Welcome!

News Feed Item

Tripwire Announces Expanded Virtualization Support and Flexible Deployment Options in Tripwire IP360

Tripwire, Inc., a leading global provider of risk-based security and compliance management solutions, today announced the availability of Tripwire® IP360™ version 7.3. The newly released version features expanded virtualization support as well as time saving features that enable rapid and flexible options for deployment and expansion, simplified management and faster reporting. Tripwire IP360 version 7.3 is Tripwire’s fourth release of this award-winning vulnerability management solution since acquiring nCircle in April 2013. Collectively, these releases contain dozens of improvements, including a significant expansion in vulnerability management coverage.

“Vulnerability Management is a cornerstone in any information security organization as evidenced by its position in the first four Critical Security Controls from the Council on CyberSecurity,” said Rod Murchison, vice president of product management for Tripwire. “Tripwire is devoted to helping our customers find and eliminate vulnerability risk, and this investment expanded with our acquisition of nCircle. We have continued to develop vulnerability management as a core technology and deliver valuable releases to the market throughout the past 12 months, culminating in the delivery of IP360 7.3.”

Tripwire IP360’s new virtualized appliance allows companies to maximize their hardware investments by virtualizing all or part of their vulnerability management solution for rapid deployment and scalability. The powerful, security-hardened virtual appliance can utilize a built-in device profiler as well as leverage one or more physical or virtual device profiler appliances. Organizations can employ on-premise infrastructure to protect networks of any size from vulnerability threats. Tripwire IP360 can be used with VMware ESXi, VirtualBox, VMware Workstation and VMware Fusion hypervisors.

In addition to virtualization, key features of Tripwire IP360 version 7.3 include:

  • Streamlined upgrade process for quick and easy upgrades to future IP360 versions.
  • Redesigned OS fingerprinting engine for improved operating system identification.
  • An enhanced command line interface (CLI) that includes powerful and time saving features for administrators.

“With the launch of the virtualized vulnerability management offering, Tripwire now has the most comprehensive deployment options available,” said Russ Gallery, owner of Access Technology Group. “Tripwire vulnerability management solutions address the entire market – from small organizations with Tripwire SecureScan to mid-enterprise customers, all the way to the largest enterprises in the world. Virtualized appliances are especially important in the mid-enterprise market because of the ease of deployment and a low total cost of ownership.”

Tripwire products include timely vulnerability intelligence delivered by the company's Vulnerability and Exposure Research Team (VERT). This dedicated team of world-class security and vulnerability researchers focuses unwavering attention on the changing threat environment. Tripwire's VERT identifies emerging vulnerabilities and creates unique detection signatures that are constantly updated in Tripwire vulnerability and risk management solutions – delivering unprecedented vulnerability discovery coverage. Since April 2013, new VERT coverage includes:

  • 6,238 new vulnerability detection rules.
  • 1,827 new application detection rules.
  • 75 new operating system detection rules.

“IP360 version 7.3 represents a turning point for Tripwire vulnerability management,” said Tim Erlin, Tripwire’s director of information risk and security strategy. “By introducing a new underlying platform, we can deliver new features and functionality to the market faster than ever before. These platform changes enable the immediate introduction of a new virtual appliance, the expansion of support for hypervisors through the Open Virtualization Format (OVF) and a single appliance offering that is targeted at the mid-enterprise market.”

For more information on new Tripwire IP360 features, please visit: http://www.tripwire.com/register/whats-new-in-tripwire-ip360-v73/.

About Tripwire

Tripwire is a leading global provider of risk-based security and compliance management solutions, enabling enterprises, government agencies and service providers to effectively connect security to their business. Tripwire provides the broadest set of foundational security controls including security configuration management, vulnerability management, file integrity monitoring, log and event management. Tripwire solutions deliver unprecedented visibility, business context and security business intelligence allowing extended enterprises to protect sensitive data from breaches, vulnerabilities, and threats. Learn more at www.tripwire.com, get security news, trends and insights at http://www.tripwire.com/state-of-security/ or follow us on Twitter @TripwireInc.

