Tripwire

Displaying 41-71 of 71 results

  • Webcasts // Jan 2009

    7 Steps to Understanding and Mitigating Virtualization Security Risks

    Virtualization is definitely here, and the benefits can be tremendous, including cost-savings from reduced hardware purchases, less real estate required to house machines and a more agile IT infrastructure. But virtualization introduces new security risks, including less visibility into the Virtual Infrastructure (VI), the potential for a single point of...

    Provided By Tripwire

  • Webcasts // Jan 2009

    SOX, GLBA and HIPAA: Multiple Regulations, One Compliance Solution

    SOX, GLBA and HIPAA regulations all require technical safeguards to protect or guarantee the veracity of critical information. With SOX, it's for public companies to guarantee accurate financial accounting. GLBA protects personal financial information of an organization's customers. And HIPAA protects and guarantees the privacy of an individual's Personal Health...

    Provided By Tripwire

  • Webcasts // Jan 2009

    Secure Sensitive Government Data and Maintain Compliance With Tripwire for Servers

    Able to detect and pinpoint changes to system and configuration files, Tripwire for Servers enables IT staff to determine what changed, when it changed, how it changed, who changed it- and to roll servers back to a known and trusted state if the change is not authorized or desired. Tripwire...

    Provided By Tripwire

  • Webcasts // Jan 2009

    Protect Government IT Infrastructure From Security Threats With Tripwire Enterprise

    Persistent weaknesses in information security policies and practices threaten the confidentiality, integrity and availability of the infrastructure. Unfortunately it's difficult to enforce policies without the ability to assess the state of the IT systems and continuously locate and identify incremental changes when they occur and who is responsible. Tripwire provides...

    Provided By Tripwire

  • Webcasts // Jan 2009

    Secure, Compliant and Optimized With Tripwire Enterprise

    The presenters of this webcast describe the challenges IT faces when managing the IT infrastructure of a typical enterprise organization: ensuring infrastructure security, proving compliance with a host of regulations and standards and providing highly available and high-performing services to internal and external customers. They then demonstrate how Tripwire Enterprise,...

    Provided By Tripwire

  • Webcasts // Jan 2009

    GCSx Code of Connection Compliance With Tripwire Enterprise

    The Code of Connection (CoCo) defines the minimum standards and processes that an authority must comply with before being able to connect to GCSx. Achieving compliance to the CoCo requires the local authority to provide a compliance statement and supporting comment against a number of security control measures. The attendee...

    Provided By Tripwire

  • Webcasts // Jan 2009

    Automating SOX Compliance With Tripwire's Powerful IT Controls

    While many businesses have successfully completed a Sarbanes-Oxley audit, the challenge is in maintaining compliance while keeping associated costs under control. The Securities and Exchange Commission (SEC) now recommends automating the Internal Controls for Financial Reporting (ICFR), the IT general controls required by SOX. And why not? Automated IT controls...

    Provided By Tripwire

  • Webcasts // Jan 2009

    Getting an X-Ray View of File Integrity Monitoring for PCI Compliance

    As Congress questions PCI and the credit card companies make concentrated efforts to increase compliance with PCI DSS, the underlying need remains the same: to protect the business from data breaches and other security violations. Yet, the effort remains a struggle as organizations seek a greater understanding-an X-ray vision-of managing...

    Provided By Tripwire

  • Webcasts // Jan 2009

    Achieving PCI Compliance With Enhanced File Integrity Monitoring and Configuration Assessment

    The attendee of this webcast will discover why file integrity monitoring is not only important to PCI DSS specifications, but is also an essential IT control. The presenter will give proven methods for automating compliance that not only satisfy the auditor's checklist but also alerts to non-compliant configurations.

    Provided By Tripwire

  • Webcasts // Jan 2009

    Failing Grade or Honors Graduate? How Educational Institutions Use File Integrity Monitoring to Achieve PCI Compliance

    The number of educational institutions that have suffered a system breach continues to increase. Schools conduct millions of transactions every year, from online tuition pay to cafeteria and bookstore purchases, making them vulnerable to the same electronic break-ins as any major retailer. That's why it is important, and now mandatory,...

