LOG CENTER SECURITY INTELLIGENCE MADE SIMPLE



Similar documents
LOG INTELLIGENCE FOR SECURITY AND COMPLIANCE

LOG AND EVENT MANAGEMENT FOR SECURITY AND COMPLIANCE

LOG MANAGEMENT AND SIEM FOR SECURITY AND COMPLIANCE

Tripwire Log Center PRODUCT BRIEF HIGH PERFORMANCE LOG AND EVENT MANAGEMENT FOR SECURITY AND COMPLIANCE

TRIPWIRE LOG CENTER HIGH PERFORMANCE LOG AND SECURITY EVENT MANAGEMENT FOR SECURITY AND COMPLIANCE

Symantec Security Information Manager Version 4.7

RSA envision. Supported Event Sources. Vendor Device Collection Method. Vendor Device Collection Method. Vendor Device Collection Method

CimTrak Technical Summary. DETECT All changes across your IT environment. NOTIFY Receive instant notification that a change has occurred

Supported Devices (Event Log Sources)

CiscoWorks SIMS(Netforensics)

List of Supported Systems & Devices

Plugin Name. X N/A sudo X Antivirus Avast avast X GFI Security gfi X McAfee mcafee X mcafee-epo

TECHNOLOGY INTEGRATION GUIDE

Configuration Audit & Control

How To Protect Your Virtual Infrastructure From Attack From A Cyber Threat

TECHNOLOGY INTEGRATION GUIDE

INTEGRATION GUIDE TECHNOLOGY INTRODUCTION NETWORK DEVICES AND INFRASTRUCTURE

VMware Integrated Partner Solutions for Networking and Security

CimTrak Technical Summary. DETECT All changes across your IT environment. NOTIFY Receive instant notification that a change has occurred

ArcSight Supports a Wide Range of Security Relevant Products

Measurably reducing risk through collaboration, consensus & practical security management CIS Security Benchmarks 1

SANS Top 20 Critical Controls for Effective Cyber Defense

TIBCO LogLogic. HIPAA Compliance Suite Quick Start Guide. Software Release: December Two-Second Advantage

LogLogic Release Notes for Security Event Viewer and Security Event Manager, v3.5.0

Tripwire Log Center NEXT GENERATION LOG AND EVENT MANAGEMENT WHITE PAPER

REQUEST FOR PROPOSAL ACQUISITION & IMPLEMENTATION OF CENTRALIZED LOG MANAGEMENT SYSTEM

og 4 NET A SureL 201

VULNERABILITY & COMPLIANCE MANAGEMENT SYSTEM

QRadar SIEM and FireEye MPS Integration

Tripwire Log Center NEXT GENERATION LOG AND EVENT MANAGEMENT WHITE PAPER

MANAGED SERVICES. Remote Monitoring. Contact US: millenniuminc.com

The SIEM Evaluator s Guide

Clavister InSight TM. Protecting Values

Juniper Security Threat Response Manager (STRM) Mikko Kuljukka COMPUTERLINKS Oy

Reference Guide. Skybox View Revision: 11

CaaS Think as a bad guy Petr Hněvkovský, CISA, CISSP HP Enterprise Security

When it Comes to Monitoring and Validation it Takes More Than Just Collecting Logs

Measurably reducing risk through collaboration, consensus & practical security management CIS Security Benchmarks 1

Trend Micro. Advanced Security Built for the Cloud

Detecting a Hacking Attempt

IBM QRadar Security Intelligence April 2013

TIBCO LogLogic. SOX and COBIT Compliance Suite Quick Start Guide. Software Release: December Two-Second Advantage

Continuous Monitoring for the New IT Landscape. July 14, 2014 (Revision 1)

How To Use Ibm Tivoli Monitoring Software

Tivoli Security Information and Event Manager V1.0

RSA envision. Platform. Real-time Actionable Security Information, Streamlined Incident Handling, Effective Security Measures. RSA Solution Brief

YOUR NETWORK SECURITY WITH PROACTIVE SECURITY INTELLIGENCE

Audit and Control of Enterprise Vulnerability Management. Grant Johnson, Technical Account Manager

