sponsored by Tripwire, Inc.
Posted:  24 Feb 2011
Published:  24 Feb 2011
Format:  PDF
Length:  2  Page(s)
Type:  Data Sheet
Language:  English

Tools for monitoring and protecting the IT infrastructure have evolved into powerful, yet isolated, islands of defense. Because modern threats can take advantage of this isolation, IT security needs a single, comprehensive view of infrastructure security. And this view must offer greater visibility, intelligence, and automation than IT security has previously been able to achieve. In short, they need the Tripwire® VIA™ solution suite for IT security and compliance automation.

Tripwire supports out-of-the-box integration between Tripwire® Enterprise and Tripwire® Log Center, Tripwire’s next-generation solution for log and security event management. By joining these solutions, you can automatically correlate changes detected in Tripwire Enterprise with log and event data captured by Tripwire Log Center, granting immediate visibility to file and configuration changes, along with information about the context in which those changes were made.

IT Infrastructure | Log Management | Real Time Operating Systems | Security Event Management | Security Management | Security Threats

View All Resources sponsored by Tripwire, Inc.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement