Вы находитесь на странице: 1из 4

CONFIDENCE: SECURED

BUSINESS INTELLIGENCE

SOLUTION BRIEF

TRIPWIRE
VULNERABILITY
INTELLIGENCE

ENABLING ADAPTIVE THREAT PROTECTION

HIGHLIGHTS
Integrated view of
enterprise security posture
Continuous attack
surface analysis
Continuous security
control automation
Significant reduction in
enterprise cyberthreat risk
Improved security TCO and
operational efficiency

Theres not enough time in the day to investigate every system change and
remediate every vulnerability, which means you need laser-sharp focus to
quickly find the greatest risks to your business. However, the ever-evolving
capabilities of cyber adversariescoupled with the dynamic nature of
corporate networksmakes security prioritization increasingly difficult.
To combat enterprise cyberthreats,
you need instant access to the right
information to quickly make informed
decisions. But limited visibility into
configuration changes and the risk
posture of your network assets can slow
reaction times. While capturing deep,

rich system configuration information


from assets improves visibility, it also
produces a flood of additional data that
can complicate prioritization. And that
problem only multiplies as asset coverage
expands with the ever-increasing number
of connected devices and endpoints.

ADVANCED THREAT PROTECTION, SECURITY AND COMPLIANCE

In short, you dont need more data to


improve threat detection and response
you need timely and actionable
information. You also need highconfidence context, or that information
will have limited actionable value.

OPTIMIZED
THREAT PREVENTION

TRIPWIRE ENABLES ADAPTIVE


THREAT PROTECTION
You can solve this big data security
problem with an integrated, automated
and prioritized view of your enterprise
security posture that only Tripwire
can provide. Using the out-of-the-box
integration between Tripwire Enterprise
and Tripwire IP360, you can now
enable Adaptive Threat Protection for
your network: the ability to automatically adjust your security controls based
on system changes and potential business impact to significantly reduce
overall enterprise cyberthreat risk.

CONTINUOUS SECURITY
CONTROL AUTOMATION
Now you can easily identify unauthorized changes occurring on your
highest-risk assets, enabling you
to prioritize remediation based on
vulnerability risk and change activity. Tripwire Enterprise leverages the
vulnerability intelligence provided
by Tripwire IP360 to correlate,
prioritize and filter system configuration changes and vulnerability risk,
while it enables automatic adjustment
of monitoring and policy application within the ranges you specify.

AN INTEGRATED VIEW OF
ENTERPRISE SECURITY POSTURE
Remediation is streamlined through
a single, prioritized view of compliance findings and vulnerability risk.
This reduces process-heavy communication and duplication of effort
and data, while providing improved
coordination and increased visibility
between IT and Security functions.

PRIORITIZED
THREAT DETECTION
Quickly detect and
prioritize changes at scale

and IT operations (cost


and time savings)
PREVENTION
GAP

DETECTION
GAP

RESPONSE
GAP

ACCELERATED
THREAT RESPONSE
Faster response to
potential threats

uu
FIG.

1 Tripwire Enterprise leverages the Vulnerability Intelligence provided


by Tripwire IP360 to automatically adjust security controls as the internal
environment and threat landscape changes, prioritizing threat detection,
accelerating threat response, and optimizing IT and security operations.

SECURITY COVERAGE AT
ENTERPRISE SCALE
Important assets can be continuously
monitored for change, and youll know
ifand wherecoverage is missing.
The device inventory provided by
Tripwire IP360 delivers an automated
view of Tripwire Enterprise-managed
versus unmanaged assets for a consistent view of enterprise-level security
coverage. This gap analysis helps you
identify all assets on your network,
decide on additional coverage to improve
your overall risk posture, and identify
unknown devices that may be exposing your organization to greater risk.

THE VALUE OF VULNERABILITY


INTELLIGENCE
Tripwire vulnerability intelligence delivers valuable information analysis that
enables Adaptive Threat Protection:
ASSET DISCOVERY
Know whats on your network.
Discover known and unknown
assets that are not currently
managed by Tripwire Enterprise.

