Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Network Security

Tripwire Adds “Cybercrime Controls Library” to Enterprise Solution

Tripwire, a provider of IT Security and compliance solutions that was recently acquired by private equity firm Thoma Bravo, has released a library of pre-selected “Cybercrime controls” for the company’s Tripwire Enterprise solution that combines key configuration hardening standards with a collection of breach detection rules into an easy-to-install package for Windows servers.

Tripwire, a provider of IT Security and compliance solutions that was recently acquired by private equity firm Thoma Bravo, has released a library of pre-selected “Cybercrime controls” for the company’s Tripwire Enterprise solution that combines key configuration hardening standards with a collection of breach detection rules into an easy-to-install package for Windows servers.

TripwireA free package for new or existing Tripwire Enterprise customers, the Tripwire Cybercrime Controls Library helps organizations proactively protect their sensitive data, and empowers IT security departments with a set of baseline security rules and controls designed for easy, rapid implementation to help detect and protect against security threats.

The Tripwire Cybercrime Controls Library helps organizations address a number of security related challenges including, limited staff resources, lack of time, and the difficulty in understanding what’s required to provide end-to-end enterprise security. Brining immediate intelligence to Tripwire Enterprise, the Cybercrime Controls Library combines hand-selected configuration assessment tests with a set of tailor-made change detection rules to help security administrators achieve base level of integrity and security across Windows servers with a minimum time investment and helping to provide quick detection of suspicious, malicious or unusual behavior.

“We selected these specific Cybercrime Controls so security professionals could cover as many bases as possible with as little effort as possible, and begin with a short list of foundation security controls,” said Dwayne Melançon, VP of Products for Tripwire. “With this package in hand our customers can leverage our expertise and ensure they can get critical system hardening without becoming rule-creation experts themselves.”

The pre-selected set of data breach detection rules in Tripwire Cybercrime Controls Library provide timely and simple monitoring for basic attack vectors, focusing on local firewall configuration, scheduled tasks, listening ports, system services and startup tasks. The companion configuration hardening standards in the library come from Center for Internet Security standards and assets security protocol versions, malicious code detection and prevention, attack surface reduction, disable system components and services, maintenance and patches and audit trail protection.

The Tripwire Cybercrime Controls Library is now available with the purchase of Tripwire Enterprise, or to current users on an active support plan, at no additional cost. Tripwire says it will provide ongoing updates to the library.

Written By

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Cody Barrow has been appointed as CEO of threat intelligence company EclecticIQ.

Shay Mowlem has been named CMO of runtime and application security company Contrast Security.

Attack detection firm Vectra AI has appointed Jeff Reed to the newly created role of Chief Product Officer.

More People On The Move

Expert Insights

Related Content

Identity & Access

Zero trust is not a replacement for identity and access management (IAM), but is the extension of IAM principles from people to everyone and...

Cybersecurity Funding

Network security provider Corsa Security last week announced that it has raised $10 million from Roadmap Capital. To date, the company has raised $50...

Network Security

Attack surface management is nothing short of a complete methodology for providing effective cybersecurity. It doesn’t seek to protect everything, but concentrates on areas...

Application Security

Virtualization technology giant VMware on Tuesday shipped urgent updates to fix a trio of security problems in multiple software products, including a virtual machine...

Application Security

Fortinet on Monday issued an emergency patch to cover a severe vulnerability in its FortiOS SSL-VPN product, warning that hackers have already exploited the...

Network Security

A zero-day vulnerability named HTTP/2 Rapid Reset has been exploited to launch some of the largest DDoS attacks in history.

Identity & Access

Hackers rarely hack in anymore. They log in using stolen, weak, default, or otherwise compromised credentials. That’s why it’s so critical to break the...

Cyberwarfare

Websites of German airports, administration bodies and banks were hit by DDoS attacks attributed to Russian hacker group Killnet