Tripwire

Displaying 1-40 of 71 results

  • White Papers // Oct 2012

    Security Configuration Management: Getting Back to IT Security Basics

    In IT security, obvious weaknesses like weak configurations often get overlooked. Yet for hackers, they are an open door into networks and systems. Learn how security configuration management (SCM), a critical security control, hardens configurations to prevent breaches, and immediately detects and corrects any subsequent changes that weaken them.

    Provided By Tripwire

  • White Papers // Oct 2012

    Meeting the True Intent of File Integrity Monitoring

    As organizations struggle to pass compliance audits, they often overlook the true intent of the requirements spelled out in those regulations or standards. Lately, this has been the case for the requirement for file integrity monitoring, or FIM. Most organizations use FIM simply to check the checkbox, particularly for PCI...

    Provided By Tripwire

  • White Papers // Oct 2012

    Become PCI Compliant and Secure with Enhanced File Integrity Monitoring

    Many organizations pass a PCI DSS audit, but still find themselves in the news after suffering a security breach. Part of the issue may be that the configuration settings were compliant with the settings specified in the PCI DSS, but only for a point in time. But what happens as...

    Provided By Tripwire

  • White Papers // Sep 2012

    Own Your Network with Continuous Monitoring

    This white paper produced by the SANS Analyst Program distills continuous monitoring down to its four basic components. It also gives those who want to implement continuous monitoring, but are suffering information overload, a clear path to follow. After reading this paper, you'll understand: Why continuous monitoring has...

    Provided By Tripwire

  • White Papers // Jun 2012

    Why Configuration Assessment And Change Auditing Is Key to Operational Stability

    Network administrators and IT managers know that the ramifications of one small change to a company's critical servers or network devices-such as routers, switches, and firewalls-depend on whether the change is desired or not. Without a way to know when change occurs and whether it's desired, not desired, accidental,...

    Provided By Tripwire

  • White Papers // Jun 2012

    SCM: The "Blocking and Tackling" of IT Security

    In IT security, obvious weaknesses like weak configurations often get overlooked. Yet for hackers, they're an open door into networks and systems. Learn how security configuration management (SCM), a critical security control, hardens configurations to prevent breaches, and immediately detects and corrects any subsequent changes that weaken them.

    Provided By Tripwire

  • White Papers // Jun 2012

    Security-In-Depth Using Integrated Risk-Conscious Controls

    Most organizations take a perimeter-centric approach to security, assuming most attacks come from outside the organization. Yet there's no longer a clear boundary between what's inside or outside the organization, and attackers range from unhappy employees to well-funded, state-sponsored hackers. Organizations need a new approach to IT security.

    Provided By Tripwire

  • White Papers // Jun 2012

    Security Configuration Management: Foundational Security with Tripwire Enterprise

    SCM provides the most security "bang for the buck" against today's threats, which is why the SANS Institute places so much importance on using it. With Tripwire Enterprise as your SCM solution, that foundational control extends across the enterprise infrastructure.

    Provided By Tripwire

  • White Papers // Apr 2012

    Reducing Federal Systems Risk with the SANS 20 Critical Controls

    As attacks on U.S. Federal information systems intensify, it's never been more critical to protect their information. In this white paper, learn why both U.S. and Canadian government agencies are leaning toward the 20CSC rather than FISMA to protect their information systems and valuable data. Specifically, you'll learn: ...

    Provided By Tripwire

  • Case Studies // Apr 2011

    Ocean Freight E-Commerce Solutions

    INTTRA is a leading global provider of E-commerce solutions to the ocean freight industry. Their business challenge is to deliver information services to meet commercial goals of company while containing IT scale and costs, fully engage with what the Tripwire Enterprise solution has to offer without distracting IT team from...

    Provided By Tripwire

  • Case Studies // Feb 2011

    Global Managed Hosting and Cloud Service Provider

    INetU is a managed hosting and cloud service provider with six datacenters in the US. Their business need is to provide security and compliance services to increase revenue automate internal security and compliance monitoring and reporting and sustain and improve reliability and customer satisfaction. INetU turned to Tripwire's industry-leading compliance...

    Provided By Tripwire

  • Case Studies // Feb 2011

    Worldwide IT Infrastructure Services

    Terremark, the leading global provider of IT infrastructure services their business need is to increase security and prevent attacks with improved monitoring and alerting, gain immediate visibility to suspicious events for investigation and mitigation and use a single, flexible solution for managing security and compliance needs. Tripwire Log Center lets...

