tripwire vulnerability intelligence

4
SOLUTION BRIEF BUSINESS INTELLIGENCE CONFIDENCE: SECURED ADVANCED THREAT PROTECTION, SECURITY AND COMPLIANCE There’s not enough time in the day to investigate every system change and remediate every vulnerability, which means you need laser-sharp focus to quickly find the greatest risks to your business. However, the ever-evolving capabilities of cyber adversaries—coupled with the dynamic nature of corporate networks—makes security prioritization increasingly difficult. TRIPWIRE VULNERABILITY INTELLIGENCE ENABLING ADAPTIVE THREAT PROTECTION HIGHLIGHTS » Integrated view of enterprise security posture » Continuous attack surface analysis » Continuous security control automation » Significant reduction in enterprise cyberthreat risk » Improved security TCO and operational efficiency To combat enterprise cyberthreats, you need instant access to the right information to quickly make informed decisions. But limited visibility into configuration changes and the risk posture of your network assets can slow reaction times. While capturing deep, rich system configuration information from assets improves visibility, it also produces a flood of additional data that can complicate prioritization. And that problem only multiplies as asset coverage expands with the ever-increasing number of connected devices and endpoints.

Upload: mrelfe

Post on 18-Aug-2015

230 views

Category:

Documents


0 download

DESCRIPTION

Tripwire Vulnerability Intelligence

TRANSCRIPT

SOLUTION BRIEF BUSINESS INTELLIGENCE CONFIDENCE: SECUREDADVANCED THREAT PROTECTION, SECURITY AND COMPLIANCETheres not enough time in the day to investigate every system change and remediate every vulnerability, which means you need laser-sharp focus to quickly find the greatest risks to your business. However, the ever-evolving capabilities of cyber adversariescoupled with the dynamic nature of corporate networksmakes security prioritization increasingly difficult. TRIPWIRE VULNERABILITY INTELLIGENCEENABLING ADAPTIVE THREAT PROTECTION HIGHLIGHTS Integrated view of enterprise security posture Continuous attack surface analysis Continuous security control automation Signicant reduction in enterprise cyberthreat risk Improved security TCO and operational efciencyTo combat enterprise cyberthreats, you need instant access to the right information to quickly make informed decisions. But limited visibility into configuration changes and the risk posture of your network assets can slow reaction times. While capturing deep, rich system configuration information from assets improves visibility, it also produces a flood of additional data that can complicate prioritization. And that problem only multiplies as asset coverage expands with the ever-increasing number of connected devices and endpoints.In short, you dont need more data to improve threat detection and responseyou need timely and actionable information. You also need high-confidence context, or that information will have limited actionable value. TRIPWIRE ENABLES ADAPTIVE THREAT PROTECTION You can solve this big data security problem with an integrated, automated and prioritized view of your enterprise security posture that only Tripwire can provide. Using the out-of-the-box integration between Tripwire Enterprise and Tripwire IP360, you can now enable Adaptive Threat Protection for your network: the ability to automati-cally adjust your security controls based on system changes and potential busi-ness impact to significantly reduce overall enterprise cyberthreat risk.CONTINUOUS SECURITY CONTROL AUTOMATIONNow you can easily identify unau-thorized changes occurring on your highest-risk assets, enabling you to prioritize remediation based on vulnerability risk and change activ-ity. Tripwire Enterprise leverages the vulnerability intelligence provided by Tripwire IP360 to correlate, prioritize and filter system configura-tion changes and vulnerability risk, while it enables automatic adjustment of monitoring and policy applica-tion within the ranges you specify. AN INTEGRATED VIEW OF ENTERPRISE SECURITY POSTURE Remediation is streamlined through a single, prioritized view of compli-ance findings and vulnerability risk. This reduces process-heavy com-munication and duplication of effort and data, while providing improved coordination and increased visibility between IT and Security functions.SECURITY COVERAGE AT ENTERPRISE SCALEImportant assets can be continuously monitored for change, and youll know ifand wherecoverage is missing. The device inventory provided by Tripwire IP360 delivers an automated view of Tripwire Enterprise-managed versus unmanaged assets for a consis-tent view of enterprise-level security coverage. This gap analysis helps you identify all assets on your network, decide on additional coverage to improve your overall risk posture, and identify unknown devices that may be expos-ing your organization to greater risk. THE VALUE OF VULNERABILITY INTELLIGENCETripwire vulnerability intelligence deliv-ers valuable information analysis that enables Adaptive Threat Protection:ASSET DISCOVERYKnow whats on