HIT Consultant Insightful coverage of healthcare innovation
 

tripwire

Results 1 - 25 of 59Sort Results By: Published Date | Title | Company Name
Published By: Tripwire     Published Date: Nov 07, 2012
Properly configuring security parameters on servers, workstations and network infrastructure platforms has been a mandatory of best practices in information security. Read this white paper to learn how secure configurations can reduce overall attack.
Tags : 
secure configuration, tripwire, information security, data security, network infrastructure platforms
    
Tripwire
Published By: Tripwire     Published Date: Nov 07, 2012
The thought of continuous monitoring is an ancient concept. Many federal agencies are required to continuously monitor their systems. Read on to learn what continuous monitoring is and how organizations can devise a solution that works.
Tags : 
tripwire, continuous monitoring, security, data breach, it security
    
Tripwire
Published By: Tripwire     Published Date: Nov 07, 2012
Many professionals in information security espouse the belief-and commitment to-"risk based" security management. In fact, according to the latest Ponemon Report on Risk Management, 77% of those surveyed claimed a commitment to it. Ironically, the analysis of the responses collected by the survey indicated that despite their stated intentions, most of the respondents and their organizations were not acting in ways that reflected this commitment.
Tags : 
security, tripwire, security management, security based management
    
Tripwire
Published By: Tripwire     Published Date: Nov 07, 2012
Cloud computing, virtualization and social networking have several things in common - they create new threat vectors that can leave companies vulnerable to new types of attacks. Read on to learn how to prevent new attacks by getting back to basics.
Tags : 
security, configuration, basics, security flaw, it assets, it infrastructure, security infrastructure, tripwire
    
Tripwire
Published By: Tripwire     Published Date: Jan 29, 2013
Download this paper to learn five actions that will enhance your approach to information risk management and security and help you stay one step ahead of the information age adversary.
Tags : 
risk management, irms, it security
    
Tripwire
Published By: Tripwire     Published Date: Feb 08, 2013
John Gilligan, former CIO of the U.S. Air Force and the U.S. Department of Energy, led the development of this document; it represents a consensus of government and nongovernment experts.
Tags : 
cyberdefender, security, federal, government, sans 20 sc, dhs, defense
    
Tripwire
Published By: Tripwire     Published Date: Feb 08, 2013
Cyberwar fundamentally changes how government must handle security. Firewalls, intrusion detection systems and other security devices can stop the average hacker, but new threats use stealth techniques that these defenses cannot detect on their own.
Tags : 
cyberwar, hacker detection, defense, security, government, firewall, cyber attacks, cyber threats, intrustion detection, intrusion defense
    
Tripwire
Published By: Tripwire     Published Date: Feb 08, 2013
Itís no small feat to balance access to data to meet business goals with protecting that very same data from hackers.
Tags : 
high availability, cloud, security, hacker detection, intrusion prevention
    
Tripwire
Published By: Tripwire     Published Date: Feb 08, 2013
Continuous monitoring is not a single solutionóitís a best practice for IT security.
Tags : 
automation, continuous monitoring, security, threat detection, threat prevention, hacker, malware, cyber attack
    
Tripwire
Published By: vWire     Published Date: Dec 02, 2009
A commissioned study conducted by Forrester Consulting on behalf of Tripwire. This study included inquiry into the current role of virtualization in the overall environment and barriers to further deployment, as well as how performance is measured for both the environment and those managing virtualized servers.
Tags : 
vwire, tripwire, server virtualization, productivity, roi, consolidate, server management
    
vWire
Published By: vWire     Published Date: Dec 02, 2009
vWire makes that process simple, and this white paper will go through the steps of upgrading the environment from ESXi 3.5.0 Update 4 to ESXi 4.0.
Tags : 
upgrade vmware vsphere 4.0, vwire 1.1, vsphere esxi, virtual hardware 3, tripwire, vwire
    
vWire
Published By: Tripwire, Inc     Published Date: Jan 29, 2010
Tripwire provides IT organizations with enhanced file integrity monitoring, configuration assessment and log management that automates continuous PCI compliance.
Tags : 
tripwire, pci compliance, file integrity monitoring, configuration assessment, log management, malware, security, event management
    