    Provided By Tripwire

  • Webcasts // Jan 2009

    Achieving PCI Compliance With Enhanced File Integrity Monitoring

    Compliance with PCI DSS is mandatory for merchants, no matter how many (or few) payment card transactions are processed each year or how much infrastructure is in scope. Failure to comply continues to result in stiff penalties. Even if one pass the first audit there's always next year. That's why...

    Provided By Tripwire

  • Webcasts // Jan 2009

    Does Virtualization Put Security at Risk?

    The cost benefits of virtualization are so great that the current economic situation will drive IT departments to greater adoption of the technology. However, security continues to be of utmost concern, especially as virtualization is used beyond pre-production environments. This webcast discusses the types of virtual environments where security is...

    Provided By Tripwire

  • Webcasts // Jan 2009

    How the Economic Crisis Will Affect IT Security

    The global economic downturn may affect IT departments more than just having to manage under decreased budgets. Sudden acquisitions and mergers that require quick IT integration, opportunistic attacks and phishing, additional and potentially more severe regulations, and the impact of these factors on critical priorities, all place greater emphasis on...

    Provided By Tripwire

  • Webcasts // Jan 2009

    Virtually Compliant: How Virtualization Technologies Impact PCI DSS Compliance

    More and more, organizations are deploying mission-critical applications in virtualized production environments. In many cases, it is without a full understanding of how virtualization impacts compliance and security - including uncertainty over whether or not virtualized systems can be in scope for PCI compliance and what the top security risks...

    Provided By Tripwire

  • Webcasts // Jan 2009

    Staying PCI Compliant in Virtual and Physical Environments

    Many organizations responsible for PCI compliance have stalled adoption of virtualization simply because they do not know if virtual servers are in scope for PCI compliance or how they would be audited. But increasingly, organizations are taking deliberate steps to stay PCI compliant while successfully rolling out virtualization across the...

    Provided By Tripwire

  • Webcasts // Jan 2009

    Insights From an Auditor: Ensuring a Successful PCI Audit

    Appropriate processing and storing of cardholder data has become a very hot issue, especially given recent headlines regarding companies who have suffered expensive and debilitating security breaches. That's why the pressure is on for merchants to become compliant with the Payment Card Industry (PCI) Data Security Standard. But who needs...

    Provided By Tripwire

  • Webcasts // Jan 2009

    SOX Compliance: Reducing Risk and Cost With Tripwire

    While many businesses have completed at least one Sarbanes-Oxley audit, the challenge is in maintaining compliance while keeping associated costs under control. In a business environment facing new and varied regulatory challenges, getting the right tools, processes and policies in place in order to sustain compliance has never been more...

    Provided By Tripwire

  • Webcasts // Jan 2009

    Configuration Audit and Control: 10 Critical Factors to CCM Success

    As businesses have instituted internal, industry and government mandated regulatory compliance, the need for audit data to provide conformity has also become a necessity. However, traditional change management and configuration management tools do not comprehensively address all aspects of the vast configuration details inherent in complex IT infrastructures. Configuration audit...

    Provided By Tripwire

  • Webcasts // Jan 2009

    Improving IT Infrastructure With Change Management

    With more and more enterprise systems moving to virtual IT environments, it is important to take the necessary steps to safeguard the entire enterprise. The presenters describe how virtualization is changing the management of IT environments, and what the organization can do to successfully take advantage of this enterprise-changing technology,...

    Provided By Tripwire

  • Webcasts // Jan 2009

    Virtual Realities: Securing Your Virtualized Environment

    To keep up with their expanding computing needs, more and more companies are turning to virtualization. But as they do, they find very real security concerns. Does virtualization puts one more at risk to security threats? What issues do companies tend to overlook as they secure virtualized environments? The presenters...