your network. Discover known and unknown assets that are not currently managed by Tripwire Enterprise. NETWORK RISKCombine vulnerability and change intelligence for a consolidated view of network risk. View reports and dash-boards that filter and display security, threat and compliance information based on asset severity categories.VULNERABILITY RISK Identify the most critical security issues quickly using Tripwires unique vul-nerability scoring. Monitor high asset severity nodes for suspicious changes.THREAT WATCH LISTQuickly identify and remedi-ate specific vulnerabilities like ShellShock and Heartbleed from a continually updated library of over 64,000 vulnerability checks.APPLICATION WATCH LIST Monitor for applications associ-ated with threat indicators of compromise and data exfiltration, as well as applications (such as cloud shar-ing services) prohibited by policy.u FIG. 1 Tripwire Enterprise leverages the Vulnerability Intelligence provided by Tripwire IP360 to automatically adjust security controls as the internal environment and threat landscape changes, prioritizing threat detection, accelerating threat response, and optimizing IT and security operations.DETECTIONGAPPREVENTIONGAPRESPONSEGAPOPTIMIZED THREAT PREVENTIONand IT operations (cost and time savings)PRIORITIZED THREAT DETECTIONQuickly detect and prioritize changes at scaleACCELERATED THREAT RESPONSEFaster response to potential threatsTHREAT SKILL LEVELFilter vulnerable machines based on current threat information, includ-ing if exploit kits and automation tools are available to attackers, to closely monitor nodes with easily exploitable vulnerabilities.BUSINESS IMPACTPrioritize monitoring and response based on the business impact of a successful exploit. Automatically adjust monitoring based on the exposure, availability, and integrity impact of a successful exploit.SCAN STATUSEnsure assets are continuously pro-tected and in compliance. Automatically adjust monitoring and policy application based on time elapsed since the last vulnerability scan.u FIG. 2 Focus on what matters most. Prioritize monitoring and response based on the business impact of a successful exploit.THREAT MONITORING THAT ADAPTS TO YOUR ENVIRONMENTu FIG. 3 Tripwire IP360 continuously analyzes your network attack surface to generate rich vulnerability intelligence based on prioritized vulnerability risk and ongoing coverage provided by Tripwires Vulnerability and Exposures Research Team (VERT). Tripwire Enterprise leverages the vulnerability intelligence to automatically adjust security monitoring and policy application as the internal environment and threat landscape changes, prioritizing threat detection and accelerating remediation.2. Prioritize 3. Adapt1. Prole 4. RespondTRIPWIREENTERPRISEDetect and respond to threats, harden critical systems at risk, manually or through Tripwire Enterprise automation.Dynamically adapt Tripwire Enterprise monitoring based onthe changing threat land-scape.TRIPWIREIP360 Use Tripwire IP360 to comprehensively prole the assets for vulnerabilitiesUse factors such as the Tripwire IP360 score and risk matrix to prioritize vulnerability risk.2. Prioritize 3. Adapt1. Prole 4. RespondTRIPWIREENTERPRISEDetect and respond to threats, harden critical systems at risk, manually or through Tripwire Enterprise automation.Dynamically adapt Tripwire Enterprise monitoring based onthe changing threat land-scape.TRIPWIREIP360 Use Tripwire IP360 to comprehensively prole the assets for vulnerabilitiesUse factors such as the Tripwire IP360 score and risk matrix to prioritize vulnerability risk.2. Prioritize3. Adapt1. Prole4. RespondTRIPWIREENTERPRISEDetect and respond to threats, harden critical systems at risk, manually or through Tripwire Enterprise automation.Dynamically adapt Tripwire Enterprise monitoring based onthe changing threat land-scape.TRIPWIREIP360 Use Tripwire IP360 to comprehensively prole the assets for vulnerabilitiesUse factors such as the Tripwire IP360 score and risk matrix to prioritize vulnerability risk.HOW IT WORKSREQUEST A DEMOuVisit www.tripwire.com to request a demonstration of the integrated Tripwire Enterprise and Tripwire IP360 solution and learn how Adaptive Threat Protection can help your organization defend against cyberthreats.uTripwire is a leading provider of advanced threat, security and compliance solutions that enable enterprises, service provid-ers and government agencies to condently detect, prevent and respond to cybersecurity threats. Tripwire solutions are based onhigh-delityassetvisibilityanddeependpointintelligencecombinedwithbusiness-context,andenablesecurityauto-mationthroughenterpriseintegration.Tripwiresportfolioofenterprise-classsecuritysolutionsincludescongurationand policy management, le integrity monitoring, vulnerability management and log intelligence. Learn more at tripwire.com.uSECURITY NEWS, TRENDS AND INSIGHTS AT TRIPWIRE.COM/BLOGuFOLLOW US @TRIPWIREINC ON TWITTER2014 Tripwire, Inc. Tripwire is a registered trademark of Tripwire, Inc.All other product and company names are property of their respective owners. All rights reserved.SBVI1b201410