Sei sulla pagina 1di 4

CONFIDENCE: SECURED DATASHEET

TRIPWIRE®
CONFIGURATION
COMPLIANCE MANAGER
HIGHLIGHTS TRIPWIRE CONFIGURATION
»» Asset Discovery—Find all COMPLIANCE MANAGER 5.17
the IP-addressable assets ASSET DISCOVERY, CONFIGURATION AND PATCH COMPLIANCE
within your environment AUDITING, RISK AND PRIORITIZATION REPORTING
and create a hardware
and software inventory Enterprises in many regulated industries firewalls, desktops, laptops, servers and
»» Configuration Compliance must comply with rapid regulation and printers. Tripwire CCM then enumer-
Audit—Agentlessly assess compliance updates and increasingly ates the configuration and applications
and audit compliance of complex audit requirements. Global discovered on each system and provides
network infrastructure devices compliance standards in 2014 under- detailed information on thousands of
and other key systems went over 40,000 compliance updates. configuration variables. It identifies
In addition, increased risk from escalat- and assesses virtually everything on
»» Patch Compliance Audit— ing cyber threats brings significant new the network, from routing table entries
Assess what patches have challenges to enterprise compliance, IT and access control lists to antivirus and
been applied and know what Security, and IT Operations teams. system logging status, all without requir-
is missing or available ing agent software on the endpoints.
»» Audit-Ready Reporting Challenges include:
and Dashboards—Different, »»Compliance Policy Change CONFIGURATION
flexible views of compliance and Complexity COMPLIANCE AUDIT
and audit data based on role »»Gap Analysis Tripwire CCM audits each system’s
»»Limited Resources configuration and compares any
»»Sustaining Audit configuration changes with relevant
»»Growing Cybersecurity Risk best practice and industry standard
»»Financial Risk policies from NIST, CIS and Microsoft.
»»Increasing Audit Costs and Tripwire CCM also provides policies
Short Timelines for specific regulations such as PCI,
SOX, HIPAA, NERC CIP and more.
THE TRIPWIRE CCM SOLUTION
Tripwire® Configuration Compliance The current release of Tripwire CCM
Manager (CCM) delivers innovative significantly increases Linux policy
agentless compliance and security coverage by incorporating over 100
audit that has proven to be light touch Tripwire Enterprise Linux policies.
on most enterprise infrastructure and
quickly provides value and insight PATCH COMPLIANCE AUDIT
through a risk-prioritized view of enter- Patch compliance auditing is a criti-
prise compliance and security posture. cal step in reducing security risk and
achieving compliance. Tripwire CCM
TRIPWIRE CCM CAPABILITIES includes a powerful audit capabil-
ASSET DISCOVERY ity to find missing and unapplied
Upon installation of Tripwire CCM, patches. Whether managed through
asset discovery can be rapidly enabled the Tripwire CCM console or an easy-
to discover all IP-addressed active assets to-use report, you can quickly identify
such as routers, switches, gateways,

ADVANCED THREAT PROTECTION, SECURITY AND COMPLIANCE


which systems have missing patches
that take systems out of compliance.

REPORTING AND DASHBOARDS


Tripwire CCM compliance audit
scan results within enterprise envi-
ronments can deliver a detailed and
actionable view of asset compliance
and security posture. The system
also delivers prioritized guidance on
which findings to address first.

COMPLETE ENTERPRISE FIG.


uu 1 Tripwire CCM Aggregate Results of enterprise scan with Percent
COVERAGE—AGENT AND Compliant and Risk Scores, plus actionable details.
AGENTLESS TECHNOLOGIES
Tripwire CCM can monitor a wide vari-
ety of systems not typically monitored
using agent-based methods (e.g. routers/ PERIMETER MIDDLE INTERIOR
wireless routers, switches, gateways,
firewalls). Tripwire CCM provides $

scheduled and on-demand audits.