    Provided By Tripwire

  • Webcasts // Jan 2009

    Get Compliant, Stay Compliant - Automatically

    Compliance is no longer a one-time event, nor is it the means to an end. It now has much more significance than merely passing an audit. Why? A single failed configuration that goes unnoticed can possibly snowball into an entire data center being non-compliant. In today's complex environment, it is...

    Provided By Tripwire

  • Webcasts // Jan 2009

    An Introduction to Security Visible Ops With Gene Kim

    Based on 10 years of research, the Security Visible Ops methodology describes how to link IT security and operational objectives in four practical steps by integrating security controls into IT operational, software development and project management processes. The attendee of this webcast will discover how the organization can use Security...

    Provided By Tripwire

  • Webcasts // Jan 2009

    How to Manage Virtualization Before It Manages You

    With more and more enterprise systems moving to virtual IT environments, it is important to take the necessary steps to safeguard the entire enterprise. Two industry experts describe how virtualization is changing the management of IT environments, and what the organization can do to successfully take advantage of this enterprise-changing...

    Provided By Tripwire

  • Webcasts // Jan 2009

    PCI for Retailers: Staying Compliant in an Insecure World

    The pressure on retailers to achieve and prove compliance with the Payment Card Industry Data Security Standard (PCI DSS) is intensifying. Servers have been the primary focus of compliance, but now auditors are turning their scope on point of sale systems, which are increasingly vulnerable to security breaches. In the...

    Provided By Tripwire

  • Webcasts // Jan 2009

    Controlling Virtualization Security Risks: Tips From the Experts

    The need for increased computing agility, coupled with the increasing cost and complexity of IT systems, has driven the rapid adoption of virtualization technologies. While virtualization has operational and economic rewards, the reality is that when information security controls are improperly implemented or neglected in virtualized environments, real security risks...

    Provided By Tripwire

  • Webcasts // Jan 2009

    Securing the Power Grid: Automating NERC Cyber Security Compliance

    NERC requirements are designed to ensure that the bulk electric system in North America is reliable and adequate, and that power grids are secure from both external and internal threats. NERC includes more than 160 Critical Infrastructure Protection (CIP) Cyber Security Standards that are mandatory and enforceable, and that relate...

    Provided By Tripwire

  • Webcasts // Jan 2009

    Understanding and Mitigating Security Risks in Virtual Environments

    While virtualization has operational and economic rewards, the reality is that when information security controls are improperly implemented or neglected in virtualized environments, real security risks and exposures can be created faster than ever. The good news is that information security can take some practical steps right away to limit...

    Provided By Tripwire

  • Webcasts // Jan 2009

    A Trusted State of Business: Security Configuration Management and Change Auditing

    In a perfect world, IT security would be simple. There would be one set of guidelines and needs with easily applied best practices to meet those requirements. And everyone will be worry free. But security is anything but simple. People face different threats and demands for differing levels of security....

    Provided By Tripwire

  • White Papers // Dec 2008

    Secure Virtualization: Achieve and Maintain IT Security in Virtual Environments

    Virtualization is the hottest technology for CIOs today with it ranked one of the top 5 important trends for 2008 according to a recent poll from CIO Insight.6 With the cost-savings, agility and convenience virtualization offers, it's no wonder. Smart companies will realize that virtualized environments require the same careful...

    Provided By Tripwire

  • White Papers // Sep 2008

    IT Service Management Metrics Metrics That Matter: Four Key Benchmarks for Improving IT Performance

    Does one think great IT performance is achieved through luck or chance? One can bet real money it's not! High performing organizations have figured out which processes and controls really help them achieve their operational effectiveness and efficiency objectives. They have integrated those processes and controls into how they manage...

    Provided By Tripwire

  • White Papers // Dec 2005

    Addressing the Requirements of: Monetary Authority of Singapore Internet Banking Technology Risk Management Guidelines

    The Monetary Authority of Singapore (MAS) has published a document that summarizes electronic security and risk management guidelines that financial institutions should consider when deploying Internet banking solutions to customers. The goal of this paper is to provide banks with a sound framework of risk management principles and security practices,...

