All resources sponsored by:

Tripwire, Inc.

1 - 25 of 52 Matches
10 Steps for Early Incident Detection
sponsored by Tripwire, Inc.
WHITE PAPER:The earlier a security breach is detected, the faster an organization can recover. View this informative white paper to learn more about the ten steps to faster detection of security incidents. IT security is only as effective as it's response time, so be sure you're prepared for a breach.
Posted: 02 Oct 2012 | Published: 02 Oct 2012
Get This Now


Tripwire Log Center Product Brief
sponsored by Tripwire, Inc.
WHITE PAPER:Consult this informative white paper to learn how log management is helping to better identify threats and deploy security information and event management systems (SIEM). Learn how you can uncover suspicious activities and improve security by reading this asset now.
Posted: 02 Oct 2012 | Published: 02 Oct 2012
Get This Now


A Pragmatic Approach to SIEM: Buy for Compliance, Use for Security
sponsored by Tripwire, Inc.
WHITE PAPER:Consult this informative white paper so you can gain a better understanding of the definition of SIEM and log management tools and what they can do for you. Find out more about the features of SIEM and what you should look for when selecting a product.
Posted: 01 Oct 2012 | Published: 01 Oct 2012
Get This Now


Tripwire VIA System State Intelligence executive brief
sponsored by Tripwire, Inc.
WHITE PAPER:What's missing from today's approach to IT security is real-time security intelligence that immediately shows you when you have a security problem, what caused it and what to do about it. This white paper reveals how you can easily utilize cutting-edge technologies to take the guesswork out of identifying the activity that needs your attention.
Posted: 28 Sep 2012 | Published: 28 Sep 2012
Get This Now


Security-In-Depth Using Integrated Risk-Conscious Controls
sponsored by Tripwire, Inc.
WHITE PAPER:This white paper explores how your organization can change the way it protects its critical data, combining preventive, detective and corrective controls to stop breaches from happening, detect threats as they arise, and correct settings that introduce security risk or non-compliance. Read now to learn more.
Posted: 28 Sep 2012 | Published: 30 Dec 2011
Get This Now


Smart, Visible and Automated: The New Log Management
sponsored by Tripwire, Inc.
WHITE PAPER:View this informative white paper to learn more about moving to a more advanced risk protection policy. Improve your log management capabilities by implementing functionality with SIEM, file integrity monitoring and more!
Posted: 27 Sep 2012 | Published: 28 Sep 2012
Get This Now


Tripwire IT Security and Compliance Automation Solutions: Empowering IT Security
sponsored by Tripwire, Inc.
WHITE PAPER:View this informative white paper to learn how you can improve your IT security practices. Uncover some of the toughest challenges to maintaining Confidentiality, Integrity, and Availability (CIA). Uncover the sensitive data that needs protection as well as security policies and controls that could lead to a false of security.
Posted: 26 Sep 2012 | Published: 26 Sep 2012
Get This Now


Continuous Monitoring: Responding to New Threats in More Complex IT Environments
sponsored by Tripwire, Inc.
WHITE PAPER:Governments today are focusing on the practice of continuous monitoring as a means to providing the much needed balance between data access and protection. In this paper, learn more about continuous monitoring, including what is it and why it’s needed, guidelines for implementing it, key capabilities of an effective solution, and more.
Posted: 24 Feb 2012 | Published: 24 Feb 2012
Get This Now


Tripwire IT Security & Compliance Automation Solutions –Empowering IT Security in an Insecure World
sponsored by Tripwire, Inc.
WHITE PAPER:In this solution brief, discover how Tripwire IT security and compliance automation solutions provides the visibility, intelligence and automation of IT security controls needed to gain confidence in the protection of your data.
Posted: 24 Feb 2012 | Published: 24 Feb 2012
Get This Now


Layered Security: Protecting Your Data in Today's Threat Landscape
sponsored by Tripwire, Inc.
WHITE PAPER:In this white paper, learn how threats have evolved over time, shortcomings of the perimeter-centric approach to security, steps to implementing a layered security approach to security, and much more.
Posted: 15 Nov 2011 | Published: 15 Nov 2011
Get This Now


White Paper: SCM: The "Blocking and Tackling" of IT Security
sponsored by Tripwire, Inc.
WHITE PAPER:In IT security, obvious weaknesses like weak configurations often get overlooked. Yet for hackers, they’re an open door into networks and systems. Learn how security configuration management (SCM), a critical security control, hardens configurations to prevent breaches, and immediately detects and corrects any subsequent changes that weaken them.
Posted: 10 Nov 2011 | Published: 10 Nov 2011
Get This Now


Security-In-Depth Using Integrated Risk-Conscious Controls
sponsored by Tripwire, Inc.
WHITE PAPER:Most organizations seem stuck in the traditional castle-and-moat approach to security. This approach assumes there's a clear boundary between what's inside and outside the organization and that attacks come from external sources. Clearly today's threat environment requires a new approach.
Posted: 09 Nov 2011 | Published: 09 Nov 2011
Get This Now


E-Guide: Striving for Better Information Security Intelligence
sponsored by Tripwire, Inc.
EGUIDE:The need for realistic awareness of the threat landscape has led many businesses to expand their investment to broader insight outside the organization, and deeper visibility within. This expert tip explains how to turn data deluge into business opportunity and offers advice on managing threat exposure in complex IT environments.
Posted: 15 Sep 2011 | Published: 15 Sep 2011
Get This Now