    Provided By Tripwire

  • White Papers // Nov 2010

    Automation Makes Perfect: Taking the Time Crunch Out of IT Compliance with Automation

    Automation makes compliance part of day-to-day operations, enabling CIOs to shift time to more important things-like a security strategy that protects the business, rather than simply pleases an auditor. Read this exclusive white paper from compliance leader Tripwire to learn how a Protect, Detect, and Correct compliance strategy can give...

    Provided By Tripwire

  • White Papers // Nov 2010

    On Common Ground: Where Compliance and Data Protection Overlap

    Today's CISOs face more challenges than ever, including increased and more sophisticated threats, complex IT environments, decreased budgets, and greater compliance pressures. But these challenges present opportunity. Learn how CISOs can play these challenges to their advantage to meet both data protection and compliance demands.

    Provided By Tripwire

  • White Papers // Nov 2010

    Pulling the Plug on Legacy Log Management

    When it comes to log management today, CSOs have been left in the lurch. According to a new IDG Research Services survey, organizations are poised to "rip and replace" legacy technology to get a better handle on compliance and security. This paper includes key research findings and strategies to overcome...

    Provided By Tripwire

  • White Papers // Nov 2010

    Cyberwar Threats: New Security Strategies for Governments

    Threats posed by cyberwar cannot be defended using the traditional all-or-nothing security that's aimed solely at keeping attackers out of the government enterprise. Learn why that's so, what's needed to tackle the new threats, and why Tripwire's solutions provide the real-time awareness necessary to fight cyberwar.

    Provided By Tripwire

  • White Papers // Nov 2010

    Data Protection 2.0: It's Not Just Names and Numbers Anymore

    Data Protection 2.0: It's Not Just Names and Numbers Anymore Meet this data protection challenge head on with a new way to categorize sensitive data that helps you reduce data breach risk and take more control of your most critical assets. Discover how.

    Provided By Tripwire

  • White Papers // Nov 2010

    Five Challenges for Continuous PCI DSS Compliance

    With adoption of the PCI DSS expanding throughout the United States and into Europe, organizations subject to PCI compliance face several key challenges. Learn more about these challenges, how to address them, and how Tripwire IT security and compliance automation solutions can help.

    Provided By Tripwire

  • White Papers // Nov 2010

    A Pragmatic Approach to SIEM: Buy for Compliance, Use for Security with Anton Chuvakin

    Too often, organizations purchase SIEM and log management solutions to check a compliance checkbox. These organizations miss a huge opportunity to improve security while meeting compliance requirements. In this white paper, security and compliance expert Dr. Anton Chuvakin explains how to take advantage of this opportunity.

    Provided By Tripwire

  • White Papers // Oct 2010

    Managed Compliance: Streamlining Multiple Compliance Mandates with Visibility, Intelligence and Auto

    A perfect storm is brewing, with increasingly complex, persistent cyber threats and more numerous and prescriptive compliance mandates to protect against them. In this white paper, learn how to ride out this storm with automated solutions that reduce threats, meet multi-compliance demands, and help pass audits.

    Provided By Tripwire

  • White Papers // Oct 2010

    Mind the Gap: CISOs Work to Narrow the Breach-to-Detection Gap for Better Security

    What's more important, security or compliance? Most IT shops are focused on compliance but breaches are still happening. A recent study by Verizon Business concludes that evidence of those breaches tends to be right there in log files. But CISOs aren't tapping into that intelligence and many breaches go undetected...

    Provided By Tripwire

  • White Papers // Jan 2010

    Information Security and Multi-Compliance: Avoiding Audit Fatigue with a Single IT Compliance Strategy

    This Prescriptive Guide provides nine steps that information security managers can use to break the compliance blame cycle and build an information security program that more effectively mitigates security risk. Completing the nine steps requires business stakeholders, IT management, and information security management to all mutually support the same...

    Provided By Tripwire

  • White Papers // Jan 2010

    Hassle-free compliance: Make compliance just another part of your processes by taking an operational approach to security

    Does your organization treat compliance as a set of check boxes designed to meet the auditors' requirements? If so, you are wasting a lot of time, money and precious IT resources. This white paper is a roadmap for making compliance a painless, efficient, and routine part of your IT processes.