Tripwire, Inc
Published By: Tripwire, Inc     Published Date: Jan 29, 2010
Tripwire Enterprise combines real-time change detection, comprehensive configuration auditing, continuous policy compliance management, and rapid configuration remediation in a single solution. By integrating these Tripwire solutions, you can correlate all suspicious events with changes to take control of threats across all events and changes.
Tags : 
tripwire enterprise, log and event management, security, compliance, configuration audit, total cost of ownership, tco, siem
    
Tripwire, Inc
Published By: Tripwire, Inc     Published Date: Mar 10, 2010
How to comply with the global standard without breaking the bank
Tags : 
tripwire, pci dss, payment card industry, data security standard, risk management, automation, audit
    
Tripwire, Inc
Published By: Tripwire, Inc     Published Date: Mar 10, 2010
Make compliance just another part of your processes by taking an operational approach to security
Tags : 
tripwire, compliance, security
    
Tripwire, Inc
Published By: Tripwire, Inc     Published Date: Mar 10, 2010
NERC enforces comprehensive reliability standards for planning and operating the collective bulk power system, including the Critical Infrastructure Protection (CIP) Cyber Security Standards.
Tags : 
tripwire, nerc compliance, it security, automation, cip, cyber security, reliability standard, log, event management
    
Tripwire, Inc
Published By: Tripwire, Inc     Published Date: Mar 10, 2010
Unlike others, Tripwire solutions identify the events that matter most-those that pose the real security risks or take you out of compliance. And they help you discover those events immediately, while you can still contain the damage.
Tags : 
tripwire, pci compliance, business continuity, log, event management, it security, compliance automation, log center, pci dss
    
Tripwire, Inc
Published By: Tripwire, Inc     Published Date: Mar 10, 2010
The next generation of log and event management eliminates the complexity and bloat associated with traditional log and SIEM systems.
Tags : 
tripwire, log center, event management, siem system, compliance regulation, security event analysis platform, event database, integrated it security, automation
    
Tripwire, Inc
Published By: Tripwire     Published Date: Oct 14, 2010
Meet this data protection challenge head on with a new way to categorize sensitive data that helps you reduce data breach risk and take more control of your most critical assets. Discover how.
Tags : 
tripwire, data protection, data breach risk, threats, compliance
    
Tripwire
Published By: Tripwire     Published Date: Oct 14, 2010
In this white paper, security and compliance expert Dr. Anton Chuvakin explains how to take advantage of this opportunity.
Tags : 
tripwire, siem, compliance, security, log management, log data, real-time monitoring
    
Tripwire
Published By: Tripwire     Published Date: Oct 14, 2010
Read this exclusive white paper from compliance leader Tripwire to learn how a Protect, Detect, and Correct compliance strategy can give you back your most precious resource: time
Tags : 
tripwire, automation, compliance strategy
    
Tripwire
Published By: Tripwire     Published Date: Oct 14, 2010
Learn how CISOs can play these challenges to their advantage to meet both data protection and compliance demands.
Tags : 
tripwire, compliance, data protection, cio, automation, intelligence, information security
    
Tripwire
Published By: Tripwire     Published Date: Oct 14, 2010
Now smart CISOs are looking to lockdown the enterprise to achieve continuous compliance and narrow the breach-to-detection gap with baseline controls in configuration and change management.
Tags : 
tripwire, breach, detection, security, configuration and change management, compliance
    
Tripwire
Published By: Tripwire     Published Date: Apr 28, 2010
Learn more about the survey results and how the right attitudes and technical controls can change that outlook.
Tags : 
tripwire, pci compliance, pci dss, it security
    
Tripwire
Published By: Tripwire     Published Date: Jul 05, 2007
Discover how high-performing IT organizations are able to create a culture that supports and uses change management to their advantage, facilitating enterprise business goals.
Tags : 
cmdb, configuration management, auditing, risk management, audit, risk audit, risk control, configuration control, compliance, tripwire
    
Tripwire
Start   Previous   1 2 3    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.