguard Protected Health Information (PHI) by mandating procedures and controls to assure the public that critical and private information is controlled from loss of confidentiality, integrity or availability. With few exceptions, an organization is subject to...

    Provided By Tripwire

  • Case Studies // Jul 2009

    bwin Bets on Tripwire and Wins at Compliance, Plus System Stability and Availability

    The bwin Group has over 20 million registered customers in more than 25 core markets. Under various licences, it operates platforms for sports betting, poker, casino games and games through subsidiaries and associated companies. The challenge was to become PCI compliant on a compressed schedule, to implement IT processes that...

    Provided By Tripwire

  • Case Studies // Sep 2009

    Tripwire Security Case Study: Aria System

    Aria Systems is the leading provider of subscription billing solutions and offers the only "Monetization Platform" encompassing the full spectrum of Billing and Customer Lifecycle Management services. The challenge was to demonstrate PCI DSS compliance as a Level 1 Merchant, to implement PCI solution quickly and without additional staff and...

    Provided By Tripwire

  • Case Studies // Jul 2009

    ALC Maintains System Integrity With Tripwire Configuration Control Solutions

    Since 1976, the Atlantic Lottery Corporation (ALC) has been contributing to Atlantic Canada's economy and way of life by generating significant revenue on behalf of the governments of Nova Scotia, New Brunswick, Newfoundland and Labrador and Prince Edward Island. The challenge was to demonstrate compliance with federal and provincial online...

    Provided By Tripwire

  • Case Studies // Sep 2009

    Tripwire Passes Blackboard's Configuration Control Test

    Blackboard is a leading provider of e-Learning enterprise software applications, campus commerce systems, and related services to educational organizations. The challenge was to track configuration changes across mission-critical infrastructure, to implement automated detective controls to support IT security and compliance strategies and to increase maturity of change management and compliance...

    Provided By Tripwire

  • Case Studies // Sep 2009

    Using Configuration Control to Meet Compliance and Improve Operations

    CAPITAL Card Services, Inc. is a leading servicer of MasterCard and Visa accounts for financial and non-financial institutions nationwide. The challenge was to become compliant with various regulations, including PCI, to increase and enforce change management processes and discipline and to reduce unplanned work. Tripwire Enterprise provides configuration control to...

    Provided By Tripwire

  • Case Studies // Jul 2009

    CARFAX Drives IT Success With Tripwire Enterprise

    CARFAX started with a vision: to be the leading source of vehicle history information for buyers and sellers of used cars. The challenge was to prevent rogue changes from disrupting system availability, to increase visibility to change activity across the IT enterprise and to enforce change management processes across production...

    Provided By Tripwire