Tripwire

Displaying 1-28 of 28 results

  • Webcasts // Jan 2009

    7 Steps to Understanding and Mitigating Virtualization Security Risks

    Virtualization is definitely here, and the benefits can be tremendous, including cost-savings from reduced hardware purchases, less real estate required to house machines and a more agile IT infrastructure. But virtualization introduces new security risks, including less visibility into the Virtual Infrastructure (VI), the potential for a single point of...

    Provided By Tripwire

  • Webcasts // Jan 2009

    SOX, GLBA and HIPAA: Multiple Regulations, One Compliance Solution

    SOX, GLBA and HIPAA regulations all require technical safeguards to protect or guarantee the veracity of critical information. With SOX, it's for public companies to guarantee accurate financial accounting. GLBA protects personal financial information of an organization's customers. And HIPAA protects and guarantees the privacy of an individual's Personal Health...

    Provided By Tripwire

  • Webcasts // Jan 2009

    Secure Sensitive Government Data and Maintain Compliance With Tripwire for Servers

    Able to detect and pinpoint changes to system and configuration files, Tripwire for Servers enables IT staff to determine what changed, when it changed, how it changed, who changed it- and to roll servers back to a known and trusted state if the change is not authorized or desired. Tripwire...

    Provided By Tripwire

  • Webcasts // Jan 2009

    Protect Government IT Infrastructure From Security Threats With Tripwire Enterprise

    Persistent weaknesses in information security policies and practices threaten the confidentiality, integrity and availability of the infrastructure. Unfortunately it's difficult to enforce policies without the ability to assess the state of the IT systems and continuously locate and identify incremental changes when they occur and who is responsible. Tripwire provides...

    Provided By Tripwire

  • Webcasts // Jan 2009

    Secure, Compliant and Optimized With Tripwire Enterprise

    The presenters of this webcast describe the challenges IT faces when managing the IT infrastructure of a typical enterprise organization: ensuring infrastructure security, proving compliance with a host of regulations and standards and providing highly available and high-performing services to internal and external customers. They then demonstrate how Tripwire Enterprise,...

    Provided By Tripwire

  • Webcasts // Jan 2009

    GCSx Code of Connection Compliance With Tripwire Enterprise

    The Code of Connection (CoCo) defines the minimum standards and processes that an authority must comply with before being able to connect to GCSx. Achieving compliance to the CoCo requires the local authority to provide a compliance statement and supporting comment against a number of security control measures. The attendee...

    Provided By Tripwire

  • Webcasts // Jan 2009

    Automating SOX Compliance With Tripwire's Powerful IT Controls

    While many businesses have successfully completed a Sarbanes-Oxley audit, the challenge is in maintaining compliance while keeping associated costs under control. The Securities and Exchange Commission (SEC) now recommends automating the Internal Controls for Financial Reporting (ICFR), the IT general controls required by SOX. And why not? Automated IT controls...

    Provided By Tripwire

  • Webcasts // Jan 2009

    Getting an X-Ray View of File Integrity Monitoring for PCI Compliance

    As Congress questions PCI and the credit card companies make concentrated efforts to increase compliance with PCI DSS, the underlying need remains the same: to protect the business from data breaches and other security violations. Yet, the effort remains a struggle as organizations seek a greater understanding-an X-ray vision-of managing...

    Provided By Tripwire

  • Webcasts // Jan 2009

    Achieving PCI Compliance With Enhanced File Integrity Monitoring and Configuration Assessment

    The attendee of this webcast will discover why file integrity monitoring is not only important to PCI DSS specifications, but is also an essential IT control. The presenter will give proven methods for automating compliance that not only satisfy the auditor's checklist but also alerts to non-compliant configurations.

    Provided By Tripwire

  • Webcasts // Jan 2009

    Failing Grade or Honors Graduate? How Educational Institutions Use File Integrity Monitoring to Achieve PCI Compliance

    The number of educational institutions that have suffered a system breach continues to increase. Schools conduct millions of transactions every year, from online tuition pay to cafeteria and bookstore purchases, making them vulnerable to the same electronic break-ins as any major retailer. That's why it is important, and now mandatory,...