    Provided By Tripwire

  • White Papers // Jan 2010

    For PCI, the Future is Now: How to comply with the global standard without breaking the bank

    Running scared from an upcoming PCI audit? There's a better way. It's called continuous compliance built directly into every day operations. The result is a virtual elimination of costly (not to mention scary) fire drills, even as credit card standards continue to evolve.

    Provided By Tripwire

  • White Papers // Oct 2009

    HIPAA Security Provisions: Is Your Network Ready for a Physical?

    The security-focused Health Insurance Portability and Accountability Act (HIPAA) federal regulation became effective April 2005, requiring many companies to review the health of their systems that create, receive, transmit or maintain health information. If your company is subject to HIPAA, is it prepared to meet the requirements of the Security...

    Provided By Tripwire

  • Case Studies // Sep 2009

    On-Demand Billing & Customer Services

    Aria Systems provides a SaaS subscription billing and customer lifecycle management platform that helps businesses establish better control of their finances. Their business need is to demonstrate PCI DSS compliance as a Level 1 Merchant, implement PCI solution quickly and without additional staff and improve physical and virtual server configuration...

    Provided By Tripwire

  • Case Studies // Sep 2009

    Financial Services

    A global financial institution, Rothschild Bank AG has numerous branch offices with IT managed centrally from Zurich. Their business need is to attain visibility across a multi-location, multi-platform IT infrastructure, implement an automated, cost-efficient method for monitoring change activity and establish accountability through more stringent change and access control. Tripwire...

    Provided By Tripwire

  • Case Studies // Sep 2009

    E-Commerce: Tripwire Proves Configuration Control Is a Best Seller With Auditors and IT

    MarketLive business need is to deliver a single PCI compliant solution that serves all clients, improve change control processes and reduce unplanned work caused by inefficient operations. MarketLive chose Tripwire to overcome these challenges. Tripwire Enterprise provides configuration control for file servers and databases that meets the needs of PCI...

    Provided By Tripwire

  • Case Studies // Sep 2009

    Software Development: Tripwire Passes Blackboard's Configuration Control Test

    Blackboard's business need is to track configuration changes across mission-critical infrastructure, implement automated detective controls to support IT security and compliance strategies and increase maturity of change management and compliance practices to meet business growth demands. Blackboard chose Tripwire to overcome these challenges. Tripwire Enterprise provides a single point of...

    Provided By Tripwire

  • White Papers // Aug 2009

    FISMA: Securing Federal Systems and Data With Tripwire

    Recognizing the importance of securing federal systems and data, Congress passed the Federal Information Security Management Act (FIMSA) in 2002. The act requires federal agencies develop, document and implement agency-wide information security programs to protect the confidentiality, integrity and availability of the data and systems that support government operations and...

    Provided By Tripwire

  • White Papers // Jul 2009

    Sustaining SOX Compliance: Best Practices to Mitigate Risk, Automate Compliance, and Reduce Costs

    To successfully sustain SOX compliance, organizations must implement best practices to ensure IT systems not only achieve a known and trusted state but they also maintain that state. Management must be more accountable and aware of the need for a continuous and proactive operational risk management environment that recognizes the...

    Provided By Tripwire

  • Case Studies // Jul 2009

    Payment Solutions Provider

    Vesta business need is to achieve and maintain ongoing compliance to PCI and other audit requirements in a cost-effective and sustainable manner ensure reliability and security of business services, keeping customer satisfaction at all-time highs and leverage IT as a competitive differentiator in securing new business and expanding into global...

    Provided By Tripwire

  • Case Studies // Jul 2009

    Business Services: Web Technology Partners for Marketing, Security and Compliance

    VML and GSI business need is to assure online commerce clients that their host systems are secure and compliant, produce change audit trails to clients on demand and establish demonstrable controls to meet SOX, PCI, and a variety of audit requirements. VML and GSI chose Tripwire to overcome these challenges....

    Provided By Tripwire

  • Case Studies // Jul 2009

    Global Provider of Business Process Outsourcing(BPO)

    Sitel business need is to attain a state of standardized audit readiness and compliance across multiple data centers, for meeting PCI DSS requirements, and other forthcoming global regulatory standards and develop multi-tier change and configuration control processes that enables company to meet its goal of providing customers with a low-cost...

    Provided By Tripwire

  • Case Studies // Jul 2009

    Automotive Information Products

    Carfax business need is to prevent rogue changes from disrupting system availability, increase visibility to change activity across the IT enterprise and enforce change management processes across production systems. Carfax chose Tripwire to overcome these challenges. Tripwire Enterprise tracks all changes across the enterprise and provides complete visibility to change...

