ComputerWeekly.com Research Library

Powered by Bitpipe.com

All Research Sponsored By:Tripwire, Inc.

  • 10 Steps for Early Incident Detection

    The earlier a security breach is detected, the faster an organization can recover. View this informative white paper to learn more about the ten steps to faster detection of security incidents. IT security is only as effective as it's response time, so be sure you're prepared for a breach.

  • Tripwire Log Center Product Brief

    Consult this informative white paper to learn how log management is helping to better identify threats and deploy security information and event management systems (SIEM). Learn how you can uncover suspicious activities and improve security by reading this asset now.

  • Tripwire VIA System State Intelligence executive brief

    What's missing from today's approach to IT security is real-time security intelligence that immediately shows you when you have a security problem, what caused it and what to do about it. This white paper reveals how you can easily utilize cutting-edge technologies to take the guesswork out of identifying the activity that needs your attention.

  • Security-In-Depth Using Integrated Risk-Conscious Controls

    This white paper explores how your organization can change the way it protects its critical data, combining preventive, detective and corrective controls to stop breaches from happening, detect threats as they arise, and correct settings that introduce security risk or non-compliance. Read now to learn more.

  • Smart, Visible and Automated: The New Log Management

    View this informative white paper to learn more about moving to a more advanced risk protection policy. Improve your log management capabilities by implementing functionality with SIEM, file integrity monitoring and more!

  • Tripwire IT Security and Compliance Automation Solutions: Empowering IT Security

    View this informative white paper to learn how you can improve your IT security practices. Uncover some of the toughest challenges to maintaining Confidentiality, Integrity, and Availability (CIA). Uncover the sensitive data that needs protection as well as security policies and controls that could lead to a false of security.

  • Continuous Monitoring: Responding to New Threats in More Complex IT Environments

    Governments today are focusing on the practice of continuous monitoring as a means to providing the much needed balance between data access and protection. In this paper, learn more about continuous monitoring, including what is it and why it’s needed, guidelines for implementing it, key capabilities of an effective solution, and more.

  • Tripwire IT Security & Compliance Automation Solutions –Empowering IT Security in an Insecure World

    In this solution brief, discover how Tripwire IT security and compliance automation solutions provides the visibility, intelligence and automation of IT security controls needed to gain confidence in the protection of your data.

  • Layered Security: Protecting Your Data in Today's Threat Landscape

    In this white paper, learn how threats have evolved over time, shortcomings of the perimeter-centric approach to security, steps to implementing a layered security approach to security, and much more.

  • Security-In-Depth Using Integrated Risk-Conscious Controls

    Most organizations seem stuck in the traditional castle-and-moat approach to security. This approach assumes there's a clear boundary between what's inside and outside the organization and that attacks come from external sources. Clearly today's threat environment requires a new approach.

  • E-Guide: Striving for Better Information Security Intelligence

    The need for realistic awareness of the threat landscape has led many businesses to expand their investment to broader insight outside the organization, and deeper visibility within. This expert tip explains how to turn data deluge into business opportunity and offers advice on managing threat exposure in complex IT environments.

  • E-Guide: Exploring Configuration Changes to Reduce Attacks

    Configuration changes help organizations with limited IT staff and resources not only mitigate against known threats, but also future attacks. This expert e-guide explains why firms continue to struggle with zero-day vulnerabilities and offers advice on how to lock down systems to eliminate threats posed by high-profile attacks.

  • Tripwire Enterprise and Tripwire Log Center: Integrated for Unparalleled Security

    Tools for monitoring and protecting the IT infrastructure have evolved into powerful, yet isolated, islands of defense. Because modern threats can take advantage of this isolation, IT security needs a single, comprehensive view of infrastructure security.

  • Tripwire Log Center

    A decade or more ago, logs of events recorded by firewalls, intrusion detection systems and other network devices were considered more of a nuisance than a help. There were too many of them, they weren’t easily collected, and there was no easy way to make sense of which were important.

  • Managed Compliance: Streamlining Multiple Compliance Mandates with Visibility, Intelligence, and Automation

    This paper provides IT security and compliance professionals a roadmap and practical advice for implementing an approach to compliance that helps overcome IT security issues.

  • Mind the Gap: CISOs Work to Narrow the Breach-to-Detection Gap for Better Security

    Compliance is indeed a conscientious effort toward securing corpo­rate assets. IT organizations have committed much time and money to the cause. Despite security breaches still happening many still fly under the radar. This paper outlines what precautions need to be taken to avoid future security breaches.

  • A Pragmatic Approach to SIEM

    In this paper we will take a look at this disturbing trend and provide useful guidance for maximizing the value of SIEM and log management tools, while focusing on protecting systems and data not on simply checking the compliance check box.

  • Data Protection 2.0: It’s Not Just Names and Numbers Anymore

    The external forces of advanced threats and compliance obligations, combined with the internal forces of new business initiatives, lead to a complex set of data protec­tion requirements. This paper provides an overview of the many data protection challenges CISOs face and suggests a sequence of five actions to take to address these challenges.

  • Five Challenges to Continuous PCI DSS Compliance

    As the Payment Card Industry Data Security Standard (PCI DSS, or PCI) becomes more widely adopted in both the United States and Europe, organizations face five major challenges when navigating the PCI compliance landscape.

  • Automation Makes Perfect: Taking the Time Crunch Out of IT Compliance with Automation

    Continuous compliance can help you narrow the gap between identifying compliance vulnerabilities and repairing systems to an audit-passing state. Read this paper to learn more.

  • E-Guide: IT Decision Checklist: SIMs and Log Management

    Security information management systems are effective platforms for the collection, analysis and storage of events from a broad range of systems and devices. We’ll outline what you should look for to get the most relevant data from SIMs. Read this paper to find out more.

  • Five Challenges to Continuous PCI DSS Compliance

    As the Payment Card Industry Data Security Standard (PCI DSS, or PCI) becomes more widely adopted in both the United States and Europe, organizations face five major challenges when navigating the PCI compliance landscape. Read this white paper to learn what they are and how to overcome them.

  • Pulling the Plug on Legacy Log Management

    When it comes to log management today, CSOs have been left in the lurch. According to this IDG Research Services survey, organizations are poised to “rip and replace” legacy technology to get a better handle on compliance and security. Read on to learn why so many are scrapping their old log management system and starting fresh.

  • PCI Compliant Yesterday. Still Compliant Today?

    This webcast talks about the need for automated compliance. The webcast answers questions like: Why is PCI compliance necessary? Should PCI regulations be viewed as a final checklist, or a beginning set of best practices? Watch this webcast to learn more.

  • Seven Practical Steps for Federal Cyber Security and FISMA Compliance

    This paper provides seven practical steps any information security organization can take to improve information system security and achieve compliance with relevant regulations, standards and internal security and operational policy.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.