About Tripwire

Tripwire Overview

Tripwire delivers advanced threat, security and compliance solutions used by over 9,000 organizations, including over 50% of the Fortune 500. Tripwire enables enterprises, service providers and government agencies around the world to detect, prevent and respond to cyber security threats.

Tripwire discovers every asset on an organization’s network and delivers high-fidelity visibility and deep intelligence about these endpoints. When combined with business-context, this valuable information enables immediate detection of breach activity and identifies other changes that can impact security risk.

Tripwire solutions also deliver actionable reports and alerts and enable the integration of valuable endpoint intelligence into operational systems like change management databases, ticketing systems, patch management and security solutions including SIEMS, malware detection and risk and analytics. These integrations are part of our Technology Alliance Program and they ensure our customers have robust, accurate information to make their organizations more cyber-secure.

Tripwire is built on a foundation of innovation and deep security expertise. While Tripwire’s founder, Gene Kim, was a graduate student at Purdue University, he created an initial version of the software in 1992 and pioneered many techniques still used in intrusion detection.

With widespread support from corporate, education, and government security professionals, Tripwire, Inc. was founded in 1997 to bring these innovations to the commercial market. In 2000, Tripwire contributed source code to the open source community to enable Open Source Tripwire— a tool that remains in use today. Tripwire continues to invest heavily in innovation and holds over 20 security innovation patents.

In 2005, Tripwire released the first version of Tripwire Enterprise, the company’s flagship product, designed to help organizations control IT configurations, a common attack vector used by cybercriminals to gain unauthorized access to critical systems. In 2010 announced the release of Tripwire Log Center, a log and security information and event management (SIEM) solution that correlates critical changes to configurations and events, making it possible to rapidly identify sophisticated and targeted cyber-attacks.

Innovation and growth continued with the acquisition of nCircle in 2013. The acquisition added solutions that assess risks from vulnerabilities to complement the company’s award winning product portfolio. Today, Tripwire’s integrated portfolio of award winning security solutions includes configuration and policy management, file integrity monitoring, vulnerability management and log intelligence. Tripwire is the second largest provider in the Security Vulnerability Management market as measured by IDC, delivering trusted cyber security solutions that allow customers to have confidence in their cyber security.

Featured Campaign from Tripwire

Back to Basics: A Focus on the First Six Critical Security Controls Against Breach

As in the recent Wannacry ransomware attack, investigations performed after breaches and other security incidents reveal that the majority occur simply because well-known security controls and practices were not implemented or were not working as organisations had assumed.

Rather than a lack of choices in security solutions, the major problem in cyber security is a lack of a defined and repeatable process for selecting, implementing and monitoring the security controls that are most effective against real-world threats.

Most press coverage focuses on advanced targeted threats and zero-day attacks, but most of the damage caused by cyber security incidents is enabled by security programs that have been unable to implement mature processes. The Center for Internet Security (CIS) Critical Security Controls has been successful in providing a framework for addressing those deficiencies and delivering basic foundational levels of security. In particular, the first six of the Critical Security Controls provide a proven jump-start to rapidly reducing the risk of impact to your organisation.

Submit your details below to download your free copy of this latest Sans Institute Spotlight Whitepaper: 

If you see this, leave this form field blank and invest in CSS support.
Your Details (* denotes required field)