IBM QRadar Security Intelligence Platform appliances

Boosting enterprise security with integrated log management

Dynamic Data Center Compliance with Tripwire and Microsoft

Meeting PCI Data Security Standards with

IBM Tivoli Endpoint Manager for Security and Compliance

FISMA / NIST REVISION 3 COMPLIANCE

NetFlow Tips and Tricks

HawkEye AP Log Adapter List Updated January 2014

IBM Security QRadar SIEM & Fortinet FortiGate / FortiAnalyzer

Meeting PCI Data Security Standards with Juniper Networks Security Threat Response Manager (STRM)

Safeguarding the cloud with IBM Dynamic Cloud Security

Payment Card Industry Data Security Standard

QRadar SIEM and Zscaler Nanolog Streaming Service

QRadar SIEM 6.3 Datasheet

IBM SECURITY QRADAR INCIDENT FORENSICS

Enforcive /Cross-Platform Audit

Virtualization Journey Stages

Symantec IT Management Suite 7.5 powered by Altiris

ALERT LOGIC ACTIVEWATCH FOR LOG MANAGER

TRIPWIRE NERC SOLUTION SUITE

Intro to QualysGuard IT Compliance SaaS Services. Marek Skalicky, CISM, CRISC Regional Account Manager for Central & Adriatic Eastern Europe

Introduction to Network Discovery and Identity

Device Adapter Capabilities Report

SENTINEL MANAGEMENT & MONITORING

Peter Dulay, CISSP Senior Architect, Security BU

Continuous Network Monitoring for the New IT Landscape. March 16, 2015 (Revision 4)

How To Buy Nitro Security

Status of Open Source and commercial IPv6 firewall implementations

How To Secure A Database From A Leaky, Unsecured, And Unpatched Server

Securing your IT infrastructure with SOC/NOC collaboration

Vulnerability Management

Palo Alto Networks and Splunk: Combining Next-generation Solutions to Defeat Advanced Threats

CloudPassage Halo Technical Overview

Endpoint Security for DeltaV Systems

Tech Brief. Choosing the Right Log Management Product. By Michael Pastore

HawkEye AP Log Adapter List Updated January 2016

EMC Data Protection Advisor 6.0

What is Security Intelligence?

How To Manage Sourcefire From A Command Console

Cautela Labs Cloud Agile. Secured. Threat Management Security Solutions at Work

Kaseya Traverse. Kaseya Product Brief. Predictive SLA Management and Monitoring. Kaseya Traverse. Service Containers and Views

FireMon Security Manager Fact Sheet

LogInspect 5 Product Features Robust. Dynamic. Unparalleled.

End-user Security Analytics Strengthens Protection with ArcSight

QRadar Security Intelligence Platform Appliances

Comprehensive security platform for physical, virtual, and cloud servers

SolarWinds Security Information Management in the Payment Card Industry: Using SolarWinds Log & Event Manager (LEM) to Meet PCI Requirements

Securing and Monitoring BYOD Networks using NetFlow

Transcription:

