Open Source Roots to Enterprise Security Leader
The first version of Tripwire was written by Gene Kim and Dr. Eugene Spafford at Purdue University in 1992 and released to the open source community. Since 1999 Tripwire Inc. has continued to innovate and expand on the platform to a complete suite of security solutions. Tripwire Enterprise combined with Tripwire Log Center and the new VIA platform help organizations manage incident detection, security policy enforcement, reduce the attack surface and automate regulatory compliance. Tripwire’s platform helps connect security to the business, providing visibility of an organization’s security and compliance stance while simultaneously automating complex security tasks, reducing overall risk.
Which Tripwire Is Right for You?
SecureCheq is a fast, simple utility for Windows servers and desktops that answers that scans the system for common configuration risks.
Tripwire Open Source
Open Source Tripwire is suitable for monitoring a small number of Linux servers, where centralized control and reporting is not needed and professional support or system automation is not a requirement. Source code is available on Sourceforge.
Tripwire File Integrity Monitoring is the solution for IT organizations requiring heterogeneous server monitoring across Windows, Linux, Solaris, AIX and HP-UX platforms. It provides detailed reporting and centralized server management across all IT devices including directory servers, databases, network devices, firewalls and virtual infrastructures. In addition, Tripwire FIM provides best of class service, integration options, and support.
Tripwire Enterprise is a complete security configuration management solution. It builds on the Tripwire foundation to not only audit changes and ensure system integrity, but also assess all IT configurations against known benchmarks, security standards and best practices. It continuously monitors configurations for drift, vulnerabilities and risk-inducing changes, and provides a suite of workflows to simplify change reconciliation, incident investigation, and daily management.
The Information Security Hierarchy of Needs
Tue 29 Jul |
A Midsummer Mega Week of Giving
Tue 29 Jul |