    Provided By Tripwire

  • White Papers // Jun 2009

    Dynamic Data Center Compliance With Tripwire and Microsoft

    Compliance is a reality, but IT Operations does not need to become a security expert to monitor the health of their IT infrastructure in real-time. With the Tripwire Compliance Management Pack for System Center, users gain a central, end-to-end solution for monitoring the health and performance of their virtual and...

    Provided By Tripwire

  • White Papers // Apr 2009

    Seven Practical Steps for Federal Cyber Security and FISMA Compliance

    The number of security breaches of federal information systems and cases of improper access to these systems continues to grow at an alarming rate. In fact, federal civilian agencies reported three times more cyber security incidents in 2008 than in 2006, according to the Department of Homeland Security (DHS). And...

    Provided By Tripwire

  • White Papers // Mar 2009

    Addressing Compliance Initiatives With Tripwire and the Center for Internet Security (CIS)

    In this paper, discover what you need to build an effective compliance program by understanding benchmarks, the basic building blocks of compliance initiatives. This whitepaper looks at: What the CIS is and how it develops its benchmarks How to use the benchmarks to address compliance and security Some considerations...

    Provided By Tripwire

  • White Papers // Mar 2009

    The Tripwire HIPAA Solution: Meeting the Security Standards Set Forth in Section 164

    The Health Insurance Portability and Accountability Act of 1996, or HIPAA, was enacted to safeguard Protected Health Information (PHI) by mandating procedures and controls to assure the public that critical and private information is controlled from loss of confidentiality, integrity or availability. With few exceptions, an organization is subject to...

    Provided By Tripwire

  • White Papers // Feb 2009

    Beyond PCI Checklists: Securing Cardholder Data With Enhanced File Integrity Monitoring

    The Payment Card Industry Data Security Standard (PCI DSS) applies to any organization that accepts stores or processes payment cards of any type and is a comprehensive checklist of actions these organizations must take to improve the security of global payment systems. Although the adoption of PCI DSS by an...

    Provided By Tripwire

  • Case Studies // Jul 2009

    Global Provider of Business Process Outsourcing(BPO)

    Sitel business need is to attain a state of standardized audit readiness and compliance across multiple data centers, for meeting PCI DSS requirements, and other forthcoming global regulatory standards and develop multi-tier change and configuration control processes that enables company to meet its goal of providing customers with a low-cost...

    Provided By Tripwire

  • Case Studies // Apr 2011

    Ocean Freight E-Commerce Solutions

    INTTRA is a leading global provider of E-commerce solutions to the ocean freight industry. Their business challenge is to deliver information services to meet commercial goals of company while containing IT scale and costs, fully engage with what the Tripwire Enterprise solution has to offer without distracting IT team from...

    Provided By Tripwire

  • Case Studies // Feb 2011

    Global Managed Hosting and Cloud Service Provider

    INetU is a managed hosting and cloud service provider with six datacenters in the US. Their business need is to provide security and compliance services to increase revenue automate internal security and compliance monitoring and reporting and sustain and improve reliability and customer satisfaction. INetU turned to Tripwire's industry-leading compliance...

    Provided By Tripwire

  • Case Studies // Sep 2009

    On-Demand Billing & Customer Services

    Aria Systems provides a SaaS subscription billing and customer lifecycle management platform that helps businesses establish better control of their finances. Their business need is to demonstrate PCI DSS compliance as a Level 1 Merchant, implement PCI solution quickly and without additional staff and improve physical and virtual server configuration...

    Provided By Tripwire

  • Case Studies // Sep 2009

    Financial Services

    A global financial institution, Rothschild Bank AG has numerous branch offices with IT managed centrally from Zurich. Their business need is to attain visibility across a multi-location, multi-platform IT infrastructure, implement an automated, cost-efficient method for monitoring change activity and establish accountability through more stringent change and access control. Tripwire...

    Provided By Tripwire

  • Case Studies // Jul 2009

    Payment Solutions Provider

    Vesta business need is to achieve and maintain ongoing compliance to PCI and other audit requirements in a cost-effective and sustainable manner ensure reliability and security of business services, keeping customer satisfaction at all-time highs and leverage IT as a competitive differentiator in securing new business and expanding into global...