CONFIDENCE: SECURED PRODUCT BRIEF uugiven today s environment of sophisticated security threats, big data security intelligence solutions and regulatory compliance demands, the need for a log intelligence solution has become clear. u TRIPWIRE LOG CENTER SECURITY INTELLIGENCE MADE SIMPLE As the volume and sophistication of cyberthreats increase, organizations must sift through mountains of log and event data to detect anomalies and identify real threats. The traditional approach to handling ever-increasing log and event data has been to rely on basic woefully inadequate log collection utilities, or expensive large-scale SIEM deployments. Tripwire Log Center provides the best features of a SIEM bringing real-time intelligence to machine data with fast security analytics and forensics for rapid incident response. Tripwire Log Center provides integration with your existing infrastructure and includes a growing library of correlation rules out-of-thebox, empowering your team to start monitoring your environment quickly. Whether you collect logs strictly for regulatory compliance, or to increase awareness of real threats to your network, Tripwire Log Center ensures log collection is complete, secure and reliable. Our advanced agent delivers encrypted, compressed logs to keep data safe from interception, alteration and deletion. WHAT DISTINGUISHES TRIPWIRE LOG CENTER? As a log intelligence solution, Tripwire Log Center offers a true alternative to how organizations have traditionally (and often unsuccessfully) attempted to meet their needs for early breach detection, as well as compliance requirements for complete, secure and reliable log collection, event alerting and automation. INTEGRATED EARLY BREACH DETECTION Tripwire Log Center tightly integrates with Tripwire s Security Configuration Management (Tripwire Enterprise) and Vulnerability Management (Tripwire IP360 ) solutions to effectively identify and address suspicious activity on your high-value assets. Tripwire Enterprise analyzes and hardens system configurations, detects all system changes, shows which changes threaten security and provides complete details about those changes. Tripwire IP360 determines if a device has any vulnerabilities (like an out-of-date patch), enabling you to respond accordingly. Tripwire Log Center integrates data from Tripwire Enterprise and Tripwire IP360, which provides your organization insight into the relationships between suspicious events, system changes, weak configurations and current vulnerabilities. That rich combination of information lets you better identify risk and prioritize your security efforts. For those using the 20 Critical Security Controls as a security framework, Tripwire lets you protect critical infrastructure by correlating data and providing context from the first four controls. ADVANCED THREAT PROTECTION, SECURITY AND COMPLIANCE

THREAT INTELLIGENCE Tripwire Log Center satisfies multiple needs, which reduces the workload and associated cost of SIEMs and security analytics solutions by pre-filtering data and identifying anomalies and patterns known to be threats and early indicators of breaches. This allows it to capture and archive all events, but forward only actionable, relevant data to SOC staff and SIEMs, or to newer security intelligence solutions. It does this while providing all the capabilities needed to meet the log management requirements included in most regulatory policies. uufig. 1 Tripwire Log Center lets you define complex combinations of events by easily creating correlation rules with a graphical drag and drop rule creator. u u FIG. 2 Security dashboards and trending analysis views help you manage your security risks and dynamically drill down on areas requiring greater scrutiny.

COMPLETE, RELIABLE LOG COLLECTION Tripwire Log Center ensures that organizations can meet regulatory requirements around complete, secure and reliable log collection. The agent used to collect and forward log data ensures that if a system, device or other asset goes down, you have 100 percent certainty that you ve got all the data. And we provide high levels of compression to reduce storage demands, while simultaneously protecting logs from alteration. DECREASED TIME-TO-VALUE: MITIGATE RISKS OUT OF THE BOX Tripwire Log Center has a drag-anddrop interface, which lets you quickly define and customize correlation rules for combinations of events. When your logs match those rules, Tripwire Log Center flags them for quick review or you can trigger specific alerts and actions. This reduces the need for specialized expertise and resources to create these rules in more complex formats. Tripwire Log Center comes with the solution packs listed below. Consisting of correlation rules, dashboards and other tools for security and compliance, your team can quickly get up to speed. Compliance Solution Packs NERC PCI NIST 800-53 Threat & Security Solution Packs Insider Threat User Audit and Authentication Denial of Service Detection Breach and Intrusion Detection Network and System Audit Vulnerability and Cybercrime Control Integration Database Audit You also get an at-a-glance, high-level view of your state of security with the solution s advanced event correlation, dashboards and trending analysis. With Tripwire Log Center you can easily access historical forensic data because active data is not separated from archived data. As a result, managing activity logs is easier and costs less than using the two-tiered data scheme of typical log management tools. In comparison with security intelligence tools that only hold onto and let you see a subset of log data, Tripwire Log Center lets you see all your log data, no matter what time period you need to examine. Tripwire Log Center makes it easy to gather and share security data. Access groups are based on user attributes like entitlements, groups and roles. Its standards-based classification of log and event activity supports simple searches uufig. 3 Obtain leading indicators of breach activity by adding business and user context to your incident detection efforts.

Potential attack or breach detected Changes of interest Business value of targeted asset LOG DATA SCM & FIM ASSET VALUES Vulnerability state of assets VULNERABILITY SCAN HOW CAN YOU USE TRIPWIRE LOG CENTER? Because of Tripwire Log Center s log intelligence and flexibility in integrating with other solutions, it can be used in a variety of ways. SOC STAFF uufig. 4 Tripwire Log Center provides secure and reliable log capture, sophisticated log analytics through its integration with other foundational security controls and lower cost of deployment of your existing SIEM. across platforms and devices, which yields comprehensive and accurate results for security forensic evidence or in compliance reports. BUSINESS AND USER CONTEXT Asset View in Tripwire Enterprise can be used to tag and categorize your assets by business context. This lets you identify assets in various ways, such as those most critical to your business. In addition, Tripwire Log Center integrates with Active Directory, which enables you to monitor specific users and user groups based on user attributes like entitlements, groups and roles. Combining business and user context lets you more easily monitor assets and users that together may warrant a closer watch for example, your highest value assets to which contractors have access. You can further prioritize risk by correlating suspicious events from Tripwire Log Center with suspicious changes detected by Tripwire Enterprise and vulnerabilities identified by Tripwire IP360. PRIORITIZED & ACTIONABLE SECURITY EVENTS INSTALLED SIEM Network-focused events Packet & network traffic inspection NetFlow, J-Flow & DPI Data Activity Monitoring Identity & Access Monitoring WORKS WITH EXISTING SECURITY RESPONSE WORKFLOW Many enterprise organizations use additional systems to get real-time alerts on suspicious events. For example, they may have a security intelligence solution or SIEM in their SOC or rely on a hosted solution. These systems often keep only a subset of the log data they collect and only for a limited amount of time. For this reason, organizations often require their compliance and operations departments to have a log management solution that serves as the trusted and primary collector of all logs. Tripwire Log Center not only provides secure and reliable log capture, but can pass raw log data or specific event data to other systems for further analysis. With Active Directory integration, Tripwire Log Center seamlessly gathers user entitlement, groups, roles and other attributes that already exist in your Active Directory environment to help you more accurately detect suspicious activities. DETECT INCIDENTS AND THREATS SOONER Tripwire Log Center supports early threat detection in several key ways. It collects data from devices, servers, applications and automated security processes and forwards only the actionable, relevant data to the security intelligence solution or security teams. You can easily set up advanced correlation rules that review this data to detect and alert on suspicious activity around your high-value assets. When integrated with Tripwire Enterprise, Tripwire Log Center expands the ability to create rules that detect and alert on suspicious events related to changes that affect the security and compliance state of your system, providing even richer business context. Further, when used with Tripwire IP360, vulnerability data is added to the mix, providing increased network and threat awareness of your environment. You also see security data at a more granular level through flexible and customizable dashboards with drilldown capabilities. Use it to identify incidents with intelligent data visualization and trend analysis, and easily search across platforms and devices and obtain accurate and comprehensive results with standards-based classification of log messages and events. With Tripwire Log Center, you more quickly and easily see the threats that affect your organization to act on them quickly.

GENERATE EVIDENCE FOR SECURITY AND COMPLIANCE Tripwire Log Center provides everything you need to meet the log compliance requirements of most regulatory policies and industry standards, including a pre-defined set of report templates that automatically provide the evidence they require. It aggregates and archives all log sources from network devices to servers, operating systems, applications and more. It also provides efficient access to raw log data for your own security investigations, and lets you share that data with other SIEMs and GRC tools. That meets log compliance requirements and helps those systems better detect incidents by eliminating false positives. uufig. 5 With out-of-the box reports, Tripwire Log Center helps quickly and efficiently prove compliance. With standards-based event classification, you can easily build complex, accurate reports based on cross-platform and -device queries. Efficient and tamper-proof log data storage further ensures the integrity of the data for forensic investigations. UNIFIED SECURITY INTELLIGENCE Integrating Tripwire Log Center with Tripwire Enterprise and Tripwire IP360 arms you with valuable security and business context around activity on your systems so you can prioritize and address the threats that matter most. For example, you can monitor, detect and alert upon anomalous activity occurring around your highest value assets. Do this by using Tripwire Enterprise Asset View to tag and classify assets based on criteria such as their criticality, risk, business impact, geographic locations and departments. Then filter the highest value assets based on their tags and use that information when building correlation rules in Tripwire Log Center. Further prioritize these threats by examining suspicious activity based on user entitlement with the Active Directory uufig. 6 Tripwire Log Center allows users to create customized dashboards. u u FIG. 7 Event relationship diagram displaying color-coded links between the nodes, showing the highest priority events that flowed over each link.