    Provided By Tripwire

  • White Papers // Dec 2005

    Addressing the Requirements of: Monetary Authority of Singapore Internet Banking Technology Risk Management Guidelines

    The Monetary Authority of Singapore (MAS) has published a document that summarizes electronic security and risk management guidelines that financial institutions should consider when deploying Internet banking solutions to customers. The goal of this paper is to provide banks with a sound framework of risk management principles and security practices,...

    Provided By Tripwire

  • White Papers // Mar 2009

    Addressing Compliance Initiatives With Tripwire and the Center for Internet Security (CIS)

    In this paper, discover what you need to build an effective compliance program by understanding benchmarks, the basic building blocks of compliance initiatives. This whitepaper looks at: What the CIS is and how it develops its benchmarks How to use the benchmarks to address compliance and security Some considerations...

    Provided By Tripwire

  • White Papers // Feb 2009

    Beyond PCI Checklists: Securing Cardholder Data With Enhanced File Integrity Monitoring

    The Payment Card Industry Data Security Standard (PCI DSS) applies to any organization that accepts stores or processes payment cards of any type and is a comprehensive checklist of actions these organizations must take to improve the security of global payment systems. Although the adoption of PCI DSS by an...

    Provided By Tripwire

  • White Papers // Jun 2009

    Dynamic Data Center Compliance With Tripwire and Microsoft

    Compliance is a reality, but IT Operations does not need to become a security expert to monitor the health of their IT infrastructure in real-time. With the Tripwire Compliance Management Pack for System Center, users gain a central, end-to-end solution for monitoring the health and performance of their virtual and...

    Provided By Tripwire

  • White Papers // Aug 2009

    FISMA: Securing Federal Systems and Data With Tripwire

    Recognizing the importance of securing federal systems and data, Congress passed the Federal Information Security Management Act (FIMSA) in 2002. The act requires federal agencies develop, document and implement agency-wide information security programs to protect the confidentiality, integrity and availability of the data and systems that support government operations and...

    Provided By Tripwire

  • White Papers // Jul 2009

    Sustaining SOX Compliance: Best Practices to Mitigate Risk, Automate Compliance, and Reduce Costs

    To successfully sustain SOX compliance, organizations must implement best practices to ensure IT systems not only achieve a known and trusted state but they also maintain that state. Management must be more accountable and aware of the need for a continuous and proactive operational risk management environment that recognizes the...

    Provided By Tripwire

  • White Papers // Apr 2009

    Seven Practical Steps for Federal Cyber Security and FISMA Compliance

    The number of security breaches of federal information systems and cases of improper access to these systems continues to grow at an alarming rate. In fact, federal civilian agencies reported three times more cyber security incidents in 2008 than in 2006, according to the Department of Homeland Security (DHS). And...

    Provided By Tripwire

  • White Papers // Sep 2008

    IT Service Management Metrics Metrics That Matter: Four Key Benchmarks for Improving IT Performance

    Does one think great IT performance is achieved through luck or chance? One can bet real money it's not! High performing organizations have figured out which processes and controls really help them achieve their operational effectiveness and efficiency objectives. They have integrated those processes and controls into how they manage...

    Provided By Tripwire

  • White Papers // Jun 2012

    SCM: The "Blocking and Tackling" of IT Security

    In IT security, obvious weaknesses like weak configurations often get overlooked. Yet for hackers, they're an open door into networks and systems. Learn how security configuration management (SCM), a critical security control, hardens configurations to prevent breaches, and immediately detects and corrects any subsequent changes that weaken them.

    Provided By Tripwire

  • White Papers // Jun 2012

    Security-In-Depth Using Integrated Risk-Conscious Controls

    Most organizations take a perimeter-centric approach to security, assuming most attacks come from outside the organization. Yet there's no longer a clear boundary between what's inside or outside the organization, and attackers range from unhappy employees to well-funded, state-sponsored hackers. Organizations need a new approach to IT security.

