Upload
tripwire
View
1.687
Download
11
Embed Size (px)
Citation preview
Tripwire IP360Enterprise-class Vulnerability Management
2
Cyberthreat Landscape
5.5M5.5 million new devices come online every day
Gartner
99.9%99.9% of compromises
take minutes or lessVerizon
1MThere are more than 1 million unfilled security jobs Cisco
51%51% of organizations cite data overload as the biggest challenge to prioritizing vulnerability scans. Nopsec
3
The Cybersecurity LandscapeGrowing Threats, Complex Networks
You have more to protect, fewer resources with which to do it,
and more alerts than you can handle.
4
Vulnerability Management Challenges
Increasing numbers of hosts and vulnerabilities
Security has high operation overhead and cost implications
Takes too long to analyze and prioritize risk exposure
Slower response and reduced cyber-resilience
5
What If The Ideal Solution Helped You…
Protect the increasing numbers of hosts and vulnerabilities on your network
Improve your visibility of device and application inventory
Avoid delays and missed threats and vulnerabilities
Maximize limited human resources while improving security operations
6
What is Enterprise-Class Vulnerability Management?
Automated discovery, profiling, and scanning
World-class vulnerability research
Advanced vulnerability scoring and prioritization
Scalability, load balancing, integration, and management
Actionable analytics and reporting Multi-tenancy and data segregation
Highlight critical changes on the most vulnerable assets
7
Advanced Vulnerability Scoring & PrioritizationFocus remediation efforts on highest risks and most critical assets
Exp
loit
Ava
ilabi
lity
Risk Class
Potential Business ImpactLesscritical
Morecritical
0 50,000+
Uniquely combines exploit availability, risk class and vulnerability age to pinpoint the greatest risks
Business context by asset value Targets remediation efforts for
greatest risk reduction
8
Tripwire Risk ScoreWhich High Vulnerability is Most Important?
Tripwire Score
30758
6929
865
777
203
MS Advisory CVSS Score
MS07-017 9.3
MS08-014 9.3
MS07-010 9.3
MS08-009 9.3
MS07-027 9.3
Tripwire Risk Score• Combines risk class, skill level required, and vulnerability age• Scores range from 0 to 50,000+• More precise metric for vulnerability prioritization
CVSS v3.0• Industry standard supported by Tripwire IP360• Scores range from 0 to 10• Less precise metric for large-scale vulnerability assessment
9
Scalable Enterprise Architecture
Centralized Management Multi-tenancy & RBAC Real-time analytics Enterprise workflow & security integration
Distributed Scanning Scales to largest networks Rapid deployment Load balancing Localized scan traffic
Centralized Analytics Consolidated security intelligence Dashboard, trend, audit & drill-downs Scan independent reporting
Enterprise IntegrationConsolidated
Reporting
10
What is Device Profiler Load Balancing?
Benefits• Faster scans, especially for larger networks• Resiliency, even for a single DP• Failover with multiple DPs• Linear scalability by adding appliances• Dynamic scalability by adding DPs to running scans
11
Highlight Critical Changes to Quickly Thwart Breaches
Dynamically adapt Tripwire Enterprise monitoring based on the changing threat landscape
Detect and respond to threats, harden critical systems at risk—manually or through Tripwire Enterprise automation
Use factors such as the Tripwire IP360 score and risk matrix to prioritize vulnerability risk
Use Tripwire IP360 to comprehensively profile the assets for vulnerabilities and applications
1Profile
2Prioritize
3Adapt
4Respond
12
Security & IT Ecosystem IntegrationsEnabling automation, reducing cost, and improving responsiveness
13
Tripwire IP360 MobileExtend the reach of Tripwire IP360 to cover more of the enterprise
Tripwire IP360 Mobile is a full installation of the Tripwire IP360 vulnerability management product on a laptop you provide, complete with the same scanning functionality and reporting tools.
Common use cases for Tripwire IP360 Mobile include: Consultants/Auditors
Mergers & Acquisitions
Classified Networks
Isolated “Air-Gapped” Networks
Isolated Industrial (ICS OT) Environments
14
Customer Success Story: State of Iowa
“The first five controls directly protect the organization and can make a difference in preventing a real breach, compared to implementing some of the other controls.”
– Jeff Franklin, CISO
Operational approach with the 20-CSC
Need Reducing risk with
Tripwire IP360
Solution Increased visibility
of network infrastructure
Improved incident response
Results
Common language for discussing risk Enables increased accountability
Why Tripwire?
15
Tripwire IP360 Awards and RecognitionInfo Security Global Excellence Awards
Cyber Defense Magazine
“Verdict: If you are a Tripwire shop, this is a no-brainer”
– SC Magazine
“We found it to be an interesting mix of pure vulnerability assessment and next-generation threat management.”
– SC Magazine
“Strengths: Solid pure vulnerability management tool with excellent hooks into other Tripwire tools. Good price point.
– SC Magazine
5 Star Review from SC Magazine
NetworkComputing
Info Security Global Excellence Awards
16
The Tripwire IP360 Advantage
Most Comprehensive Scoring and PrioritizationTripwire’s unique risk prioritization highlights top risks to your business
Most Accurate CoverageOnly Tripwire IP360 profiles hosts to prequalify vulnerability checks
Flexible and Scalable ArchitectureDeployment options for any size enterprise network
Thwart Emerging BreachesHighlight critical changes on the most vulnerable assets
17
Tripwire Advantage
Trusted Leadership Half of F500 and
over 9,000 customersTripwire Technology Innovator in Security, Compliance and IT Operations
Tripwire IP360Cyber Resilience & ResponsivenessCustomer Satisfaction
Tripwire Support and Professional ServiceSecurity Expertise financial, insurance, energy, retail, federal, and public sector
tripwire.com | @TripwireInc
THANK YOU