integration or by using Tripwire IP360 to determine which targeted assets are vulnerable due to out-of-date patches. By prioritizing threats according to who they re associated with, their impact on your most critical assets and how vulnerable they are, you can quickly execute the most effective response. COLLECT LOGS RELIABLY AND SECURELY One of the biggest challenges organizations face when meeting compliance or trying to determine root cause of an attack is the possibility that the required data has been lost or was never collected. Concerns over data loss often compel organizations to purchase additional software solutions that help ensure all data gets captured. In addition, many systems get overwhelmed by the amount of data they re supposed to capture and manage. Tripwire Log Center s advanced log collector collects all of your logs in a secure, reliable way, eliminating the need to purchase third-party software. Plus Tripwire s Hyperlogging capability ensures that even when attackers attempt to cover their tracks by turning off logging on the systems they attack, it s automatically turned back on before any data gets lost. For compliance and forensics purposes, this is critical. TRIPWIRE LOG CENTER Log Center Console Reports Alerts Security Event Manager Log Manager Data Collectors Event Database (Relational DB) Log File Storage (Flat Files) File Systems Network Devices Databases Directory Services Desktops Hypervisors Applications u u FIG. 8 Tripwire Log Center collects activity logs from anywhere in the IT infrastructure, compressing, encrypting, indexing and storing them quickly into flat files. Plus, Tripwire Log Center reduces security risk by providing near real-time dashboard visibility to security events and correlating events of interest, alerts and vulnerability data.

TRIPWIRE LOG CENTER FEATURES AND BENEFITS FEATURE Log Intelligence Security Dashboard and Event Views Business Context User Context Drag-and-Drop Correlation Rule Creator Event Flow Visualization Conditional Alerting Compliance and Management Reports Device and Application Support Accurate and Comprehensive Correlation Searches Deep Forensic Analysis Advanced Log Collector and Event Collection Security Event Ticketing System BENEFIT Through integrated Tripwire solutions, combines details of suspicious events with both in-depth knowledge of system state from Tripwire Enterprise and known vulnerabilities from Tripwire IP360 to deliver system state intelligence. That lets you better prioritize security threats based on the real risks they pose to your essential business functions. Provides state-based incident detection and better analysis by correlating change, event and vulnerability data through the integrated solutions. This provides greater visibility into possible security events.. Helps you better manage your security risks and dynamically drill down on areas requiring greater scrutiny through a centralized, customizable dashboard view of alerts, events and vulnerabilities. Lets you identify suspicious activity based on the criticality, risk and business impact of your most valued assets by leveraging Asset View tags in Tripwire Enterprise. Integrates with Active Directory to provide the context of user entitlement, groups, roles and other attributes that already exist in your Active Directory environment so that you can more accurately detect suspicious activities. Lets you define complex combinations of events that you need to be alerted on by easily creating and customizing correlation rules with a graphical, drag-and-drop rule creator. Helps you pinpoint the parts of your IT infrastructure affected by a particular incident by automatically generating a graphical event relationship diagram. Shows how an attack entered and infiltrated the network by supporting replay of events. Delivers immediate notification of suspicious activity with realtime alerting based on complex sequences of events. Supports your compliance auditing or management needs with simple and customizable reports to visualize log and event information. Offers comprehensive support for almost any device and application in your data center with pre-defined normalization rules for the devices and applications most organizations use. Lets you easily perform sophisticated searches across all event data using standardsbased event classification and provides accurate and comprehensive results. Use these results for security investigations or to meet your compliance needs. Allows quick investigation of suspicious incidents and attacks, including their root cause, impact and ongoing effects. It does this with easy search capabilities that yield accurate, comprehensive results. Provides for your event collection needs with an advanced log collector that reliably and securely collects and forwards log data. Uses a unique architecture that supports a sustained capture rate of tens of thousands of events per second (EPS). Supports prioritizing and tracking incident response by letting you generate event tickets.

