highlight endpoint changes to thwart emerging breaches
TRANSCRIPT
1
2
Cyberthreat Landscape
140MOver 390K malicious programs are found
every dayAV-Test.org
51%On day 0, only 51% of AV scanners detected new malware samplesLastline Labs
85%85% of breaches could be prevented by remediating
known vulnerabilitiesUS CERT
$445B$445 Billion Financial Loss per yearCenter for Strategic and Int’l Studies
3
Challenge: Enterprise Cyberthreat Gap
Response GapTime between discovery to remediation to limit damage
Detection GapTime between actual breach and discovery
Prevention GapTime to put
preventative measures in place
to avoid future attacks
Have we been breached?
Can we avoid this from happening
again?
How bad is it?
DETECTIONGAP
RESPONSEGAP
PREVENTIONGAP
4
Challenges to Detect and Respond to Cyberthreats
Advanced attacks – harder to detect and faster compromises
Limited resources/time – need better prioritization, what is at risk? What do I fix first?
Limited context from fragmented tools – need high-confidence accurate information
5
Tripwire Cyberthreat Security PortfolioDetecting indicators of breach, compromise, and vulnerability
Business Context – connect your security efforts to what matters to your business
Security Automation – apply intelligence and drive automation for more effective operations
Enterprise Integration – across our portfolio but also with other security ecosystem partner solutions
6
Tripwire Vulnerability Management
Automated discovery, profiling, and scanning
World-class vulnerability research
Risk- and asset-based prioritization
Scalability, integration, and management
Actionable analytics and reporting Multi-tenancy and data segregation
7
Automated AssessmentAutomated inventory and vulnerability assessment of all network devices and applications
High-accuracy device profiling
Minimal host and network impact
Dynamic host tracking
Continuous asset discovery & assessment
8
Risk- and Asset-based PrioritizationFocus remediation efforts on highest risks and most critical assets
Exp
loit
Ava
ilabi
lity
Risk Class
Potential Business ImpactLesscritical
Morecritical
0 50,000+
Uniquely combines exploit availability, risk class, and vulnerability age to pinpoint the greatest risks
Business context by asset value Targets remediation efforts for
greatest risk reduction
9
World-class Vulnerability ResearchDelivering timely coverage for over 100,000 conditions
CommittedDedicated team of
security researchers
RelevantCoverage for vulnerabilities that matter to the enterprise
Responsive24-hour SLA on critical
Microsoft bulletins
InvestedTripwire’s continuing commitment to complete vulnerability coverage
Tripwire VERTVulnerabilities and Exposures Research Team
10
Leader in Security Configuration Management
PolicyManagerKnow Your
Configuration State
IntegrityManagerKnow What
Happened and Why
Remediation Manager
Know What ToDo About It
11
Good changes
Bad changes
Agent-based “inside-out” visibility
File integrity monitoring
Device and application discovery
Web app vulnerabilities
Agent-less “outside-in”visibility
Vulnerability assessment
Balanced Proactive and Reactive Security Controls
12
Delivering Adaptive Threat Protection
The new integration between Tripwire IP360 and Tripwire Enterprise delivers the unique value of Adaptive Threat Protection:
Continuous analysis of an organization’s attack surface Continuous security control automation Significant reduction of overall cyberthreat risk
13
Manually configure Tripwire Enterprise monitoring based on outdated threat landscape
Detect and respond to threats, harden critical systems at risk, manually or through Tripwire Enterprise automation
Produce a PDF report; manually prioritize vulnerability results; handoff results to others
Scan your environment, find assets and vulnerabilities; limited results
The High Cost of Manual Effort
1Scan
2Report
3Combine
4React
Manuallycorrelate vulnerability
results to assets in Tripwire Enterprise
Manual Process (no integration)
14
Reduce the Threat Gap with Vulnerability Context
Dynamically adapt Tripwire Enterprise monitoring based on the changing threat landscape
Detect and respond to threats, harden critical systems at risk, manually or through Tripwire Enterprise automation
Use factors such as the Tripwire IP360 score and risk matrix to prioritize vulnerability risk
Use Tripwire IP360 to comprehensively profile the assets for vulnerabilities and applications
1Profile
2Prioritize
3Adapt
4Respond
Automated Process (Tripwire IP360 integration)
15
Vulnerability Intelligence Tags
Vulnerability Risk Score Vulnerability Risk Matrix Vulnerability Watch List Application Watch List Date Last Scanned
16
Value to CustomersAutomated device and application discovery solution
Private Cloud
VMWare & Hyper-VFast implementation for lower TTV
Easy to deploy hardened security appliance
Low bandwidth, high accuracy & performance
Non-intrusive device and application discovery
Scalable to largest networks in the world Hardware Appliance
1U Rack Mount
Public Cloud
Amazon Machine Image
83k+ vulnerability checks
17
Scalability, integration, and management
Security Intelligence Hub
Centralized Reporting and
Analytics
CentralizedManagement
Distributed and Scalable
Scanning
Scalable to the largest networks Distributed architecture speeds scanning Enterprise workflow & security integration VMWare, AWS, and Hyper-V deployment Role-based access control Scan independent reporting Real-time analytics Dashboard, trend, audit & drill-down reports
VnE Manager(physical and virtual appliances)
Device Profiler (physical and virtual appliances)
tripwire.com | @TripwireInc
Thank You
DOWNLOAD THE VULNERABILITY MANAGEMENT BUYERS GUIDE FROM TRIPWIRE.COM
• Navigate recent advancements in vulnerability management technologies• Understand differences between various assessment technologies• Identify the features that are most important to their organization