Tripwire

Displaying 41-49 of 49 results

  • Webcasts // Jan 2009

    Achieving PCI Compliance With Enhanced File Integrity Monitoring

    Compliance with PCI DSS is mandatory for merchants, no matter how many (or few) payment card transactions are processed each year or how much infrastructure is in scope. Failure to comply continues to result in stiff penalties. Even if one pass the first audit there's always next year. That's why...

    Provided By Tripwire

  • Webcasts // Jan 2009

    Staying PCI Compliant in Virtual and Physical Environments

    Many organizations responsible for PCI compliance have stalled adoption of virtualization simply because they do not know if virtual servers are in scope for PCI compliance or how they would be audited. But increasingly, organizations are taking deliberate steps to stay PCI compliant while successfully rolling out virtualization across the...

    Provided By Tripwire

  • Webcasts // Jan 2009

    SOX Compliance: Reducing Risk and Cost With Tripwire

    While many businesses have completed at least one Sarbanes-Oxley audit, the challenge is in maintaining compliance while keeping associated costs under control. In a business environment facing new and varied regulatory challenges, getting the right tools, processes and policies in place in order to sustain compliance has never been more...

    Provided By Tripwire

  • Webcasts // Jan 2009

    Configuration Audit and Control: 10 Critical Factors to CCM Success

    As businesses have instituted internal, industry and government mandated regulatory compliance, the need for audit data to provide conformity has also become a necessity. However, traditional change management and configuration management tools do not comprehensively address all aspects of the vast configuration details inherent in complex IT infrastructures. Configuration audit...

    Provided By Tripwire

  • Webcasts // Jan 2009

    Improving IT Infrastructure With Change Management

    With more and more enterprise systems moving to virtual IT environments, it is important to take the necessary steps to safeguard the entire enterprise. The presenters describe how virtualization is changing the management of IT environments, and what the organization can do to successfully take advantage of this enterprise-changing technology,...

    Provided By Tripwire

  • Webcasts // Jan 2009

    An Introduction to Security Visible Ops With Gene Kim

    Based on 10 years of research, the Security Visible Ops methodology describes how to link IT security and operational objectives in four practical steps by integrating security controls into IT operational, software development and project management processes. The attendee of this webcast will discover how the organization can use Security...

    Provided By Tripwire

  • Webcasts // Jan 2009

    Controlling Virtualization Security Risks: Tips From the Experts

    The need for increased computing agility, coupled with the increasing cost and complexity of IT systems, has driven the rapid adoption of virtualization technologies. While virtualization has operational and economic rewards, the reality is that when information security controls are improperly implemented or neglected in virtualized environments, real security risks...

    Provided By Tripwire

  • White Papers // Sep 2008

    IT Service Management Metrics Metrics That Matter: Four Key Benchmarks for Improving IT Performance

    Does one think great IT performance is achieved through luck or chance? One can bet real money it's not! High performing organizations have figured out which processes and controls really help them achieve their operational effectiveness and efficiency objectives. They have integrated those processes and controls into how they manage...

    Provided By Tripwire

  • White Papers // Dec 2005

    Addressing the Requirements of: Monetary Authority of Singapore Internet Banking Technology Risk Management Guidelines

    The Monetary Authority of Singapore (MAS) has published a document that summarizes electronic security and risk management guidelines that financial institutions should consider when deploying Internet banking solutions to customers. The goal of this paper is to provide banks with a sound framework of risk management principles and security practices,...

    Provided By Tripwire

  • White Papers // Oct 2010

    Managed Compliance: Streamlining Multiple Compliance Mandates with Visibility, Intelligence and Auto

    A perfect storm is brewing, with increasingly complex, persistent cyber threats and more numerous and prescriptive compliance mandates to protect against them. In this white paper, learn how to ride out this storm with automated solutions that reduce threats, meet multi-compliance demands, and help pass audits.

    Provided By Tripwire

  • White Papers // Nov 2010

    Automation Makes Perfect: Taking the Time Crunch Out of IT Compliance with Automation

    Automation makes compliance part of day-to-day operations, enabling CIOs to shift time to more important things-like a security strategy that protects the business, rather than simply pleases an auditor. Read this exclusive white paper from compliance leader Tripwire to learn how a Protect, Detect, and Correct compliance strategy can give...

    Provided By Tripwire

  • White Papers // Nov 2010

    On Common Ground: Where Compliance and Data Protection Overlap

    Today's CISOs face more challenges than ever, including increased and more sophisticated threats, complex IT environments, decreased budgets, and greater compliance pressures. But these challenges present opportunity. Learn how CISOs can play these challenges to their advantage to meet both data protection and compliance demands.

    Provided By Tripwire

  • White Papers // Nov 2010

    Pulling the Plug on Legacy Log Management

    When it comes to log management today, CSOs have been left in the lurch. According to a new IDG Research Services survey, organizations are poised to "rip and replace" legacy technology to get a better handle on compliance and security. This paper includes key research findings and strategies to overcome...

    Provided By Tripwire

  • White Papers // Nov 2010

    Cyberwar Threats: New Security Strategies for Governments

    Threats posed by cyberwar cannot be defended using the traditional all-or-nothing security that's aimed solely at keeping attackers out of the government enterprise. Learn why that's so, what's needed to tackle the new threats, and why Tripwire's solutions provide the real-time awareness necessary to fight cyberwar.

    Provided By Tripwire

  • White Papers // Nov 2010

    Data Protection 2.0: It's Not Just Names and Numbers Anymore

    Data Protection 2.0: It's Not Just Names and Numbers Anymore Meet this data protection challenge head on with a new way to categorize sensitive data that helps you reduce data breach risk and take more control of your most critical assets. Discover how.

    Provided By Tripwire

  • White Papers // Nov 2010

    Five Challenges for Continuous PCI DSS Compliance

    With adoption of the PCI DSS expanding throughout the United States and into Europe, organizations subject to PCI compliance face several key challenges. Learn more about these challenges, how to address them, and how Tripwire IT security and compliance automation solutions can help.

    Provided By Tripwire

  • White Papers // Oct 2010

    Mind the Gap: CISOs Work to Narrow the Breach-to-Detection Gap for Better Security

    What's more important, security or compliance? Most IT shops are focused on compliance but breaches are still happening. A recent study by Verizon Business concludes that evidence of those breaches tends to be right there in log files. But CISOs aren't tapping into that intelligence and many breaches go undetected...

    Provided By Tripwire

  • White Papers // Nov 2010

    A Pragmatic Approach to SIEM: Buy for Compliance, Use for Security with Anton Chuvakin

    Too often, organizations purchase SIEM and log management solutions to check a compliance checkbox. These organizations miss a huge opportunity to improve security while meeting compliance requirements. In this white paper, security and compliance expert Dr. Anton Chuvakin explains how to take advantage of this opportunity.

    Provided By Tripwire