ENTERPRISE INTEGRATION OUT OF THE BOX SUPPORTED DEVICES Network Devices A10 Networks A10 Networks Alcatel APC NetBotz Arbor Networks Arbor Networks Arbor Peakflow Array Networks Aruba Networks ArubaOS Astaro ASG 320 Security Gateway Avaya (Nortel) Secure Router Barracuda Networks Barracuda Load Balancer Brocade Cisco Systems CatOS Cisco Systems IOS Cisco Systems Linksys VPN Router Cisco Systems Cisco NX-OS Citrix Netscaler Cybectec SMP 16 Gateway Dell Equallogic Dell PowerConnect DLink Enterasys Networks Enterasys Extreme Networks Extreme XOS Extreme Networks ExtremeWare F5 Networks F5 BIG-IP F5 Networks F5 Firepass Foundry Networks Foundry ServerIron GarrettCom DX940 Gauntlet Modem Hewlett-Packard HP EVA Hewlett-Packard HP Procurve Hewlett-Packard HP SAN Switch Transition Networks Indura Juniper Networks Juniper SA Juniper Networks Junos OS Marconi Motorola RFS NetApp ONTAP Network Devices NetApp Virtual Tape Library Netopia Nginx Nortel Networks Nortel Connectivity Nortel Networks Nortel Passport Nortel Networks Nortel Switch PADS Pads Radware Alteon Riverbed RuggedCom RuggedServer, RuggedSwitch RuggedCom RuggedBackbonev SafeNet Networks SafeNet DataSecure Top Layer Networks TopLayer Websense Triton Security Gateway ZyXEL Security Devices Adtran Adtran NetVanta Barracuda Networks Barracuda NG Firewall Check Point Software Technologies Check Point Cisco Systems Cisco ASA (Adaptive Security Appliance) Cisco Systems Cisco Mobility Services Engine (MSE) Cisco Systems Cisco FWSM (Firewall Service Module) Cisco Systems Cisco Ironport (ESA/WSA) Cisco Systems Cisco PIX Security Appliance Cisco Systems Cisco VPN Series Concentrator Clavister AB Clavister CyberGuard Fortinet Fortinet FortiGate Fortinet Fortinet FortiGate v4.0 MR2 Fortinet Fortinet FortiGate v4.0 MR3 Fortinet Fortinet FortiGate v5.0 Guardix Juniper Networks MAG6610, MAG-SM160 Juniper Networks Netscreen Juniper Networks SSG-WLAN Juniper Networks SSL VPN Security Devices McAfee McAfee NSM McAfee McAfee Web Gateway McAfee Sidewinder Microsoft Microsoft ISA Server Microsoft Windows 2003 Firewall Microsoft Windows 2008 R2 Firewall Nokia IPSO Open Source IPFilter Open Source IPTables Open Source ModSecurity Palo Alto Networks Palo Alto Firewall Phion Firewall Phion Netfence ServGate Edgeforce ServGate Stonesoft Stonegate Firewall Vyatta Vyatta Network OS WatchGuard Westell Intrusion Detection/Prevention Systems Cisco Systems IPS Cisco Systems Secure IDS Enterasys Networks Dragon EMSv Enterasys Networks Dragon HIDS FireEye Web MPS HP TippingPoint HP Tippingpoint HyTrust HyTrust Security Appliance IBM Internet Security Systems NetworkIce McAfee IntruShield Motorola AirDefense Niksun PacketMotion PacketSentry Radware Sourcefire Snort Sourcefire Sophos Enterprise Console Symantec Endpoint Protection Manager Symantec Endpoint Protection Client TrendMicro Third Brigade TrendMicro OSSEC