    Provided By Tripwire

  • Webcasts // Jan 2009

    Achieving PCI Compliance With Enhanced File Integrity Monitoring

    Compliance with PCI DSS is mandatory for merchants, no matter how many (or few) payment card transactions are processed each year or how much infrastructure is in scope. Failure to comply continues to result in stiff penalties. Even if one pass the first audit there's always next year. That's why...

    Provided By Tripwire

  • Webcasts // Jan 2009

    Does Virtualization Put Security at Risk?

    The cost benefits of virtualization are so great that the current economic situation will drive IT departments to greater adoption of the technology. However, security continues to be of utmost concern, especially as virtualization is used beyond pre-production environments. This webcast discusses the types of virtual environments where security is...

    Provided By Tripwire

  • Webcasts // Jan 2009

    How the Economic Crisis Will Affect IT Security

    The global economic downturn may affect IT departments more than just having to manage under decreased budgets. Sudden acquisitions and mergers that require quick IT integration, opportunistic attacks and phishing, additional and potentially more severe regulations, and the impact of these factors on critical priorities, all place greater emphasis on...

    Provided By Tripwire

  • Webcasts // Jan 2009

    Virtually Compliant: How Virtualization Technologies Impact PCI DSS Compliance

    More and more, organizations are deploying mission-critical applications in virtualized production environments. In many cases, it is without a full understanding of how virtualization impacts compliance and security - including uncertainty over whether or not virtualized systems can be in scope for PCI compliance and what the top security risks...

    Provided By Tripwire

  • Webcasts // Jan 2009

    Staying PCI Compliant in Virtual and Physical Environments

    Many organizations responsible for PCI compliance have stalled adoption of virtualization simply because they do not know if virtual servers are in scope for PCI compliance or how they would be audited. But increasingly, organizations are taking deliberate steps to stay PCI compliant while successfully rolling out virtualization across the...

    Provided By Tripwire

  • Webcasts // Jan 2009

    Insights From an Auditor: Ensuring a Successful PCI Audit

    Appropriate processing and storing of cardholder data has become a very hot issue, especially given recent headlines regarding companies who have suffered expensive and debilitating security breaches. That's why the pressure is on for merchants to become compliant with the Payment Card Industry (PCI) Data Security Standard. But who needs...

    Provided By Tripwire

  • Webcasts // Jan 2009

    SOX Compliance: Reducing Risk and Cost With Tripwire

    While many businesses have completed at least one Sarbanes-Oxley audit, the challenge is in maintaining compliance while keeping associated costs under control. In a business environment facing new and varied regulatory challenges, getting the right tools, processes and policies in place in order to sustain compliance has never been more...

    Provided By Tripwire

  • Webcasts // Jan 2009

    Configuration Audit and Control: 10 Critical Factors to CCM Success

    As businesses have instituted internal, industry and government mandated regulatory compliance, the need for audit data to provide conformity has also become a necessity. However, traditional change management and configuration management tools do not comprehensively address all aspects of the vast configuration details inherent in complex IT infrastructures. Configuration audit...

    Provided By Tripwire

  • Webcasts // Jan 2009

    Improving IT Infrastructure With Change Management

    With more and more enterprise systems moving to virtual IT environments, it is important to take the necessary steps to safeguard the entire enterprise. The presenters describe how virtualization is changing the management of IT environments, and what the organization can do to successfully take advantage of this enterprise-changing technology,...

    Provided By Tripwire

  • Webcasts // Jan 2009

    Virtual Realities: Securing Your Virtualized Environment

    To keep up with their expanding computing needs, more and more companies are turning to virtualization. But as they do, they find very real security concerns. Does virtualization puts one more at risk to security threats? What issues do companies tend to overlook as they secure virtualized environments? The presenters...

    Provided By Tripwire

  • Webcasts // Jan 2009

    Get Compliant, Stay Compliant - Automatically

    Compliance is no longer a one-time event, nor is it the means to an end. It now has much more significance than merely passing an audit. Why? A single failed configuration that goes unnoticed can possibly snowball into an entire data center being non-compliant. In today's complex environment, it is...

    Provided By Tripwire

  • Webcasts // Jan 2009

    An Introduction to Security Visible Ops With Gene Kim

    Based on 10 years of research, the Security Visible Ops methodology describes how to link IT security and operational objectives in four practical steps by integrating security controls into IT operational, software development and project management processes. The attendee of this webcast will discover how the organization can use Security...

