Tripwire.com uses cookies for analytics and functionality purposes.To change your cookie settings or find out more, click here. If you continue browsing our website or close this banner, you accept these cookies.

Tripwire Assets & Resources

Filter resources by product, type or topic:

:

Tripwire Advanced Threat Protection Security and Compliance Brochure

Learn how the Tripwire solution enables highly granular threat analytics and forensics capability, while at the same time the ability to detect and respond adaptively to zero-day and today's advanced threats.

White Paper:

Where Are Your Cyberattacks Coming From?

2018 marked the 11th edition of the Verizon Data Breach Investigations Report (DBIR), which digs deep into data-driven findings about the state of global cybersecurity. Tripwire security experts present five key takeaways.

Video:

Tripwire Enterprise with FireEye and iSight

Get a quick demonstration of the integration between Tripwire Enterprise and FireEye Malware Analysis AX and iSight Intelligence, using Tripwire Threat Intelligence Integration.

Solution Brief:

Cybersecurity Penetration Testing Assessments

Penetration tests are a type of ethical hacking used to regularly evaluate the security of a network. Our team of highly-skilled cybersecurity experts utilizes a combination of tactical and strategic approaches to discover and exploit vulnerabilities in your IT systems.

Datasheet:

Tripwire IP360 for ForeScout CounterACT

Improve real-time visibility over known and unknown devices while automating network access control and threat response.

White Paper:

2019 Verizon DBIR Response Checklist

2019 marked the 12th edition of the Verizon Data Breach Investigations Report (DBIR), which digs into data-driven findings on the state of global cybersecurity. Tripwire experts present their main takeaways from the report in an actionable checklist.

Tool:

Check Point ThreatCloud

Datasheet:

Are You Prepared for the Latest Cyber Attack: WannaCry?

WannaCry is ransomware targeting Microsoft Windows systems. In just one week, it infected millions of computers in 150 countries. The ransom payment system demands are made through Bitcoin and are supported in 28 languages suggesting the significant global target. Once on your system it is very difficult to decrypt your files. It is best to preempt this threat! 

White Paper:

Combating the Insider Threat

Guidance from NIST and the National Insider Threat Task Force.

Book:

DevOps Survival Guide

White Paper:

Tripwire State of Container Security Report

As DevOps continues to drive increased use of containers, security teams struggle to secure these new assets and processes. This report explores the challenges faced by organizations actively using containers today, as well as the real consequences they experience.

Book:

The Dos and Don'ts of DevOps: Implementing Security into the DevOps Lifecycle

Information security professionals share their top recommendations for building security into the DevOps lifecycle—for agile, fast and secure software development.