    Provided By Tripwire

  • White Papers // Jun 2012

    Security Configuration Management: Foundational Security with Tripwire Enterprise

    SCM provides the most security "bang for the buck" against today's threats, which is why the SANS Institute places so much importance on using it. With Tripwire Enterprise as your SCM solution, that foundational control extends across the enterprise infrastructure.

    Provided By Tripwire

  • Webcasts // Jan 2009

    Failing Grade or Honors Graduate? How Educational Institutions Use File Integrity Monitoring to Achieve PCI Compliance

    The number of educational institutions that have suffered a system breach continues to increase. Schools conduct millions of transactions every year, from online tuition pay to cafeteria and bookstore purchases, making them vulnerable to the same electronic break-ins as any major retailer. That's why it is important, and now mandatory,...

    Provided By Tripwire

  • Webcasts // Jan 2009

    Achieving PCI Compliance With Enhanced File Integrity Monitoring

    Compliance with PCI DSS is mandatory for merchants, no matter how many (or few) payment card transactions are processed each year or how much infrastructure is in scope. Failure to comply continues to result in stiff penalties. Even if one pass the first audit there's always next year. That's why...

    Provided By Tripwire

  • Webcasts // Jan 2009

    Does Virtualization Put Security at Risk?

    The cost benefits of virtualization are so great that the current economic situation will drive IT departments to greater adoption of the technology. However, security continues to be of utmost concern, especially as virtualization is used beyond pre-production environments. This webcast discusses the types of virtual environments where security is...

    Provided By Tripwire

  • Webcasts // Jan 2009

    How the Economic Crisis Will Affect IT Security

    The global economic downturn may affect IT departments more than just having to manage under decreased budgets. Sudden acquisitions and mergers that require quick IT integration, opportunistic attacks and phishing, additional and potentially more severe regulations, and the impact of these factors on critical priorities, all place greater emphasis on...

    Provided By Tripwire

  • Webcasts // Jan 2009

    Virtually Compliant: How Virtualization Technologies Impact PCI DSS Compliance

    More and more, organizations are deploying mission-critical applications in virtualized production environments. In many cases, it is without a full understanding of how virtualization impacts compliance and security - including uncertainty over whether or not virtualized systems can be in scope for PCI compliance and what the top security risks...

    Provided By Tripwire

  • Webcasts // Jan 2009

    Staying PCI Compliant in Virtual and Physical Environments

    Many organizations responsible for PCI compliance have stalled adoption of virtualization simply because they do not know if virtual servers are in scope for PCI compliance or how they would be audited. But increasingly, organizations are taking deliberate steps to stay PCI compliant while successfully rolling out virtualization across the...

    Provided By Tripwire

  • Webcasts // Jan 2009

    Insights From an Auditor: Ensuring a Successful PCI Audit

    Appropriate processing and storing of cardholder data has become a very hot issue, especially given recent headlines regarding companies who have suffered expensive and debilitating security breaches. That's why the pressure is on for merchants to become compliant with the Payment Card Industry (PCI) Data Security Standard. But who needs...

    Provided By Tripwire

  • Webcasts // Jan 2009

    SOX Compliance: Reducing Risk and Cost With Tripwire

    While many businesses have completed at least one Sarbanes-Oxley audit, the challenge is in maintaining compliance while keeping associated costs under control. In a business environment facing new and varied regulatory challenges, getting the right tools, processes and policies in place in order to sustain compliance has never been more...

    Provided By Tripwire

  • Webcasts // Jan 2009

    Configuration Audit and Control: 10 Critical Factors to CCM Success

    As businesses have instituted internal, industry and government mandated regulatory compliance, the need for audit data to provide conformity has also become a necessity. However, traditional change management and configuration management tools do not comprehensively address all aspects of the vast configuration details inherent in complex IT infrastructures. Configuration audit...

