Security Engineer at a tech services company with 11-50 employees
Real User
Top 5
2023-12-14T12:12:21Z
Dec 14, 2023
The solution is used for hardening and tracking changes. It can be used for file integrity monitoring and secure configuration management. Tripwire is a traditional SCM solution.
Senior Technical Engineer at a tech vendor with 51-200 employees
Real User
Top 5
2021-03-19T04:31:00Z
Mar 19, 2021
Banks have different compliance requirements, such as CIFs or NEFT, and they want to monitor everything at the OS, application, server, and virtualization level. They want to detect who has made the change, when did they make the change, and what is the root cause of those changes. We can monitor all this along with root causes with the Tripwire Premium solution. We are monitoring different files, folders, registries, applications, and servers. We are also implementing GuardianOS.
Cyber Security Consultant at a tech services company with 51-200 employees
Real User
2020-01-07T06:27:00Z
Jan 7, 2020
The primary use case of this solution is for: * Check File Integrity * Check Databases Configuration Integrity, Network devices, * Monitor changes manually or in real time * Validate legitimate changes * Reverse unauthorized changes * Test node compliance against standards( ISO 27001, PCI DSS, SWIFT...) * Automatic and manual remediation * Generate reports manually or automatically * Send notification emails * Send logs via Syslog protocol
Find out what your peers are saying about Fortra, Trend Micro, NNT and others in Intrusion Detection and Prevention Software (IDPS). Updated: June 2024.
What Is an Intrusion Detection System? Intrusion detection systems (IDSes) analyze network traffic for signatures of known attackers. The systems can be hardware devices or software solutions. An IDS can mitigate existing malware, such as backdoors, rootkits, and trojans.The goal of an intrusion detection system is to detect an attack as it occurs. The system starts by analyzing inbound and outbound network traffic for signs of known attackers.
Some activities an IDS performs...
The solution is used for hardening and tracking changes. It can be used for file integrity monitoring and secure configuration management. Tripwire is a traditional SCM solution.
I primarily use the solution for many use cases.
We use the solution for compliance purposes.
We use Tripwire Enterprise for monitoring configurations on your devices.
Banks have different compliance requirements, such as CIFs or NEFT, and they want to monitor everything at the OS, application, server, and virtualization level. They want to detect who has made the change, when did they make the change, and what is the root cause of those changes. We can monitor all this along with root causes with the Tripwire Premium solution. We are monitoring different files, folders, registries, applications, and servers. We are also implementing GuardianOS.
The primary use case of this solution is for: * Check File Integrity * Check Databases Configuration Integrity, Network devices, * Monitor changes manually or in real time * Validate legitimate changes * Reverse unauthorized changes * Test node compliance against standards( ISO 27001, PCI DSS, SWIFT...) * Automatic and manual remediation * Generate reports manually or automatically * Send notification emails * Send logs via Syslog protocol
Our primary use case for the Tripwire Enterprise solution is for vulnerability assessment.