Key features of Tripwire IP360 include:
- Enables high-performance scanning for high-profile vulnerabilities to deliver faster results for urgent and critical vulnerabilities.
- Reduces the manual effort required to manage scans in large enterprise environments via an updated, easy-to-use user interface. The new user interface also complements the Tripwire IP360 Commander application, which automates vulnerability management workflows by integrating Tripwire IP360 with popular enterprise IT and security systems. This reduces manual effort and human errors.
“Tripwire IP360 8.0 makes it possible for the State of Minnesota to complete more scans and scan more devices faster than ever,” said Chris Buse, CISO for the state. “Continuous network scanning, combined with actionable, priority scoring, allows us to identify and address critical vulnerabilities quickly. The new user interface helps make our security experts more productive because they can quickly search, filter and export the information they need.”
Additionally, the scalable architecture of Tripwire IP360 is designed to:
- Minimize network and system impact.
- Centralize data aggregation.
- Provide enterprise-wide, centralized role-based management and reporting.
“Enterprise IT security executives have the mandate to actively and continuously reduce security risk to their businesses, and they must quickly detect and respond to new vulnerabilities as they occur,” said Dwayne Melancon, CTO and vice president of research and development for Tripwire. “It can be challenging with some other solutions to complete vulnerability scans in a timely manner, and this is a significant problem for large, complex networks. Tripwire IP360 makes it possible to quickly and reliably scan across large, distributed and remote networks providing the timeliness, accuracy and insight necessary to dramatically reduce the risk of a security breach.”
In 92 percent of breaches studied in Verizon’s 2016 Data Breach Investigations Report, attackers were able to compromise networks in a matter of minutes. It also found that the median time between the discovery of a new vulnerability and the time that an exploit for it is ‘weaponized’ is about 30 days. This means that organizations that don’t complete vulnerability scans or scan infrequently have an incomplete view of security risks and could be highly vulnerable targets of cyber attacks. This is particularly true for larger organizations that add new assets and applications to their networks every day.