    Provided By Tripwire

  • Webcasts // Jan 2009

    Improving IT Infrastructure With Change Management

    With more and more enterprise systems moving to virtual IT environments, it is important to take the necessary steps to safeguard the entire enterprise. The presenters describe how virtualization is changing the management of IT environments, and what the organization can do to successfully take advantage of this enterprise-changing technology,...

    Provided By Tripwire

  • Webcasts // Jan 2009

    Virtual Realities: Securing Your Virtualized Environment

    To keep up with their expanding computing needs, more and more companies are turning to virtualization. But as they do, they find very real security concerns. Does virtualization puts one more at risk to security threats? What issues do companies tend to overlook as they secure virtualized environments? The presenters...

    Provided By Tripwire

  • Webcasts // Jan 2009

    Get Compliant, Stay Compliant - Automatically

    Compliance is no longer a one-time event, nor is it the means to an end. It now has much more significance than merely passing an audit. Why? A single failed configuration that goes unnoticed can possibly snowball into an entire data center being non-compliant. In today's complex environment, it is...

    Provided By Tripwire

  • Webcasts // Jan 2009

    An Introduction to Security Visible Ops With Gene Kim

    Based on 10 years of research, the Security Visible Ops methodology describes how to link IT security and operational objectives in four practical steps by integrating security controls into IT operational, software development and project management processes. The attendee of this webcast will discover how the organization can use Security...

    Provided By Tripwire

  • Webcasts // Jan 2009

    How to Manage Virtualization Before It Manages You

    With more and more enterprise systems moving to virtual IT environments, it is important to take the necessary steps to safeguard the entire enterprise. Two industry experts describe how virtualization is changing the management of IT environments, and what the organization can do to successfully take advantage of this enterprise-changing...

    Provided By Tripwire

  • Webcasts // Jan 2009

    PCI for Retailers: Staying Compliant in an Insecure World

    The pressure on retailers to achieve and prove compliance with the Payment Card Industry Data Security Standard (PCI DSS) is intensifying. Servers have been the primary focus of compliance, but now auditors are turning their scope on point of sale systems, which are increasingly vulnerable to security breaches. In the...

    Provided By Tripwire

  • Webcasts // Jan 2009

    Controlling Virtualization Security Risks: Tips From the Experts

    The need for increased computing agility, coupled with the increasing cost and complexity of IT systems, has driven the rapid adoption of virtualization technologies. While virtualization has operational and economic rewards, the reality is that when information security controls are improperly implemented or neglected in virtualized environments, real security risks...

    Provided By Tripwire

  • Webcasts // Jan 2009

    Securing the Power Grid: Automating NERC Cyber Security Compliance

    NERC requirements are designed to ensure that the bulk electric system in North America is reliable and adequate, and that power grids are secure from both external and internal threats. NERC includes more than 160 Critical Infrastructure Protection (CIP) Cyber Security Standards that are mandatory and enforceable, and that relate...

    Provided By Tripwire

  • Webcasts // Jan 2009

    Understanding and Mitigating Security Risks in Virtual Environments

    While virtualization has operational and economic rewards, the reality is that when information security controls are improperly implemented or neglected in virtualized environments, real security risks and exposures can be created faster than ever. The good news is that information security can take some practical steps right away to limit...

    Provided By Tripwire

  • Webcasts // Jan 2009

    A Trusted State of Business: Security Configuration Management and Change Auditing

    In a perfect world, IT security would be simple. There would be one set of guidelines and needs with easily applied best practices to meet those requirements. And everyone will be worry free. But security is anything but simple. People face different threats and demands for differing levels of security....

    Provided By Tripwire

  • Case Studies // Feb 2011

    Worldwide IT Infrastructure Services

    Terremark, the leading global provider of IT infrastructure services their business need is to increase security and prevent attacks with improved monitoring and alerting, gain immediate visibility to suspicious events for investigation and mitigation and use a single, flexible solution for managing security and compliance needs. Tripwire Log Center lets...

    Provided By Tripwire