Open Source Roots to Enterprise Security Leader
The first version of Tripwire was written by Gene Kim and Dr. Eugene Spafford at Purdue University in 1992 and released to the open source community. Since 1999 Tripwire Inc. has continued to innovate and expand on the platform to a complete suite of security solutions. Tripwire Enterprise combined with Tripwire Log Center and the new VIA platform help organizations manage incident detection, security policy enforcement, reduce the attack surface and automate regulatory compliance. Tripwire’s platform helps connect security to the business, providing visibility of an organization’s security and compliance stance while simultaneously automating complex security tasks, reducing overall risk.
Which Tripwire Is Right for You?
SecureCheq is a fast, simple utility for Windows servers and desktops that answers that scans the system for common configuration risks.
Tripwire Open Source
Open Source Tripwire is suitable for monitoring a small number of Linux servers, where centralized control and reporting is not needed and professional support or system automation is not a requirement. Source code is available on GitHub.
Tripwire File Integrity Monitoring is the solution for IT organizations requiring heterogeneous server monitoring across Windows, Linux, Solaris, AIX and HP-UX platforms. It provides detailed reporting and centralized server management across all IT devices including directory servers, databases, network devices, firewalls and virtual infrastructures. In addition, Tripwire FIM provides best of class service, integration options, and support.
Tripwire Enterprise is a complete security configuration management solution. It builds on the Tripwire foundation to not only audit changes and ensure system integrity, but also assess all IT configurations against known benchmarks, security standards and best practices. It continuously monitors configurations for drift, vulnerabilities and risk-inducing changes, and provides a suite of workflows to simplify change reconciliation, incident investigation, and daily management.
Half of UK Online Banking Sites Vulnerable to ‘Low-Skilled Attacks,’ Researchers Warn
Tue 5 Jan
BlackEnergy Malware Caused Ukrainian Power Outage, Confirms Researchers
Tue 5 Jan
Sweet Security Part 2 – Creating a Defensible Raspberry Pi
Mon 4 Jan
8 Top Tips for Successfully Implementing your Security Control
Mon 4 Jan
Fake IRS Spam Email Campaign Serves Up Kovter, CoreBot Malware
Sun 3 Jan
Security Slice: Cloudy with a Chance of Patching
Sun 3 Jan
Microsoft to Notify Users of State-Sponsored Hacking Attempts
Thu 31 Dec
How We Can Turn the Tide on Cyber Security in 2016
Wed 30 Dec