Tripwire CCM is complementary to


Tripwire’s agent-based solution, Tripwire Firewalls Switches Critical Systems
Routers Customer Data
Enterprise. Often, enterprise custom-
Virtual Systems Intellectual Property
ers may opt for a blended technology Gateways Employee Data
approach allowing them to place agents ICS/SCADA Desktops/Laptops
such as those used by Tripwire
Enterprise on their interior and critical
servers, Active Directory servers and FIG.
uu 2 Tripwire Security Configuration Management—Tripwire CCM and
key databases, and use the agentless Tripwire Enterprise­­­—covers the entire enterprise.
technology of Tripwire CCM to moni-
tor and audit network infrastructure
devices, edge, and desktops—all of security monitoring and assessment CCM assures that required network
which can be more challenging to without touching ICS or SCADA segmentation configurations are set and
monitor and maintain using agents. equipment, putting operational avail- do not “drift” from the policy. This
ability at risk or requiring a complicated reduces the risk of industrial automa-
TRIPWIRE CCM AND ICS deployment.  Rather than retrofitting tion system and critical infrastructure
Industrial control systems (ICS) moni- security tools built for IT, Tripwire disruption and downtime due to cyber
tor and control industrial and physical CCM for Industrial Automation is a threats from external attacks, mali-
infrastructure processes and include a purpose-built low/no-touch solution cious insiders and human error.
wide range of devices and processes, for industrial security with configura-
such as supervisory control and data tion assessment, change and threat SUMMARY
acquisition (SCADA) systems, process detection for industrial environments. Tripwire CCM’s agentless ease-of-
control systems (PCS), process control management lowers cost of compliance
domains (PCD), and building automa- Tripwire CCM supports the industry for enterprise regulatory audits and
tion and control systems (BACS). standard ANSI/ISA 62443-3-2 for minimizes risk while increasing
network segmentation and secure zones uptime by ensuring that systems
Tripwire CCM provides customers and conduits, securing zone ingress/ also remain configured in compli-
with a simple path to add effective egress and ICS system security. Tripwire ance with organizational policies.
FEATURES AND BENEFITS
Asset Discovery Quickly find all assets within your environment, create and maintain a hardware and software inventory—most
organizations find at least 10–15% more assets than they realized were present in their environment.

Configuration Compliance Easily assess network infrastructure devices, desktops and servers for audit compliance, with visualized and
Audit actionable color-coded prioritization.

File and System Integrity Most compliance standards require some type of file and system integrity monitoring for assets “in-scope.”
Monitoring Tripwire CCM’s monitoring is on-demand or scheduled, and provides change deltas from prior assessment,
giving trends and insight as to how the environment is maintaining compliance.

Patch Compliance Audit Know if your critical systems have the latest security patches applied and fulfill many compliance requirements
to keep systems current, patched and hardened against possible cybersecurity threats.

Audit-Ready Reporting and Different audiences within the organization need different views of compliance, trends and audit data;
Dashboards Compliance, IT Security, IT Operations, and executives all have specific information needs that can be flexibly
and visually presented based on roles.

Continuous Compliance Overall these capabilities combine to help enterprises achieve continuous compliance rather than a highly
variable status as they prepare for “point-in-time” compliance, and has been shown to reduce compliance and
audit readiness costs by 25–40%.

SCAP SCANS SUPPORTED PLATFORMS


»» With Tripwire CCM you can
easily view Security Content »»RHEL 4–7 »»Windows XP, 8
Automation Protocol (SCAP) »»SUSE 9.3–11 »»Windows Server 2000–2012
scan results all in one place, »»Solaris 7–11 »»Microsoft Active Directory
produce a compliance report »»VMware ESX Server 3.0–5.x »»Microsoft SQL Server 2000–2012
and confidently assure our »»VMware ESXi 3.5–5.x »»Oracle 9i–12c
agentless technology leaves »»Fedora 7–14 »»Apache 2
zero trace on the systems »»IBM AIX 4.3–6 »»Microsoft IIS 6–7.5
scanned, demonstrating »»IBM i5 OS »»Microsoft Office 2007
SCAP compliance and report »»HP-UX 10.20–11 »»Symantec AntiVirus
results for a Continuous »»Debian »»Trend Micro AntiVirus
Diagnostics and Mitigation »»Cisco IOS 11–15 »»McAfee Virus Scan
(CDM) program. »»Cisco ASA »»PatchLink Update Agent
»»Cisco PIX »»Microsoft Exchange Server 2007
»»Check Point Firewall »»MySQL 4.1–5.1
»»Juniper Network Infrastructure »»DB2
u Tripwire is a leading provider of endpoint detection and response, security, compliance and IT operation solutions for en-
terprises, service providers and government agencies. Tripwire solutions are based on high-fidelity asset visibility and deep
endpoint intelligence combined with business context; together these solutions integrate and automate security and IT
operations. Tripwire’s portfolio of enterprise-class solutions includes configuration and policy management, file integ-
rity monitoring, vulnerability management, log management, and reporting and analytics. Learn more at tripwire.com u

SECURITY NEWS, TRENDS AND INSIGHTS AT TRIPWIRE.COM/BLOG u FOLLOW US @TRIPWIREINC ON TWITTER

©2016 Tripwire, Inc. Tripwire is a registered trademark of Tripwire, Inc.


All other product and company names are property of their respective owners. All rights reserved. TCCM517b 201610

Potrebbero piacerti anche