    Provided By Tripwire

  • Case Studies // Sep 2009

    E-Commerce: Tripwire Proves Configuration Control Is a Best Seller With Auditors and IT

    MarketLive business need is to deliver a single PCI compliant solution that serves all clients, improve change control processes and reduce unplanned work caused by inefficient operations. MarketLive chose Tripwire to overcome these challenges. Tripwire Enterprise provides configuration control for file servers and databases that meets the needs of PCI...

    Provided By Tripwire

  • Case Studies // Jul 2009

    Automotive Information Products

    Carfax business need is to prevent rogue changes from disrupting system availability, increase visibility to change activity across the IT enterprise and enforce change management processes across production systems. Carfax chose Tripwire to overcome these challenges. Tripwire Enterprise tracks all changes across the enterprise and provides complete visibility to change...

    Provided By Tripwire

  • Case Studies // Sep 2009

    Software Development: Tripwire Passes Blackboard's Configuration Control Test

    Blackboard's business need is to track configuration changes across mission-critical infrastructure, implement automated detective controls to support IT security and compliance strategies and increase maturity of change management and compliance practices to meet business growth demands. Blackboard chose Tripwire to overcome these challenges. Tripwire Enterprise provides a single point of...

    Provided By Tripwire

  • Case Studies // Jul 2009

    Business Services: Web Technology Partners for Marketing, Security and Compliance

    VML and GSI business need is to assure online commerce clients that their host systems are secure and compliant, produce change audit trails to clients on demand and establish demonstrable controls to meet SOX, PCI, and a variety of audit requirements. VML and GSI chose Tripwire to overcome these challenges....

    Provided By Tripwire

  • White Papers // Oct 2012

    Security Configuration Management: Getting Back to IT Security Basics

    In IT security, obvious weaknesses like weak configurations often get overlooked. Yet for hackers, they are an open door into networks and systems. Learn how security configuration management (SCM), a critical security control, hardens configurations to prevent breaches, and immediately detects and corrects any subsequent changes that weaken them.

    Provided By Tripwire

  • White Papers // Oct 2012

    Meeting the True Intent of File Integrity Monitoring

    As organizations struggle to pass compliance audits, they often overlook the true intent of the requirements spelled out in those regulations or standards. Lately, this has been the case for the requirement for file integrity monitoring, or FIM. Most organizations use FIM simply to check the checkbox, particularly for PCI...

    Provided By Tripwire

  • White Papers // Oct 2012

    Become PCI Compliant and Secure with Enhanced File Integrity Monitoring

    Many organizations pass a PCI DSS audit, but still find themselves in the news after suffering a security breach. Part of the issue may be that the configuration settings were compliant with the settings specified in the PCI DSS, but only for a point in time. But what happens as...

    Provided By Tripwire

  • White Papers // Apr 2012

    Reducing Federal Systems Risk with the SANS 20 Critical Controls

    As attacks on U.S. Federal information systems intensify, it's never been more critical to protect their information. In this white paper, learn why both U.S. and Canadian government agencies are leaning toward the 20CSC rather than FISMA to protect their information systems and valuable data. Specifically, you'll learn: ...

    Provided By Tripwire

  • White Papers // Sep 2012

    Own Your Network with Continuous Monitoring

    This white paper produced by the SANS Analyst Program distills continuous monitoring down to its four basic components. It also gives those who want to implement continuous monitoring, but are suffering information overload, a clear path to follow. After reading this paper, you'll understand: Why continuous monitoring has...

    Provided By Tripwire

  • White Papers // Oct 2009

    HIPAA Security Provisions: Is Your Network Ready for a Physical?

    The security-focused Health Insurance Portability and Accountability Act (HIPAA) federal regulation became effective April 2005, requiring many companies to review the health of their systems that create, receive, transmit or maintain health information. If your company is subject to HIPAA, is it prepared to meet the requirements of the Security...

    Provided By Tripwire

  • White Papers // Jan 2010

    Information Security and Multi-Compliance: Avoiding Audit Fatigue with a Single IT Compliance Strategy

    This Prescriptive Guide provides nine steps that information security managers can use to break the compliance blame cycle and build an information security program that more effectively mitigates security risk. Completing the nine steps requires business stakeholders, IT management, and information security management to all mutually support the same...

    Provided By Tripwire

  • White Papers // Jan 2010

    Hassle-free compliance: Make compliance just another part of your processes by taking an operational approach to security

    Does your organization treat compliance as a set of check boxes designed to meet the auditors' requirements? If so, you are wasting a lot of time, money and precious IT resources. This white paper is a roadmap for making compliance a painless, efficient, and routine part of your IT processes.

