product_page
Tripwire ExpertOps
The Industry’s Best FIM, SCM, and VM as a Managed Service Tripwire® ExpertOps provides file integrity monitoring (FIM), security configuration management (SCM), and vulnerability management (VM) as a managed service to arm you with the solution operation, support, and advice you need to stay compliant and reduce your attack surface.
product_page
Tripwire Enterprise
Real-time Change Monitoring for Unmatched Security and Compliance With decades of proven success, Tripwire® Enterprise leads the way in file integrity monitoring (FIM) and security configuration management (SCM) to catch indicators of compromise and automate compliance.
Guide
Fortra's Complete Guide to Layered Offensive Security
Most organizations have a decent understanding of the types of defensive security tactics they need to employ to thwart cyberattacks. But offensive security techniques are just as important for detecting existing vulnerabilities that a threat actor has yet to discover and exploit. Learn how to approach offensive security from the ground up, including the value of using a layered security approach...
On-Demand Webinar
Why Your IBM i Security Will Fail (and How to Fix It)
By Robin Tatam
The most common approaches to IBM i security share a serious flaw. Watch this webinar to learn how to fix it.
Blog
Silencing the Bells: How a SIEM Can Prevent Alert Fatigue
By Bob Erdman on Tue, 07/30/2019
Find out how Security Information and Event Management (SIEM) solutions can streamline security and prevent alert fatigue.
Blog
Cryptoviral Extortion: The Enduring Problem of Ransomware
By Bob Erdman on Wed, 03/13/2019
Learn about the long arms of ransomware, and how to protect your organization from its grasp.
Blog
The Shared Responsibility of Cloud Security
By Bob Erdman on Fri, 10/26/2018
The agreement that cloud security is a shared responsibility between cloud providers and cloud users has now firmly taken hold. How those responsibilities shake out, however, is an ongoing conversation.
Blog
A SIEM that Speaks IBM i
Tue, 07/03/2018
Organizations of all sizes can benefit from capturing, logging, and responding to security events in real time, but one important operating system is often overlooked: IBM i .
On-Demand Webinar
Getting Started with IBM i Security: Securing PC Access
By Amy Williams
Watch this lesson to learn how you can use exit points and exit programs to gain control over who can access your IBM i objects and how.
Blog
Exit Points and Why Menu Security Isn’t Enough
By Robin Tatam on Wed, 05/30/2018
How do interfaces like FTP side-step IBM i menu security and give users uncontrolled data access through exit points? Robin Tatam explains in this short video.
Quote
Event Manager Pricing
Event Manager manages potential vulnerabilities proactively using centralized security management and real-time information, making this SIEM solution a vital tool in avoiding devastating data breaches caused by both insider risks and external threat actors. Whether these threats come from internal or external sources, Event Manager is able to send a prioritized alert notifying your team of a...
Demo
Event Manager Demo
Having trouble prioritizing critical security events and responding to security threats quickly? You’re not alone. Event Manager is a real-time cybersecurity insight and response platform, designed to help your existing staff respond to critical security threats faster. What do I get with Event Manager? Real-time threat detection Normalization of disparate data sources Translation of data into...
Trial
Event Manager Trial
Having trouble prioritizing critical security events and responding to security threats quickly? You’re not alone. Event Manager is a real-time cybersecurity insight and response platform, designed to help your existing staff respond to critical security threats faster. Event Manager can effectively: Detect potential threats in real-time Separate critical events from the noise Translate data into...
Blog
How Exit Programs Make the Greatest Impact on IBM i Security
By Robin Tatam on Tue, 03/28/2017
What do exit points have to do with cybersecurity? How do exit programs work? Robin Tatam provides a clear explanation in this video.
Blog
Cracking the Problem of Endpoint Security
By Robin Tatam on Fri, 03/24/2017
Endpoint security has been a hot topic in the technology and corporate sectors for a few years. Especially with the emergence of bring-your-own-device practices, it has become even more critical to put safeguards in place to ensure the security of sensitive information.
Article
How To Maintain Your Data Integrity
By Robin Tatam on Tue, 03/21/2017
File Integrity Monitoring (FIM) helps ensure that your critical and sensitive data is viewed and changed only by authorized personnel through approved channels. Candidates for FIM include application files containing sensitive data, such as personnel or financial data, and server configuration files.