    Provided By Tripwire

  • Webcasts // Jan 2009

    How to Manage Virtualization Before It Manages You

    With more and more enterprise systems moving to virtual IT environments, it is important to take the necessary steps to safeguard the entire enterprise. Two industry experts describe how virtualization is changing the management of IT environments, and what the organization can do to successfully take advantage of this enterprise-changing...

    Provided By Tripwire

  • Webcasts // Jan 2009

    PCI for Retailers: Staying Compliant in an Insecure World

    The pressure on retailers to achieve and prove compliance with the Payment Card Industry Data Security Standard (PCI DSS) is intensifying. Servers have been the primary focus of compliance, but now auditors are turning their scope on point of sale systems, which are increasingly vulnerable to security breaches. In the...

    Provided By Tripwire

  • Webcasts // Jan 2009

    Controlling Virtualization Security Risks: Tips From the Experts

    The need for increased computing agility, coupled with the increasing cost and complexity of IT systems, has driven the rapid adoption of virtualization technologies. While virtualization has operational and economic rewards, the reality is that when information security controls are improperly implemented or neglected in virtualized environments, real security risks...

    Provided By Tripwire

  • Webcasts // Jan 2009

    Securing the Power Grid: Automating NERC Cyber Security Compliance

    NERC requirements are designed to ensure that the bulk electric system in North America is reliable and adequate, and that power grids are secure from both external and internal threats. NERC includes more than 160 Critical Infrastructure Protection (CIP) Cyber Security Standards that are mandatory and enforceable, and that relate...

    Provided By Tripwire

  • Webcasts // Jan 2009

    Understanding and Mitigating Security Risks in Virtual Environments

    While virtualization has operational and economic rewards, the reality is that when information security controls are improperly implemented or neglected in virtualized environments, real security risks and exposures can be created faster than ever. The good news is that information security can take some practical steps right away to limit...

    Provided By Tripwire

  • Webcasts // Jan 2009

    A Trusted State of Business: Security Configuration Management and Change Auditing

    In a perfect world, IT security would be simple. There would be one set of guidelines and needs with easily applied best practices to meet those requirements. And everyone will be worry free. But security is anything but simple. People face different threats and demands for differing levels of security....

    Provided By Tripwire

  • Webcasts // Jan 2009

    7 Steps to Understanding and Mitigating Virtualization Security Risks

    Virtualization is definitely here, and the benefits can be tremendous, including cost-savings from reduced hardware purchases, less real estate required to house machines and a more agile IT infrastructure. But virtualization introduces new security risks, including less visibility into the Virtual Infrastructure (VI), the potential for a single point of...

    Provided By Tripwire

  • Webcasts // Jan 2009

    SOX, GLBA and HIPAA: Multiple Regulations, One Compliance Solution

    SOX, GLBA and HIPAA regulations all require technical safeguards to protect or guarantee the veracity of critical information. With SOX, it's for public companies to guarantee accurate financial accounting. GLBA protects personal financial information of an organization's customers. And HIPAA protects and guarantees the privacy of an individual's Personal Health...

    Provided By Tripwire

  • Webcasts // Jan 2009

    Secure Sensitive Government Data and Maintain Compliance With Tripwire for Servers

    Able to detect and pinpoint changes to system and configuration files, Tripwire for Servers enables IT staff to determine what changed, when it changed, how it changed, who changed it- and to roll servers back to a known and trusted state if the change is not authorized or desired. Tripwire...

    Provided By Tripwire

  • Webcasts // Jan 2009

    Protect Government IT Infrastructure From Security Threats With Tripwire Enterprise

    Persistent weaknesses in information security policies and practices threaten the confidentiality, integrity and availability of the infrastructure. Unfortunately it's difficult to enforce policies without the ability to assess the state of the IT systems and continuously locate and identify incremental changes when they occur and who is responsible. Tripwire provides...

    Provided By Tripwire

  • Webcasts // Jan 2009

    Secure, Compliant and Optimized With Tripwire Enterprise

    The presenters of this webcast describe the challenges IT faces when managing the IT infrastructure of a typical enterprise organization: ensuring infrastructure security, proving compliance with a host of regulations and standards and providing highly available and high-performing services to internal and external customers. They then demonstrate how Tripwire Enterprise,...

    Provided By Tripwire

  • Webcasts // Jan 2009

    GCSx Code of Connection Compliance With Tripwire Enterprise

    The Code of Connection (CoCo) defines the minimum standards and processes that an authority must comply with before being able to connect to GCSx. Achieving compliance to the CoCo requires the local authority to provide a compliance statement and supporting comment against a number of security control measures. The attendee...

    Provided By Tripwire

  • Webcasts // Jan 2009

    Automating SOX Compliance With Tripwire's Powerful IT Controls

    While many businesses have successfully completed a Sarbanes-Oxley audit, the challenge is in maintaining compliance while keeping associated costs under control. The Securities and Exchange Commission (SEC) now recommends automating the Internal Controls for Financial Reporting (ICFR), the IT general controls required by SOX. And why not? Automated IT controls...

    Provided By Tripwire

  • Webcasts // Jan 2009

    Getting an X-Ray View of File Integrity Monitoring for PCI Compliance

    As Congress questions PCI and the credit card companies make concentrated efforts to increase compliance with PCI DSS, the underlying need remains the same: to protect the business from data breaches and other security violations. Yet, the effort remains a struggle as organizations seek a greater understanding-an X-ray vision-of managing...

    Provided By Tripwire

  • Webcasts // Jan 2009

    Achieving PCI Compliance With Enhanced File Integrity Monitoring and Configuration Assessment

    The attendee of this webcast will discover why file integrity monitoring is not only important to PCI DSS specifications, but is also an essential IT control. The presenter will give proven methods for automating compliance that not only satisfy the auditor's checklist but also alerts to non-compliant configurations.

    Provided By Tripwire

  • Webcasts // Jan 2009

    Failing Grade or Honors Graduate? How Educational Institutions Use File Integrity Monitoring to Achieve PCI Compliance

    The number of educational institutions that have suffered a system breach continues to increase. Schools conduct millions of transactions every year, from online tuition pay to cafeteria and bookstore purchases, making them vulnerable to the same electronic break-ins as any major retailer. That's why it is important, and now mandatory,...

    Provided By Tripwire

  • Webcasts // Jan 2009

    Achieving PCI Compliance With Enhanced File Integrity Monitoring

    Compliance with PCI DSS is mandatory for merchants, no matter how many (or few) payment card transactions are processed each year or how much infrastructure is in scope. Failure to comply continues to result in stiff penalties. Even if one pass the first audit there's always next year. That's why...

    Provided By Tripwire

  • Webcasts // Jan 2009

    Does Virtualization Put Security at Risk?

    The cost benefits of virtualization are so great that the current economic situation will drive IT departments to greater adoption of the technology. However, security continues to be of utmost concern, especially as virtualization is used beyond pre-production environments. This webcast discusses the types of virtual environments where security is...

    Provided By Tripwire

  • Webcasts // Jan 2009

    How the Economic Crisis Will Affect IT Security

    The global economic downturn may affect IT departments more than just having to manage under decreased budgets. Sudden acquisitions and mergers that require quick IT integration, opportunistic attacks and phishing, additional and potentially more severe regulations, and the impact of these factors on critical priorities, all place greater emphasis on...

    Provided By Tripwire

  • Webcasts // Jan 2009

    Virtually Compliant: How Virtualization Technologies Impact PCI DSS Compliance

    More and more, organizations are deploying mission-critical applications in virtualized production environments. In many cases, it is without a full understanding of how virtualization impacts compliance and security - including uncertainty over whether or not virtualized systems can be in scope for PCI compliance and what the top security risks...

    Provided By Tripwire

  • Webcasts // Jan 2009

    Staying PCI Compliant in Virtual and Physical Environments

    Many organizations responsible for PCI compliance have stalled adoption of virtualization simply because they do not know if virtual servers are in scope for PCI compliance or how they would be audited. But increasingly, organizations are taking deliberate steps to stay PCI compliant while successfully rolling out virtualization across the...

    Provided By Tripwire

  • Webcasts // Jan 2009

    Insights From an Auditor: Ensuring a Successful PCI Audit

    Appropriate processing and storing of cardholder data has become a very hot issue, especially given recent headlines regarding companies who have suffered expensive and debilitating security breaches. That's why the pressure is on for merchants to become compliant with the Payment Card Industry (PCI) Data Security Standard. But who needs...