    Provided By Tripwire

  • White Papers // Jan 2010

    For PCI, the Future is Now: How to comply with the global standard without breaking the bank

    Running scared from an upcoming PCI audit? There's a better way. It's called continuous compliance built directly into every day operations. The result is a virtual elimination of costly (not to mention scary) fire drills, even as credit card standards continue to evolve.

    Provided By Tripwire

  • White Papers // Oct 2010

    Managed Compliance: Streamlining Multiple Compliance Mandates with Visibility, Intelligence and Auto

    A perfect storm is brewing, with increasingly complex, persistent cyber threats and more numerous and prescriptive compliance mandates to protect against them. In this white paper, learn how to ride out this storm with automated solutions that reduce threats, meet multi-compliance demands, and help pass audits.

    Provided By Tripwire

  • White Papers // Nov 2010

    Automation Makes Perfect: Taking the Time Crunch Out of IT Compliance with Automation

    Automation makes compliance part of day-to-day operations, enabling CIOs to shift time to more important things-like a security strategy that protects the business, rather than simply pleases an auditor. Read this exclusive white paper from compliance leader Tripwire to learn how a Protect, Detect, and Correct compliance strategy can give...

    Provided By Tripwire

  • White Papers // Nov 2010

    On Common Ground: Where Compliance and Data Protection Overlap

    Today's CISOs face more challenges than ever, including increased and more sophisticated threats, complex IT environments, decreased budgets, and greater compliance pressures. But these challenges present opportunity. Learn how CISOs can play these challenges to their advantage to meet both data protection and compliance demands.

    Provided By Tripwire

  • White Papers // Nov 2010

    Pulling the Plug on Legacy Log Management

    When it comes to log management today, CSOs have been left in the lurch. According to a new IDG Research Services survey, organizations are poised to "rip and replace" legacy technology to get a better handle on compliance and security. This paper includes key research findings and strategies to overcome...

    Provided By Tripwire

  • White Papers // Nov 2010

    Cyberwar Threats: New Security Strategies for Governments

    Threats posed by cyberwar cannot be defended using the traditional all-or-nothing security that's aimed solely at keeping attackers out of the government enterprise. Learn why that's so, what's needed to tackle the new threats, and why Tripwire's solutions provide the real-time awareness necessary to fight cyberwar.

    Provided By Tripwire

  • White Papers // Nov 2010

    Data Protection 2.0: It's Not Just Names and Numbers Anymore

    Data Protection 2.0: It's Not Just Names and Numbers Anymore Meet this data protection challenge head on with a new way to categorize sensitive data that helps you reduce data breach risk and take more control of your most critical assets. Discover how.

    Provided By Tripwire

  • White Papers // Nov 2010

    Five Challenges for Continuous PCI DSS Compliance

    With adoption of the PCI DSS expanding throughout the United States and into Europe, organizations subject to PCI compliance face several key challenges. Learn more about these challenges, how to address them, and how Tripwire IT security and compliance automation solutions can help.

    Provided By Tripwire

  • White Papers // Oct 2010

    Mind the Gap: CISOs Work to Narrow the Breach-to-Detection Gap for Better Security

    What's more important, security or compliance? Most IT shops are focused on compliance but breaches are still happening. A recent study by Verizon Business concludes that evidence of those breaches tends to be right there in log files. But CISOs aren't tapping into that intelligence and many breaches go undetected...

    Provided By Tripwire

  • White Papers // Nov 2010

    A Pragmatic Approach to SIEM: Buy for Compliance, Use for Security with Anton Chuvakin

    Too often, organizations purchase SIEM and log management solutions to check a compliance checkbox. These organizations miss a huge opportunity to improve security while meeting compliance requirements. In this white paper, security and compliance expert Dr. Anton Chuvakin explains how to take advantage of this opportunity.

    Provided By Tripwire

  • White Papers // Dec 2008

    Secure Virtualization: Achieve and Maintain IT Security in Virtual Environments

    Virtualization is the hottest technology for CIOs today with it ranked one of the top 5 important trends for 2008 according to a recent poll from CIO Insight.6 With the cost-savings, agility and convenience virtualization offers, it's no wonder. Smart companies will realize that virtualized environments require the same careful...

