Tripwire VIA: THE IT SECURITY PLATFORM

Tripwire’s IT security software reduces risk, ensures systems and data security, and automatesregulatory compliance. Tripwire offerings solve the security configuration management,continuous monitoring, and incident detection problems facing organizations of all sizes, as stand-alone solutions or in concert with other IT security controls.

Tripwire ENTERPRISE:
SECURITY CONFIGURATION MANAGEMENT FOR ALL

Nothing is more critical to information security than establishing and maintaining “known and trusted” configuration states for servers, network devices and databases. Even with that achieved, IT networks are porous and constantly shifting. The IT security solutions that protect them need continual connections to businesses that are highly dynamic and changeable.

Security Configuration Management is the end-to-end process that continually assures the integrity of security configurations and the information they protect. It connects your IT configurations to the initiatives and measures that matter to your business, continually protects information systems, and detects the issues and deviations that increase risk.

Tripwire LOG CENTER: LOG AND EVENT MANAGEMENT FOR SECURITY AND COMPLIANCE

Your organization needs to respond to IT security threats in real time and prove compliance with security standards like PCI, NERC, and the EU Data Privacy Directive. Tripwire Log Center helps you do both by detecting suspicious activity and aggregating the raw log data required for compliance audits and security forensics investigations.

Tripwire Log Center detects suspicious user and asset activity through advanced correlation, intelligent visualization and automated log analysis. Tripwire Log Center provides log and event management capabilities that integrate tightly with Tripwire Enterprise and Tripwire IP360 to provide true Log Intelligence.


With Tripwire Log Center, you can:

* Have confidence that all log data has been securely and reliably collected
* Recognize leading indicators of potential unauthorized system access
* Access the information necessary for security forensic investigations and compliance reporting by aggregating all logged events
* Focus your security efforts by correlating known and trusted configuration state, change, vulnerability, and event information
* Proactively respond to threats by using dashboards to see security trends and analyze your security and operational statey
* Gather business context, suspicious asset activity, and user context by integrating with Tripwire Enterprise and Microsoft Active Directory
* Correlate system state with suspicious activity on high value assets to enable prioritization
* Find accurate, complete log and event information with easy-to-perform queries across all * platforms and devices with standards-based language classification of log and event messages
* Gain interoperability to perform investigations of security incidents that fit into existing workflows, feeding to other enterprise SIEM or GRC tools


 

tripwire