    Provided By Tripwire

  • Webcasts // Jan 2009

    SOX Compliance: Reducing Risk and Cost With Tripwire

    While many businesses have completed at least one Sarbanes-Oxley audit, the challenge is in maintaining compliance while keeping associated costs under control. In a business environment facing new and varied regulatory challenges, getting the right tools, processes and policies in place in order to sustain compliance has never been more...

    Provided By Tripwire

  • Webcasts // Jan 2009

    Configuration Audit and Control: 10 Critical Factors to CCM Success

    As businesses have instituted internal, industry and government mandated regulatory compliance, the need for audit data to provide conformity has also become a necessity. However, traditional change management and configuration management tools do not comprehensively address all aspects of the vast configuration details inherent in complex IT infrastructures. Configuration audit...

    Provided By Tripwire

  • Webcasts // Jan 2009

    Improving IT Infrastructure With Change Management

    With more and more enterprise systems moving to virtual IT environments, it is important to take the necessary steps to safeguard the entire enterprise. The presenters describe how virtualization is changing the management of IT environments, and what the organization can do to successfully take advantage of this enterprise-changing technology,...

    Provided By Tripwire

  • Webcasts // Jan 2009

    Virtual Realities: Securing Your Virtualized Environment

    To keep up with their expanding computing needs, more and more companies are turning to virtualization. But as they do, they find very real security concerns. Does virtualization puts one more at risk to security threats? What issues do companies tend to overlook as they secure virtualized environments? The presenters...

    Provided By Tripwire

  • Webcasts // Jan 2009

    Get Compliant, Stay Compliant - Automatically

    Compliance is no longer a one-time event, nor is it the means to an end. It now has much more significance than merely passing an audit. Why? A single failed configuration that goes unnoticed can possibly snowball into an entire data center being non-compliant. In today's complex environment, it is...

    Provided By Tripwire

  • Webcasts // Jan 2009

    An Introduction to Security Visible Ops With Gene Kim

    Based on 10 years of research, the Security Visible Ops methodology describes how to link IT security and operational objectives in four practical steps by integrating security controls into IT operational, software development and project management processes. The attendee of this webcast will discover how the organization can use Security...

    Provided By Tripwire

  • Webcasts // Jan 2009

    How to Manage Virtualization Before It Manages You

    With more and more enterprise systems moving to virtual IT environments, it is important to take the necessary steps to safeguard the entire enterprise. Two industry experts describe how virtualization is changing the management of IT environments, and what the organization can do to successfully take advantage of this enterprise-changing...

    Provided By Tripwire

  • Webcasts // Jan 2009

    PCI for Retailers: Staying Compliant in an Insecure World

    The pressure on retailers to achieve and prove compliance with the Payment Card Industry Data Security Standard (PCI DSS) is intensifying. Servers have been the primary focus of compliance, but now auditors are turning their scope on point of sale systems, which are increasingly vulnerable to security breaches. In the...

    Provided By Tripwire

  • Webcasts // Jan 2009

    Controlling Virtualization Security Risks: Tips From the Experts

    The need for increased computing agility, coupled with the increasing cost and complexity of IT systems, has driven the rapid adoption of virtualization technologies. While virtualization has operational and economic rewards, the reality is that when information security controls are improperly implemented or neglected in virtualized environments, real security risks...

    Provided By Tripwire

  • Webcasts // Jan 2009

    Securing the Power Grid: Automating NERC Cyber Security Compliance

    NERC requirements are designed to ensure that the bulk electric system in North America is reliable and adequate, and that power grids are secure from both external and internal threats. NERC includes more than 160 Critical Infrastructure Protection (CIP) Cyber Security Standards that are mandatory and enforceable, and that relate...

    Provided By Tripwire

  • Webcasts // Jan 2009

    Understanding and Mitigating Security Risks in Virtual Environments

    While virtualization has operational and economic rewards, the reality is that when information security controls are improperly implemented or neglected in virtualized environments, real security risks and exposures can be created faster than ever. The good news is that information security can take some practical steps right away to limit...

    Provided By Tripwire

  • Webcasts // Jan 2009

    A Trusted State of Business: Security Configuration Management and Change Auditing

    In a perfect world, IT security would be simple. There would be one set of guidelines and needs with easily applied best practices to meet those requirements. And everyone will be worry free. But security is anything but simple. People face different threats and demands for differing levels of security....

    Provided By Tripwire