Delivering an integrated, automated view of cybersecurity risk

Tripwire, Inc. has integrated multiple sources of threat intelligence into its Adaptive Threat Protection solution. The expanded solution now incorporates threat intelligence from a variety of commercial and community best-of-breed threat intelligence offerings including Check Point Software, Cisco, CrowdStrike, Lastline, Palo Alto Networks and Soltra, the STIX TAXII communication platform.

  • 9 years ago Posted in

“Leveraging threat intelligence from multiple sources offers maximum protection from advanced threats,” said Rekha Shenoy, vice president of business and corporate development for Tripwire. “These integrations are a key part of Tripwire’s commitment to delivering comprehensive solutions that make it possible for security teams to reduce the time needed to both detect and respond to elusive, advanced threats.”

By correlating and comparing Tripwire’s trusted endpoint intelligence with multiple sources of threat intelligence at machine speed, this expanded adaptive threat protection provides users with the necessary context to discover and respond with precision to both known and unknown cyber threats. The Tripwire solution integrates peer and community threat feeds, leveraging STIX and TAXII standards, as well as a variety of commercial threat intelligence services. These services identify Indicators of Compromise (IOCs) associated with advanced and zero-day threats. The IOCs are automatically downloaded to Tripwire® Enterprise and analyzed to quickly identify any compromised assets, determine risk priority and accelerate remediation response.

Key features of adaptive threat protection integrations include:

Faster detection and analysis of zero-day and advanced persistent threats (APTs).
Automatic, immediate analysis of IOCs, suspicious files and malware.
Proactive alerts prioritized by business context and speed response time.
Definitive detection of anomalous system and file changes using proven Tripwire change detection technology.
Support for STIX and TAXII standards.
Optional automatic adjustment of configuration settings to harden assets against specific threats.

The AV-TEST Institute registers over 390,000 new malicious programs every day, and according to a recent Ponemon Institute report, 68 percent of IT and IT security practitioners involved in defensive efforts against APTs said zero-day attacks are their organization’s greatest threat. The longer malware and targeted attacks remain undetected, the more time cybercriminals have to infiltrate corporate and government networks.

“The unfortunate reality is that organizations are continually under attack by sophisticated threats specifically designed to evade detection,” said Wendy Nather, research director for security at 451 Research. “Even organizations with substantial security investments are looking for automated solutions that can apply the information from threat intelligence feeds to their specific network and business challenges.”

Research shows ‘game needs to be changed,’ with security innovation years behind that of the...
Node4 has released its Mid-Market IT Priorities Report 2021. The independent report reveals that...
Atos has launched Atos OneCloud Sovereign Shield, a set of solutions, methodologies, and...
New distribution agreement set to bolster Westcon-Comstor’s Zero Trust offering in more markets...
Research from Avast has found that employees in almost a third (31%) of Small and Medium...
This year, over half of MSPs or their end customers have been attacked by ransomware but only 53%...
Trend Micro has published new research revealing that 90% of IT decision makers claim their...
Cyber consultants call on businesses to act now, or risk budgets shrinking further in ‘real...