More Stories By Business Wire

Copyright © 2009 Business Wire. All rights reserved. Republication or redistribution of Business Wire content is expressly prohibited without the prior written consent of Business Wire. Business Wire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Latest Stories
Multiple data types are pouring into IoT deployments. Data is coming in small packages as well as enormous files and data streams of many sizes. Widespread use of mobile devices adds to the total. In this power panel at @ThingsExpo, moderated by Conference Chair Roger Strukhoff, panelists will look at the tools and environments that are being put to use in IoT deployments, as well as the team skills a modern enterprise IT shop needs to keep things running, get a handle on all this data, and deli...
All organizations that did not originate this moment have a pre-existing culture as well as legacy technology and processes that can be more or less amenable to DevOps implementation. That organizational culture is influenced by the personalities and management styles of Executive Management, the wider culture in which the organization is situated, and the personalities of key team members at all levels of the organization. This culture and entrenched interests usually throw a wrench in the work...
SYS-CON Events announced today that CollabNet, a global leader in enterprise software development, release automation and DevOps solutions, will be a Bronze Sponsor of SYS-CON's 20th International Cloud Expo®, taking place from June 6-8, 2017, at the Javits Center in New York City, NY. CollabNet offers a broad range of solutions with the mission of helping modern organizations deliver quality software at speed. The company’s latest innovation, the DevOps Lifecycle Manager (DLM), supports Value S...
The Internet of Things is clearly many things: data collection and analytics, wearables, Smart Grids and Smart Cities, the Industrial Internet, and more. Cool platforms like Arduino, Raspberry Pi, Intel's Galileo and Edison, and a diverse world of sensors are making the IoT a great toy box for developers in all these areas. In this Power Panel at @ThingsExpo, moderated by Conference Chair Roger Strukhoff, panelists discussed what things are the most important, which will have the most profound e...
Automation is enabling enterprises to design, deploy, and manage more complex, hybrid cloud environments. Yet the people who manage these environments must be trained in and understanding these environments better than ever before. A new era of analytics and cognitive computing is adding intelligence, but also more complexity, to these cloud environments. How smart is your cloud? How smart should it be? In this power panel at 20th Cloud Expo, moderated by Conference Chair Roger Strukhoff, pane...
The explosion of new web/cloud/IoT-based applications and the data they generate are transforming our world right before our eyes. In this rush to adopt these new technologies, organizations are often ignoring fundamental questions concerning who owns the data and failing to ask for permission to conduct invasive surveillance of their customers. Organizations that are not transparent about how their systems gather data telemetry without offering shared data ownership risk product rejection, regu...
SYS-CON Events announced today that Progress, a global leader in application development, has been named “Bronze Sponsor” of SYS-CON's 20th International Cloud Expo®, which will take place on June 6-8, 2017, at the Javits Center in New York City, NY. Enterprises today are rapidly adopting the cloud, while continuing to retain business-critical/sensitive data inside the firewall. This is creating two separate data silos – one inside the firewall and the other outside the firewall. Cloud ISVs oft...
SYS-CON Events announced today that Grape Up will exhibit at SYS-CON's 21st International Cloud Expo®, which will take place on Oct. 31 – Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA. Grape Up is a software company specializing in cloud native application development and professional services related to Cloud Foundry PaaS. With five expert teams that operate in various sectors of the market across the U.S. and Europe, Grape Up works with a variety of customers from emergi...
The age of Digital Disruption is evolving into the next era – Digital Cohesion, an age in which applications securely self-assemble and deliver predictive services that continuously adapt to user behavior. Information from devices, sensors and applications around us will drive services seamlessly across mobile and fixed devices/infrastructure. This evolution is happening now in software defined services and secure networking. Four key drivers – Performance, Economics, Interoperability and Trust ...
@ThingsExpo has been named the Most Influential ‘Smart Cities - IIoT' Account and @BigDataExpo has been named fourteenth by Right Relevance (RR), which provides curated information and intelligence on approximately 50,000 topics. In addition, Right Relevance provides an Insights offering that combines the above Topics and Influencers information with real time conversations to provide actionable intelligence with visualizations to enable decision making. The Insights service is applicable to eve...
Building a cross-cloud operational model can be a daunting task. Per-cloud silos are not the answer, but neither is a fully generic abstraction plane that strips out capabilities unique to a particular provider. In his session at 20th Cloud Expo, Chris Wolf, VP & Chief Technology Officer, Global Field & Industry at VMware, will discuss how successful organizations approach cloud operations and management, with insights into where operations should be centralized and when it’s best to decentraliz...
DevOps is often described as a combination of technology and culture. Without both, DevOps isn't complete. However, applying the culture to outdated technology is a recipe for disaster; as response times grow and connections between teams are delayed by technology, the culture will die. A Nutanix Enterprise Cloud has many benefits that provide the needed base for a true DevOps paradigm.
Cybersecurity is a critical component of software development in many industries including medical devices. However, code is not always written to be robust or secure from the unknown or the unexpected. This gap can make medical devices susceptible to cybersecurity attacks ranging from compromised personal health information to life-sustaining treatment. In his session at @ThingsExpo, Clark Fortney, Software Engineer at Battelle, will discuss how programming oversight using key methods can incre...
The goal of Continuous Testing is to shift testing left to find defects earlier and release software faster. This can be achieved by integrating a set of open source functional and performance testing tools in the early stages of your software delivery lifecycle. There is one process that binds all application delivery stages together into one well-orchestrated machine: Continuous Testing. Continuous Testing is the conveyor belt between the Software Factory and production stages. Artifacts are ...
In recent years, containers have taken the world by storm. Companies of all sizes and industries have realized the massive benefits of containers, such as unprecedented mobility, higher hardware utilization, and increased flexibility and agility; however, many containers today are non-persistent. Containers without persistence miss out on many benefits, and in many cases simply pass the responsibility of persistence onto other infrastructure, adding additional complexity.