SYS-CON MEDIA Authors: Elizabeth White, Yeshim Deniz, Peter Silva, Pat Romanski, Blue Box Blog

News Feed Item

Tripwire Announces Expanded Virtualization Support and Flexible Deployment Options in Tripwire IP360

Tripwire, Inc., a leading global provider of risk-based security and compliance management solutions, today announced the availability of Tripwire® IP360™ version 7.3. The newly released version features expanded virtualization support as well as time saving features that enable rapid and flexible options for deployment and expansion, simplified management and faster reporting. Tripwire IP360 version 7.3 is Tripwire’s fourth release of this award-winning vulnerability management solution since acquiring nCircle in April 2013. Collectively, these releases contain dozens of improvements, including a significant expansion in vulnerability management coverage.

“Vulnerability Management is a cornerstone in any information security organization as evidenced by its position in the first four Critical Security Controls from the Council on CyberSecurity,” said Rod Murchison, vice president of product management for Tripwire. “Tripwire is devoted to helping our customers find and eliminate vulnerability risk, and this investment expanded with our acquisition of nCircle. We have continued to develop vulnerability management as a core technology and deliver valuable releases to the market throughout the past 12 months, culminating in the delivery of IP360 7.3.”

Tripwire IP360’s new virtualized appliance allows companies to maximize their hardware investments by virtualizing all or part of their vulnerability management solution for rapid deployment and scalability. The powerful, security-hardened virtual appliance can utilize a built-in device profiler as well as leverage one or more physical or virtual device profiler appliances. Organizations can employ on-premise infrastructure to protect networks of any size from vulnerability threats. Tripwire IP360 can be used with VMware ESXi, VirtualBox, VMware Workstation and VMware Fusion hypervisors.

In addition to virtualization, key features of Tripwire IP360 version 7.3 include:

  • Streamlined upgrade process for quick and easy upgrades to future IP360 versions.
  • Redesigned OS fingerprinting engine for improved operating system identification.
  • An enhanced command line interface (CLI) that includes powerful and time saving features for administrators.

“With the launch of the virtualized vulnerability management offering, Tripwire now has the most comprehensive deployment options available,” said Russ Gallery, owner of Access Technology Group. “Tripwire vulnerability management solutions address the entire market – from small organizations with Tripwire SecureScan to mid-enterprise customers, all the way to the largest enterprises in the world. Virtualized appliances are especially important in the mid-enterprise market because of the ease of deployment and a low total cost of ownership.”

Tripwire products include timely vulnerability intelligence delivered by the company's Vulnerability and Exposure Research Team (VERT). This dedicated team of world-class security and vulnerability researchers focuses unwavering attention on the changing threat environment. Tripwire's VERT identifies emerging vulnerabilities and creates unique detection signatures that are constantly updated in Tripwire vulnerability and risk management solutions – delivering unprecedented vulnerability discovery coverage. Since April 2013, new VERT coverage includes:

  • 6,238 new vulnerability detection rules.
  • 1,827 new application detection rules.
  • 75 new operating system detection rules.

“IP360 version 7.3 represents a turning point for Tripwire vulnerability management,” said Tim Erlin, Tripwire’s director of information risk and security strategy. “By introducing a new underlying platform, we can deliver new features and functionality to the market faster than ever before. These platform changes enable the immediate introduction of a new virtual appliance, the expansion of support for hypervisors through the Open Virtualization Format (OVF) and a single appliance offering that is targeted at the mid-enterprise market.”

For more information on new Tripwire IP360 features, please visit: http://www.tripwire.com/register/whats-new-in-tripwire-ip360-v73/.

About Tripwire

Tripwire is a leading global provider of risk-based security and compliance management solutions, enabling enterprises, government agencies and service providers to effectively connect security to their business. Tripwire provides the broadest set of foundational security controls including security configuration management, vulnerability management, file integrity monitoring, log and event management. Tripwire solutions deliver unprecedented visibility, business context and security business intelligence allowing extended enterprises to protect sensitive data from breaches, vulnerabilities, and threats. Learn more at www.tripwire.com, get security news, trends and insights at http://www.tripwire.com/state-of-security/ or follow us on Twitter @TripwireInc.

More Stories By Business Wire

Copyright © 2009 Business Wire. All rights reserved. Republication or redistribution of Business Wire content is expressly prohibited without the prior written consent of Business Wire. Business Wire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Latest Stories
What exactly is a cognitive application? In her session at 16th Cloud Expo, Ashley Hathaway, Product Manager at IBM Watson, will look at the services being offered by the IBM Watson Developer Cloud and what that means for developers and Big Data. She'll explore how IBM Watson and its partnerships will continue to grow and help define what it means to be a cognitive service, as well as take a look at the offerings on Bluemix. She will also check out how Watson and the Alchemy API team up to off...
More organizations are embracing DevOps to realize compelling business benefits such as more frequent feature releases, increased application stability, and more productive resource utilization. However, security and compliance monitoring tools have not kept up and often represent the single largest remaining hurdle to continuous delivery. In their session at DevOps Summit, Justin Criswell, Senior Sales Engineer at Alert Logic, Ricardo Lupo, a Solution Architect with Chef, will discuss how to ...
Thanks to Docker, it becomes very easy to leverage containers to build, ship, and run any Linux application on any kind of infrastructure. Docker is particularly helpful for microservice architectures because their successful implementation relies on a fast, efficient deployment mechanism – which is precisely one of the features of Docker. Microservice architectures are therefore becoming more popular, and are increasingly seen as an interesting option even for smaller projects, instead of bein...
SYS-CON Events announced today that Site24x7, the cloud infrastructure monitoring service, will exhibit at SYS-CON's 16th International Cloud Expo®, which will take place on June 9-11, 2015, at the Javits Center in New York City, NY. Site24x7 is a cloud infrastructure monitoring service that helps monitor the uptime and performance of websites, online applications, servers, mobile websites and custom APIs. The monitoring is done from 50+ locations across the world and from various wireless carr...
SYS-CON Events announced today that WSM International (WSM), the world’s leading cloud and server migration services provider, will exhibit at SYS-CON's 16th International Cloud Expo®, which will take place on June 9-11, 2015, at the Javits Center in New York City, NY. WSM is a solutions integrator with a core focus on cloud and server migration, transformation and DevOps services.
The Workspace-as-a-Service (WaaS) market will grow to $6.4B by 2018. In his session at 16th Cloud Expo, Seth Bostock, CEO of IndependenceIT, will begin by walking the audience through the evolution of Workspace as-a-Service, where it is now vs. where it going. To look beyond the desktop we must understand exactly what WaaS is, who the users are, and where it is going in the future. IT departments, ISVs and service providers must look to workflow and automation capabilities to adapt to growing ...
SYS-CON Events announced today that SafeLogic has been named “Bag Sponsor” of SYS-CON's 16th International Cloud Expo® New York, which will take place June 9-11, 2015, at the Javits Center in New York City, NY. SafeLogic provides security products for applications in mobile and server/appliance environments. SafeLogic’s flagship product CryptoComply is a FIPS 140-2 validated cryptographic engine designed to secure data on servers, workstations, appliances, mobile devices, and in the Cloud....
The speed of product development has increased massively in the past 10 years. At the same time our formal secure development and SDL methodologies have fallen behind. This forces product developers to choose between rapid release times and security. In his session at DevOps Summit, Michael Murray, Director of Cyber Security Consulting and Assessment at GE Healthcare, examined the problems and presented some solutions for moving security into the DevOps lifecycle to ensure that we get fast AND ...
SYS-CON Events announced today that Akana, formerly SOA Software, has been named “Bronze Sponsor” of SYS-CON's 16th International Cloud Expo® New York, which will take place June 9-11, 2015, at the Javits Center in New York City, NY. Akana’s comprehensive suite of API Management, API Security, Integrated SOA Governance, and Cloud Integration solutions helps businesses accelerate digital transformation by securely extending their reach across multiple channels – mobile, cloud and Internet of Thi...
There has been a lot of discussion recently in the DevOps space over whether there is a unique form of DevOps for large enterprises or is it just vendors looking to sell services and tools. In his session at DevOps Summit, Chris Riley, a technologist, discussed whether Enterprise DevOps is a unique species or not. What makes DevOps adoption in the enterprise unique or what doesn’t? Unique or not, what does this mean for adopting DevOps in enterprise size organizations? He also explored differe...
In his session at DevOps Summit, Tapabrata Pal, Director of Enterprise Architecture at Capital One, will tell a story about how Capital One has embraced Agile and DevOps Security practices across the Enterprise – driven by Enterprise Architecture; bringing in Development, Operations and Information Security organizations together. Capital Ones DevOpsSec practice is based upon three "pillars" – Shift-Left, Automate Everything, Dashboard Everything. Within about three years, from 100% waterfall, C...
SYS-CON Events announced today that Plutora, Inc., the leading global provider of enterprise release management and test environment management SaaS solutions, will exhibit at SYS-CON's DevOps Summit 2015 New York, which will take place on June 9-11, 2015, at the Javits Center in New York City, NY. Headquartered in Mountain View, California, Plutora provides enterprise release management and test environment SaaS solutions to clients in North America, Europe and Asia Pacific. Leading companies ...
Skeuomorphism usually means retaining existing design cues in something new that doesn’t actually need them. However, the concept of skeuomorphism can be thought of as relating more broadly to applying existing patterns to new technologies that, in fact, cry out for new approaches. In his session at DevOps Summit, Gordon Haff, Senior Cloud Strategy Marketing and Evangelism Manager at Red Hat, will discuss why containers should be paired with new architectural practices such as microservices ra...
SYS-CON Events announced today that Open Data Centers (ODC), a carrier-neutral colocation provider, will exhibit at SYS-CON's 16th International Cloud Expo®, which will take place June 9-11, 2015, at the Javits Center in New York City, NY. Open Data Centers is a carrier-neutral data center operator in New Jersey and New York City offering alternative connectivity options for carriers, service providers and enterprise customers.
Thanks to Docker, it becomes very easy to leverage containers to build, ship, and run any Linux application on any kind of infrastructure. Docker is particularly helpful for microservice architectures because their successful implementation relies on a fast, efficient deployment mechanism – which is precisely one of the features of Docker. Microservice architectures are therefore becoming more popular, and are increasingly seen as an interesting option even for smaller projects, instead of bein...