Академический Документы
Профессиональный Документы
Культура Документы
BUSINESS INTELLIGENCE
SOLUTION BRIEF
TRIPWIRE
VULNERABILITY
INTELLIGENCE
HIGHLIGHTS
Integrated view of
enterprise security posture
Continuous attack
surface analysis
Continuous security
control automation
Significant reduction in
enterprise cyberthreat risk
Improved security TCO and
operational efficiency
Theres not enough time in the day to investigate every system change and
remediate every vulnerability, which means you need laser-sharp focus to
quickly find the greatest risks to your business. However, the ever-evolving
capabilities of cyber adversariescoupled with the dynamic nature of
corporate networksmakes security prioritization increasingly difficult.
To combat enterprise cyberthreats,
you need instant access to the right
information to quickly make informed
decisions. But limited visibility into
configuration changes and the risk
posture of your network assets can slow
reaction times. While capturing deep,
OPTIMIZED
THREAT PREVENTION
CONTINUOUS SECURITY
CONTROL AUTOMATION
Now you can easily identify unauthorized changes occurring on your
highest-risk assets, enabling you
to prioritize remediation based on
vulnerability risk and change activity. Tripwire Enterprise leverages the
vulnerability intelligence provided
by Tripwire IP360 to correlate,
prioritize and filter system configuration changes and vulnerability risk,
while it enables automatic adjustment
of monitoring and policy application within the ranges you specify.
AN INTEGRATED VIEW OF
ENTERPRISE SECURITY POSTURE
Remediation is streamlined through
a single, prioritized view of compliance findings and vulnerability risk.
This reduces process-heavy communication and duplication of effort
and data, while providing improved
coordination and increased visibility
between IT and Security functions.
PRIORITIZED
THREAT DETECTION
Quickly detect and
prioritize changes at scale
DETECTION
GAP
RESPONSE
GAP
ACCELERATED
THREAT RESPONSE
Faster response to
potential threats
uu
FIG.
SECURITY COVERAGE AT
ENTERPRISE SCALE
Important assets can be continuously
monitored for change, and youll know
ifand wherecoverage is missing.
The device inventory provided by
Tripwire IP360 delivers an automated
view of Tripwire Enterprise-managed
versus unmanaged assets for a consistent view of enterprise-level security
coverage. This gap analysis helps you
identify all assets on your network,
decide on additional coverage to improve
your overall risk posture, and identify
unknown devices that may be exposing your organization to greater risk.
NETWORK RISK
Combine vulnerability and change
intelligence for a consolidated view of
network risk. View reports and dashboards that filter and display security,
threat and compliance information
based on asset severity categories.
VULNERABILITY RISK
Identify the most critical security issues
quickly using Tripwires unique vulnerability scoring. Monitor high asset
severity nodes for suspicious changes.
THREAT WATCH LIST
Quickly identify and remediate specific vulnerabilities like
ShellShock and Heartbleed from a
continually updated library of over
64,000 vulnerability checks.
APPLICATION WATCH LIST
Monitor for applications associated with threat indicators of
compromise and data exfiltration, as
well as applications (such as cloud sharing services) prohibited by policy.
TRIPWIRE
ENTERPRISE
IP360
2. Prioritize
3. Adapt
1. Profile
4. Respond
TRIPWIRE
SCAN STATUS
Ensure assets are continuously protected and in compliance. Automatically
adjust monitoring and policy
application based on time elapsed
since the last vulnerability scan.
REQUEST A DEMO
uu
Visit
www.tripwire.com
to request a demonstration
of the integrated Tripwire
Enterprise and Tripwire
IP360 solution and learn
how Adaptive Threat
Protection can help your
organization defend
against cyberthreats.
TRIPWIRE
ENTERPRISE
IP360
1. Profile
4. Respond
uDynamically
u
FIG. 2 Focus
on what
adapt Tripwire
matters
monitoring and
response
based
Use factors
such as the
2. Prioritize
3. Adaptmost. Prioritize
Tripwire IP360 score and
on the business impact of a successful exploit.
risk matrix to prioritize
vulnerability risk.
HOW IT WORKS
TRIPWIRE
IP360
1. Profile
2. Prioritize
4. Respond
3. Adapt
TRIPWIRE
ENTERPRISE
uu
FIG.
Tripwire is a leading provider of advanced threat, security and compliance solutions that enable enterprises, service providers and government agencies to confidently detect, prevent and respond to cybersecurity threats. Tripwire solutions are based
on high-fidelity asset visibility and deep endpoint intelligence combined with business-context, and enable security automation through enterprise integration. Tripwires portfolio of enterprise-class security solutions includes configuration and
policy management, file integrity monitoring, vulnerability management and log intelligence. Learn more at tripwire.com. u
u
SBVI1b 201410