Menu
  • Home
  • Radar Console
    • About the Radar
    • Go to Radar Console
    • Vulnerability Details
    • Overall Alerts
  • The Product Directory
    • About the Product Directory
  • CND Community
    • Contact Us
    • Blog
    • Packet Headers
    • Other Charts
    • Security Cartoons
  • Home
  • Radar Console
    • About the Radar
    • Go to Radar Console
    • Vulnerability Details
    • Overall Alerts
  • The Product Directory
    • About the Product Directory
  • CND Community
    • Contact Us
    • Blog
    • Packet Headers
    • Other Charts
    • Security Cartoons

Tripwire Enterprise

Tripwire Enterprise is the configuration control solution that combines best-of-breed file integrity monitoring with comprehensive compliance policy management to protect, detect and correct IT systems throughout the modern enterprise. As a part of the Tripwire VIA solution suite, Tripwire Enterprise provides heightened levels of visibility, intelligence and automation to the job of securing IT infrastructures.

File Integrity Manager detects changes to servers and devices in real-time across heterogeneous physical and virtual IT infrastructures. File Integrity Manager discovers and alerts on everything from botnets and rootkits to simple permission and access errors, minimizing threats and breaches. It generates in-depth before and after views of file and configuration changes, assures ongoing system integrity, and automates the process of detecting, auditing and reconciling changes — even the low-profile, obscure changes that reveal advanced hacks and exploits.

Compliance Policy Manager protects IT infrastructures by assessing them against over 250 standards for information security: from regulatory-based policies like PCI, NERC and FISMA to security standards like NIST, DISA and CIS. Real-time assessments make policy information accessible and portable, and can be displayed as dashboards, trend graphs, detailed reports, or generate executive-level compliance summaries. Compliance Policy Manager automates audit preparation, provides instant visibility into compliance levels, and satisfies auditors.

Tripwire Enterprise’s Remediation Manager corrects drifted or misaligned system configurations. It uses an extensive library of built-in scripts to instantly transform non-compliant server and device configurations into secure and audit-ready ones — faster and less expensively than manual configuration changes. These scripts work in conjunction with role-based approvals, workflow tracking, and sign-off management to provide an effective bridge between compliance, security and IT operations teams.

Rating
0 vote
Favoured:
0

Listing Details

Vendor
Tripwire by HelpSystems
Website
Visit the Product Site
Pricing Model
Commercial
Modified
2022-08-24
Owner
michelemjordan
Created
2008-08-18
Tags
file integrity, compliance scanning, compliance management
  • 1150.png
RecommendReport
  • Web Application FW +
  • Cloud Security Services
  • Static Code Analysis
  • Boundary Guards +
  • Network Anomoly Detection +
  • Scanning Products +
    • - Network Enumerators
    • - Passive Fingerprinters
    • - Active Fingerprinters
    • - Vulnerability Exploitation
    • - Network Mapping
    • - Distributed Scanners
    • - Host Scanners
    • - Website Scanners +
    • - Database Scanners
    • - Wardialers
    • - Wireless Tools
    • - Bluetooth Scanners
    • - Network Scanners
    • - Vulnerability Management
    • - Compliance +
      • - PCI DSS
      • - SOX
      • - NERC
      • - HIPAA
      • - GLBA
      • - FISMA
      • - Basel II
      • - NSA
      • - Bill 198
      • - US FDA CFR Pt 11
      • - NSSC
      • - FDCC
      • - JSOX
    • - Mobile Device Scanners
    • - Pen-Testing Distros
  • Network Access Control
  • Server Security Products +
  • Endpoint Security +
  • Forensic Solutions +
  • Malware Protection +
  • Patch Management +
  • Reputational Intelligence
  • Insider Threat Solutions
  • Phishing Assessment
  • Virtualisation Security
  • SIEM
  • Vulnerability Alert Services
  • Security Training +
  • Security Conferences
  • Password Managers
  • TSCM Bug Sweeping +
  • Geeky Gadgets
  • Visio Stencils
  • Uncategorised

CND Services - Assessing Your Security

  • Risk Assessment
  • Cyber Profile Assessment
  • Cyber Essentials
  • Vulnerability Assessment
  • Web App Scanning
  • Penetration Testing
  • Red Teaming
  • Phishing Assessment
  • Security Compliance
  • Firewall Audit
  • Forensic Readiness
  • vCISO
  • Aviation vCRSM
  • Maritime vCySO

CND Services - Preventing an Attack

  • Superyacht Cyber
  • Secure Cloud Configuration
  • Security Architecture
  • IDS & IPS
  • Blockchain Security
  • Data Loss Prevention
  • System Security Hardening
  • Insider Threat Prevention
  • Cisco Advanced Security
  • Vulnerability Management

CND Services - Detecting an Attack

  • Splunk Services
  • SIEM
  • XDR
  • MDR
  • EDR
  • Building a SOC
  • SOC Maturity
  • Staffing a SOC
  • Cloud Security Monitoring
  • Insider Threat Detection
  • GPG13 Protective Monitoring
  • Cyber Threat Intelligence
  • Branded Radar Console

CND Services - Responding to Incidents

  • Breach Triage
  • Incident Response
  • Incident Support
  • Breach Impact
  • Root Cause Analysis
  • Breach Remediation
  • Risk Assessment
  • Forensic Readiness
  • IR Planning

CND Services - Managed Security

  • Managed SOC
  • Managed Cyber Education
  • Managed Phishing Assessments
  • vCISO
  • Vulnerability Assessments
  • Vulnerability Management
  • XDR
  • MDR
  • EDR
  • Managed SIEM

CND Services - Superyacht Services

  • Complete IMO Cyber
  • Superyacht Intelligence
  • Cyber Assessment
  • Cyber Plan & Policies
  • Cyber Monitoring
  • Cyber Officer CySO
  • Maritime Blog

CND Services - Recruitment

   

© Computer Network Defence Limited 2023

Privacy Notice
Terms & Conditions
Send us a Message