Operating System Monitoring APC PDU Apple Mac OS X CentOS Cisco Systems Cisco Security Agent (CSA) Debian GNU/Linux Debian FreeBSD Foundation FreeBSD Gentoo Linux Gentoo Hewlett-Packard HP-UX IBM AIX IBM ServeRaid Mageia Mageia Mandriva S.A. Mandriva Microsoft Windows Microsoft Windows 2008, 2012, Vista, 7, 8 Microsoft Windows LTR NetBSD Newnet Communication Tech AccessGuard Novell SUSE Linux OpenBSD Red Hat Fedora Core Linux Red Hat Enterprise Linux Slackware Linux Slackware Snare AIX Snare CentOS Snare Linux Snare Windows BalaBit IT Security Syslog-ng Agent for Windows SolarWinds NetFlow SonicWALL SonicWALL Aventail E-Class SRA Sun Microsystems Solaris Tripwire Enterprise Tripwire for Servers Ubuntu Linux Zeroshell Net Service Zeroshell Wireless Cisco Systems Cisco Wireless LAN Controller (WLC) Fortinet FortiWifi Applications Oracle Siebel Panasonic Avionics AI Pentaho Perle IOLAN Progress Software Sonic ESB ProofPoint QBIK WinGate Nitgen Access Manager SSH Tectia Server Townsend Security Patrick Townsend LogAgentv VeriFone Verifone Sapphire VMware ESX VMware ESXi WU-FTPD XYPRO Safeguard PRO AudioCodes Mediant Cisco Systems Cisco CallManager User Access Control & Authentication Cisco Systems Cisco Secure Access Control Server (ACS) Cisco Systems Cisco Prime Network Control (NCS) Cyber-Ark Dell idrac6 Digi Passport DigitalPersona Microsoft Internet Authentication Service (IAS) Open Source Tacacs+ Quest Software Quest Active Roles RSA SecurID Safend WAVE Data Protection Vasco IDENTIKEY Server Vulnerability Management IBM Internet Security Systems (ISS) ISS McAfee McAfee epo McAfee McAfee VirusScan Sourcefire Clam Antivirus Symantec Symantec AntiVirus TrendMicro Deep Security Manager Security Management Consoles Aruba Networks ClearPass Access Management Check Point Software Technologies Check Point SmartCenter Computer Associates SiteMinder Policy Server Cordys Fortinet FortiAnalyzer McAfee Alert Manager Microsoft Operations Manager (MOM) Web Security Microsoft Internet Information Server (IIS) - Web/FTP Oracle Web Cache SAP AG SAP Snare Apache Snare IIS Software AG WebMethods Integration Server Sun Microsystems Sun ONE Web Server (iplanet) Email Servers Courier POP3 Courier POP3 IBM Lotus Notes Inter7 Vpopmail Microsoft Exchange Server Open Source Imapd Open Source Postfix Open Source QMail Sendmail Databases IBM Informix Dynamic Server Microsoft SQL Server MySQL AB MySQL Linux MySQL AB MySQL Windows Oracle Oracle DB Collector PostgreSQL

u Tripwire is a leading provider of advanced threat, security and compliance solutions that enable enterprises, service providers and government agencies to confidently detect, prevent and respond to cybersecurity threats. Tripwire solutions are based on high-fidelity asset visibility and deep endpoint intelligence combined with business-context, and enable security automation through enterprise integration. Tripwire s portfolio of enterprise-class security solutions includes configuration and policy management, file integrity monitoring, vulnerability management and log intelligence. Learn more at tripwire.com. u SECURITY NEWS, TRENDS AND INSIGHTS AT TRIPWIRE.COM/BLOG u FOLLOW US @TRIPWIREINC ON TWITTER 2014 Tripwire, Inc. Tripwire is a registered trademark of Tripwire, Inc. All other product and company names are property of their respective owners. All rights reserved. TLCPB7101a 201407