NETWORK RISK
Combine vulnerability and change
intelligence for a consolidated view of
network risk. View reports and dashboards that filter and display security,
threat and compliance information
based on asset severity categories.
VULNERABILITY RISK
Identify the most critical security issues
quickly using Tripwires unique vulnerability scoring. Monitor high asset
severity nodes for suspicious changes.
THREAT WATCH LIST
Quickly identify and remediate specific vulnerabilities like
ShellShock and Heartbleed from a
continually updated library of over
64,000 vulnerability checks.
APPLICATION WATCH LIST
Monitor for applications associated with threat indicators of
compromise and data exfiltration, as
well as applications (such as cloud sharing services) prohibited by policy.

THREAT SKILL LEVEL


Filter vulnerable machines based on
current threat information, including if exploit kits and automation
tools are available to attackers, to
closely monitor nodes with easily
exploitable vulnerabilities.
BUSINESS IMPACT
Prioritize monitoring and response based
on the business impact of a successful
exploit. Automatically adjust monitoring
based on the exposure, availability, and
integrity impact of a successful exploit.

THREAT MONITORING THAT ADAPTS TO YOUR ENVIRONMENT


TRIPWIRE

TRIPWIRE

ENTERPRISE

IP360

Use factors such as the


Tripwire IP360 score and
risk matrix to prioritize
vulnerability risk.

Use Tripwire IP360 to


comprehensively profile the
assets for vulnerabilities

2. Prioritize

3. Adapt

1. Profile

4. Respond

TRIPWIRE

SCAN STATUS
Ensure assets are continuously protected and in compliance. Automatically
adjust monitoring and policy
application based on time elapsed
since the last vulnerability scan.

REQUEST A DEMO
uu
Visit

www.tripwire.com
to request a demonstration
of the integrated Tripwire
Enterprise and Tripwire
IP360 solution and learn
how Adaptive Threat
Protection can help your
organization defend
against cyberthreats.

Detect and respond to threats,


harden critical systems at risk,
manually or through Tripwire
Enterprise automation.

TRIPWIRE

ENTERPRISE

Detect and respond to threats,


harden critical systems at risk,
manually or through Tripwire
Enterprise automation.

Dynamically adapt Tripwire


Enterprise monitoring based
onthe changing threat landscape.

IP360

1. Profile

4. Respond

Use Tripwire IP360 to


comprehensively profile the
assets for vulnerabilities

uDynamically
u
FIG. 2 Focus
on what
adapt Tripwire

matters
monitoring and
response
based
Use factors
such as the
2. Prioritize
3. Adaptmost. Prioritize
Tripwire IP360 score and
on the business impact of a successful exploit.
risk matrix to prioritize

Enterprise monitoring based


onthe changing threat landscape.

vulnerability risk.

HOW IT WORKS
TRIPWIRE

IP360

Use Tripwire IP360 to


comprehensively profile the
assets for vulnerabilities

Detect and respond to threats,


harden critical systems at risk,
manually or through Tripwire
Enterprise automation.

1. Profile

2. Prioritize

4. Respond

3. Adapt

Use factors such as the


Tripwire IP360 score and
risk matrix to prioritize
vulnerability risk.

Dynamically adapt Tripwire


Enterprise monitoring based
onthe changing threat landscape.

TRIPWIRE

ENTERPRISE

uu
FIG.

3 Tripwire IP360 continuously analyzes your network attack surface to


generate rich vulnerability intelligence based on prioritized vulnerability
risk and ongoing coverage provided by Tripwires Vulnerability and
Exposures Research Team (VERT). Tripwire Enterprise leverages the
vulnerability intelligence to automatically adjust security monitoring
and policy application as the internal environment and threat landscape
changes, prioritizing threat detection and accelerating remediation.

Tripwire is a leading provider of advanced threat, security and compliance solutions that enable enterprises, service providers and government agencies to confidently detect, prevent and respond to cybersecurity threats. Tripwire solutions are based
on high-fidelity asset visibility and deep endpoint intelligence combined with business-context, and enable security automation through enterprise integration. Tripwires portfolio of enterprise-class security solutions includes configuration and
policy management, file integrity monitoring, vulnerability management and log intelligence. Learn more at tripwire.com. u
u

SECURITY NEWS, TRENDS AND INSIGHTS AT TRIPWIRE.COM/BLOG

FOLLOW US @TRIPWIREINC ON TWITTER

2014 Tripwire, Inc. Tripwire is a registered trademark of Tripwire, Inc.


All other product and company names are property of their respective owners. All rights reserved.

SBVI1b 201410

Вам также может понравиться