E-Guide: Exploring Configuration Changes to Reduce Attacks
sponsored by Tripwire, Inc.
EGUIDE:Configuration changes help organizations with limited IT staff and resources not only mitigate against known threats, but also future attacks. This expert e-guide explains why firms continue to struggle with zero-day vulnerabilities and offers advice on how to lock down systems to eliminate threats posed by high-profile attacks.
Posted: 15 Sep 2011 | Published: 15 Sep 2011
Get This Now


Protect, Detect, and Correct: What's New in Tripwire Enterprise 8
sponsored by Tripwire, Inc.
DATA SHEET:Configurations that "drift" from compliance, by the accrual of gradual, sometimes minute changes often lead to exploits, audit failures, and unplanned repair time. Worse still, it takes even more time to bring new, fresh, out-of-the-box servers up to a compliant, audit-passing state—sometimes a half a day or more per machine.
Posted: 24 Feb 2011 | Published: 24 Feb 2011
Get This Now


Compliance Policy Management: Continuous Compliance with Tripwire Enterprise
sponsored by Tripwire, Inc.
DATA SHEET:Improperly configured physical and virtual IT infrastructure is the leading cause of security breaches. As a result, organizations are subject to an increasing number of complex regulations or standards designed to secure the IT infrastructure.
Posted: 24 Feb 2011 | Published: 24 Feb 2011
Get This Now


Tripwire Enterprise and Tripwire Log Center: Integrated for Unparalleled Security
sponsored by Tripwire, Inc.
DATA SHEET:Tools for monitoring and protecting the IT infrastructure have evolved into powerful, yet isolated, islands of defense. Because modern threats can take advantage of this isolation, IT security needs a single, comprehensive view of infrastructure security.
Posted: 24 Feb 2011 | Published: 24 Feb 2011
Get This Now


Tripwire Log Center
sponsored by Tripwire, Inc.
WHITE PAPER:A decade or more ago, logs of events recorded by firewalls, intrusion detection systems and other network devices were considered more of a nuisance than a help. There were too many of them, they weren’t easily collected, and there was no easy way to make sense of which were important.
Posted: 08 Feb 2011 | Published: 08 Feb 2011
Get This Now


PCI Basics: What it Takes to Be Compliant
sponsored by Tripwire, Inc.
WHITE PAPER:This paper discusses the basic requirements of the PCI DSS, with a focus on the administrative and technical elements of the program. It also reviews the validation requirements of the standard and potential sanctions for failure to comply.
Posted: 08 Feb 2011 | Published: 07 Feb 2011
Get This Now


Managed Compliance: Streamlining Multiple Compliance Mandates with Visibility, Intelligence, and Automation
sponsored by Tripwire, Inc.
WHITE PAPER:This paper provides IT security and compliance professionals a roadmap and practical advice for implementing an approach to compliance that helps overcome IT security issues.
Posted: 08 Feb 2011 | Published: 07 Feb 2011
Get This Now


Data Protection 2.0: It’s Not Just Names and Numbers Anymore
sponsored by Tripwire, Inc.
WHITE PAPER:The external forces of advanced threats and compliance obligations, combined with the internal forces of new business initiatives, lead to a complex set of data protec­tion requirements. This paper provides an overview of the many data protection challenges CISOs face and suggests a sequence of five actions to take to address these challenges.
Posted: 08 Feb 2011 | Published: 08 Feb 2011
Get This Now


Mind the Gap: CISOs Work to Narrow the Breach-to-Detection Gap for Better Security
sponsored by Tripwire, Inc.
WHITE PAPER:Compliance is indeed a conscientious effort toward securing corpo­rate assets. IT organizations have committed much time and money to the cause. Despite security breaches still happening many still fly under the radar. This paper outlines what precautions need to be taken to avoid future security breaches.
Posted: 08 Feb 2011 | Published: 08 Feb 2011
Get This Now


A Pragmatic Approach to SIEM
sponsored by Tripwire, Inc.
WHITE PAPER:In this paper we will take a look at this disturbing trend and provide useful guidance for maximizing the value of SIEM and log management tools, while focusing on protecting systems and data not on simply checking the compliance check box.
Posted: 08 Feb 2011 | Published: 08 Feb 2011
Get This Now


Five Challenges to Continuous PCI DSS Compliance
sponsored by Tripwire, Inc.
WHITE PAPER:As the Payment Card Industry Data Security Standard (PCI DSS, or PCI) becomes more widely adopted in both the United States and Europe, organizations face five major challenges when navigating the PCI compliance landscape.
Posted: 07 Feb 2011 | Published: 07 Feb 2011
Get This Now


Meeting the True Intent of File Integrity Monitoring
sponsored by Tripwire, Inc.
WHITE PAPER:In this paper, we give an overview of FIM, an explanation of how FIM provides data protection and improves security, and what capabilities FIM must offer to effectively provide that data protection and security.
Posted: 29 Oct 2010 | Published: 28 Oct 2010
Get This Now


1 - 25 of 52 Matches
Page: 2 3 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement