Welcome!

News Feed Item

Tripwire Announces Expanded Virtualization Support and Flexible Deployment Options in Tripwire IP360

Tripwire, Inc., a leading global provider of risk-based security and compliance management solutions, today announced the availability of Tripwire® IP360™ version 7.3. The newly released version features expanded virtualization support as well as time saving features that enable rapid and flexible options for deployment and expansion, simplified management and faster reporting. Tripwire IP360 version 7.3 is Tripwire’s fourth release of this award-winning vulnerability management solution since acquiring nCircle in April 2013. Collectively, these releases contain dozens of improvements, including a significant expansion in vulnerability management coverage.

“Vulnerability Management is a cornerstone in any information security organization as evidenced by its position in the first four Critical Security Controls from the Council on CyberSecurity,” said Rod Murchison, vice president of product management for Tripwire. “Tripwire is devoted to helping our customers find and eliminate vulnerability risk, and this investment expanded with our acquisition of nCircle. We have continued to develop vulnerability management as a core technology and deliver valuable releases to the market throughout the past 12 months, culminating in the delivery of IP360 7.3.”

Tripwire IP360’s new virtualized appliance allows companies to maximize their hardware investments by virtualizing all or part of their vulnerability management solution for rapid deployment and scalability. The powerful, security-hardened virtual appliance can utilize a built-in device profiler as well as leverage one or more physical or virtual device profiler appliances. Organizations can employ on-premise infrastructure to protect networks of any size from vulnerability threats. Tripwire IP360 can be used with VMware ESXi, VirtualBox, VMware Workstation and VMware Fusion hypervisors.

In addition to virtualization, key features of Tripwire IP360 version 7.3 include:

  • Streamlined upgrade process for quick and easy upgrades to future IP360 versions.
  • Redesigned OS fingerprinting engine for improved operating system identification.
  • An enhanced command line interface (CLI) that includes powerful and time saving features for administrators.

“With the launch of the virtualized vulnerability management offering, Tripwire now has the most comprehensive deployment options available,” said Russ Gallery, owner of Access Technology Group. “Tripwire vulnerability management solutions address the entire market – from small organizations with Tripwire SecureScan to mid-enterprise customers, all the way to the largest enterprises in the world. Virtualized appliances are especially important in the mid-enterprise market because of the ease of deployment and a low total cost of ownership.”

Tripwire products include timely vulnerability intelligence delivered by the company's Vulnerability and Exposure Research Team (VERT). This dedicated team of world-class security and vulnerability researchers focuses unwavering attention on the changing threat environment. Tripwire's VERT identifies emerging vulnerabilities and creates unique detection signatures that are constantly updated in Tripwire vulnerability and risk management solutions – delivering unprecedented vulnerability discovery coverage. Since April 2013, new VERT coverage includes:

  • 6,238 new vulnerability detection rules.
  • 1,827 new application detection rules.
  • 75 new operating system detection rules.

“IP360 version 7.3 represents a turning point for Tripwire vulnerability management,” said Tim Erlin, Tripwire’s director of information risk and security strategy. “By introducing a new underlying platform, we can deliver new features and functionality to the market faster than ever before. These platform changes enable the immediate introduction of a new virtual appliance, the expansion of support for hypervisors through the Open Virtualization Format (OVF) and a single appliance offering that is targeted at the mid-enterprise market.”

For more information on new Tripwire IP360 features, please visit: http://www.tripwire.com/register/whats-new-in-tripwire-ip360-v73/.

About Tripwire

Tripwire is a leading global provider of risk-based security and compliance management solutions, enabling enterprises, government agencies and service providers to effectively connect security to their business. Tripwire provides the broadest set of foundational security controls including security configuration management, vulnerability management, file integrity monitoring, log and event management. Tripwire solutions deliver unprecedented visibility, business context and security business intelligence allowing extended enterprises to protect sensitive data from breaches, vulnerabilities, and threats. Learn more at www.tripwire.com, get security news, trends and insights at http://www.tripwire.com/state-of-security/ or follow us on Twitter @TripwireInc.

More Stories By Business Wire

Copyright © 2009 Business Wire. All rights reserved. Republication or redistribution of Business Wire content is expressly prohibited without the prior written consent of Business Wire. Business Wire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Latest Stories
"Peak 10 is a national cloud data center solutions managed services provider, and part of that is disaster recovery. We see a growing trend in the industry where companies are coming to us looking for assistance in their DR strategy," stated Andrew Cole, Director of Solutions Engineering at Peak 10, in this SYS-CON.tv interview at 18th Cloud Expo, held June 7-9, 2016, at the Javits Center in New York City, NY.
The now mainstream platform changes stemming from the first Internet boom brought many changes but didn’t really change the basic relationship between servers and the applications running on them. In fact, that was sort of the point. In his session at 18th Cloud Expo, Gordon Haff, senior cloud strategy marketing and evangelism manager at Red Hat, will discuss how today’s workloads require a new model and a new platform for development and execution. The platform must handle a wide range of rec...
Charles Araujo is an industry analyst, internationally recognized authority on the Digital Enterprise and author of The Quantum Age of IT: Why Everything You Know About IT is About to Change. As Principal Analyst with Intellyx, he writes, speaks and advises organizations on how to navigate through this time of disruption. He is also the founder of The Institute for Digital Transformation and a sought after keynote speaker. He has been a regular contributor to both InformationWeek and CIO Insight...
Bill Schmarzo, Tech Chair of "Big Data | Analytics" of upcoming CloudEXPO | DXWorldEXPO New York (November 12-13, 2018, New York City) today announced the outline and schedule of the track. "The track has been designed in experience/degree order," said Schmarzo. "So, that folks who attend the entire track can leave the conference with some of the skills necessary to get their work done when they get back to their offices. It actually ties back to some work that I'm doing at the University of ...
Rodrigo Coutinho is part of OutSystems' founders' team and currently the Head of Product Design. He provides a cross-functional role where he supports Product Management in defining the positioning and direction of the Agile Platform, while at the same time promoting model-based development and new techniques to deliver applications in the cloud.
DXWorldEXPO LLC announced today that Kevin Jackson joined the faculty of CloudEXPO's "10-Year Anniversary Event" which will take place on November 11-13, 2018 in New York City. Kevin L. Jackson is a globally recognized cloud computing expert and Founder/Author of the award winning "Cloud Musings" blog. Mr. Jackson has also been recognized as a "Top 100 Cybersecurity Influencer and Brand" by Onalytica (2015), a Huffington Post "Top 100 Cloud Computing Experts on Twitter" (2013) and a "Top 50 C...
Andrew Keys is Co-Founder of ConsenSys Enterprise. He comes to ConsenSys Enterprise with capital markets, technology and entrepreneurial experience. Previously, he worked for UBS investment bank in equities analysis. Later, he was responsible for the creation and distribution of life settlement products to hedge funds and investment banks. After, he co-founded a revenue cycle management company where he learned about Bitcoin and eventually Ethereal. Andrew's role at ConsenSys Enterprise is a mul...
The revocation of Safe Harbor has radically affected data sovereignty strategy in the cloud. In his session at 17th Cloud Expo, Jeff Miller, Product Management at Cavirin Systems, discussed how to assess these changes across your own cloud strategy, and how you can mitigate risks previously covered under the agreement.
In his session at 21st Cloud Expo, Raju Shreewastava, founder of Big Data Trunk, provided a fun and simple way to introduce Machine Leaning to anyone and everyone. He solved a machine learning problem and demonstrated an easy way to be able to do machine learning without even coding. Raju Shreewastava is the founder of Big Data Trunk (www.BigDataTrunk.com), a Big Data Training and consulting firm with offices in the United States. He previously led the data warehouse/business intelligence and Bi...
Digital Initiatives create new ways of conducting business, which drive the need for increasingly advanced security and regulatory compliance challenges with exponentially more damaging consequences. In the BMC and Forbes Insights Survey in 2016, 97% of executives said they expect a rise in data breach attempts in the next 12 months. Sixty percent said operations and security teams have only a general understanding of each other’s requirements, resulting in a “SecOps gap” leaving organizations u...
Cell networks have the advantage of long-range communications, reaching an estimated 90% of the world. But cell networks such as 2G, 3G and LTE consume lots of power and were designed for connecting people. They are not optimized for low- or battery-powered devices or for IoT applications with infrequently transmitted data. Cell IoT modules that support narrow-band IoT and 4G cell networks will enable cell connectivity, device management, and app enablement for low-power wide-area network IoT. B...
While some developers care passionately about how data centers and clouds are architected, for most, it is only the end result that matters. To the majority of companies, technology exists to solve a business problem, and only delivers value when it is solving that problem. 2017 brings the mainstream adoption of containers for production workloads. In his session at 21st Cloud Expo, Ben McCormack, VP of Operations at Evernote, discussed how data centers of the future will be managed, how the p...
Transformation Abstract Encryption and privacy in the cloud is a daunting yet essential task for both security practitioners and application developers, especially as applications continue moving to the cloud at an exponential rate. What are some best practices and processes for enterprises to follow that balance both security and ease of use requirements? What technologies are available to empower enterprises with code, data and key protection from cloud providers, system administrators, inside...
Extreme Computing is the ability to leverage highly performant infrastructure and software to accelerate Big Data, machine learning, HPC, and Enterprise applications. High IOPS Storage, low-latency networks, in-memory databases, GPUs and other parallel accelerators are being used to achieve faster results and help businesses make better decisions. In his session at 18th Cloud Expo, Michael O'Neill, Strategic Business Development at NVIDIA, focused on some of the unique ways extreme computing is...
The Internet of Things will challenge the status quo of how IT and development organizations operate. Or will it? Certainly the fog layer of IoT requires special insights about data ontology, security and transactional integrity. But the developmental challenges are the same: People, Process and Platform and how we integrate our thinking to solve complicated problems. In his session at 19th Cloud Expo, Craig Sproule, CEO of Metavine, demonstrated how to move beyond today's coding paradigm and sh...