    Provided By Tripwire

  • White Papers // Mar 2009

    The Tripwire HIPAA Solution: Meeting the Security Standards Set Forth in Section 164

    The Health Insurance Portability and Accountability Act of 1996, or HIPAA, was enacted to safeguard Protected Health Information (PHI) by mandating procedures and controls to assure the public that critical and private information is controlled from loss of confidentiality, integrity or availability. With few exceptions, an organization is subject to...

    Provided By Tripwire

  • Webcasts // Jan 2009

    7 Steps to Understanding and Mitigating Virtualization Security Risks

    Virtualization is definitely here, and the benefits can be tremendous, including cost-savings from reduced hardware purchases, less real estate required to house machines and a more agile IT infrastructure. But virtualization introduces new security risks, including less visibility into the Virtual Infrastructure (VI), the potential for a single point of...

    Provided By Tripwire

  • Webcasts // Jan 2009

    SOX, GLBA and HIPAA: Multiple Regulations, One Compliance Solution

    SOX, GLBA and HIPAA regulations all require technical safeguards to protect or guarantee the veracity of critical information. With SOX, it's for public companies to guarantee accurate financial accounting. GLBA protects personal financial information of an organization's customers. And HIPAA protects and guarantees the privacy of an individual's Personal Health...

    Provided By Tripwire

  • Webcasts // Jan 2009

    Secure Sensitive Government Data and Maintain Compliance With Tripwire for Servers

    Able to detect and pinpoint changes to system and configuration files, Tripwire for Servers enables IT staff to determine what changed, when it changed, how it changed, who changed it- and to roll servers back to a known and trusted state if the change is not authorized or desired. Tripwire...

    Provided By Tripwire

  • Webcasts // Jan 2009

    Protect Government IT Infrastructure From Security Threats With Tripwire Enterprise

    Persistent weaknesses in information security policies and practices threaten the confidentiality, integrity and availability of the infrastructure. Unfortunately it's difficult to enforce policies without the ability to assess the state of the IT systems and continuously locate and identify incremental changes when they occur and who is responsible. Tripwire provides...

    Provided By Tripwire

  • Webcasts // Jan 2009

    Secure, Compliant and Optimized With Tripwire Enterprise

    The presenters of this webcast describe the challenges IT faces when managing the IT infrastructure of a typical enterprise organization: ensuring infrastructure security, proving compliance with a host of regulations and standards and providing highly available and high-performing services to internal and external customers. They then demonstrate how Tripwire Enterprise,...

    Provided By Tripwire

  • Webcasts // Jan 2009

    GCSx Code of Connection Compliance With Tripwire Enterprise

    The Code of Connection (CoCo) defines the minimum standards and processes that an authority must comply with before being able to connect to GCSx. Achieving compliance to the CoCo requires the local authority to provide a compliance statement and supporting comment against a number of security control measures. The attendee...

    Provided By Tripwire

  • Webcasts // Jan 2009

    Automating SOX Compliance With Tripwire's Powerful IT Controls

    While many businesses have successfully completed a Sarbanes-Oxley audit, the challenge is in maintaining compliance while keeping associated costs under control. The Securities and Exchange Commission (SEC) now recommends automating the Internal Controls for Financial Reporting (ICFR), the IT general controls required by SOX. And why not? Automated IT controls...

    Provided By Tripwire

  • Webcasts // Jan 2009

    Getting an X-Ray View of File Integrity Monitoring for PCI Compliance

    As Congress questions PCI and the credit card companies make concentrated efforts to increase compliance with PCI DSS, the underlying need remains the same: to protect the business from data breaches and other security violations. Yet, the effort remains a struggle as organizations seek a greater understanding-an X-ray vision-of managing...

    Provided By Tripwire

  • Webcasts // Jan 2009

    Achieving PCI Compliance With Enhanced File Integrity Monitoring and Configuration Assessment

    The attendee of this webcast will discover why file integrity monitoring is not only important to PCI DSS specifications, but is also an essential IT control. The presenter will give proven methods for automating compliance that not only satisfy the auditor's checklist but also alerts to non-compliant configurations.

    Provided By Tripwire

  • White Papers // Jun 2012

    Why Configuration Assessment And Change Auditing Is Key to Operational Stability

    Network administrators and IT managers know that the ramifications of one small change to a company's critical servers or network devices-such as routers, switches, and firewalls-depend on whether the change is desired or not. Without a way to know when change occurs and whether it's desired, not desired, accidental,...

    Provided By Tripwire