Analytics
1/9/2014
01:35 PM
Dark Reading
Dark Reading
Products and Releases
Connect Directly
RSS
E-Mail
50%
50%

Tripwire Announces Technology Partnership With CORE Security

Partnership provides threat and vulnerability risk management to mutual customers

PORTLAND, OREGON -- January 9, 2013 -- Tripwire, Inc., a leading global provider of risk-based security and compliance management solutions, and CORE Security, a leading provider of predictive security intelligence solutions, today announced a technology partnership and integration that provides comprehensive threat and vulnerability risk management to mutual customers. The integration unites vulnerability information with network topology from firewalls and routers, and then validates the vulnerability information and potential attack paths in live or simulated penetration tests. The collaboration is part of Tripwire's Technology Alliance Partner (TAP) program, designed to allow a wide variety of vendors to collaborate with Tripwire to deliver innovative security solutions.

"We are looking forward to building on our relationship with CORE Security," said Rod Murchison, vice president of product management and technology alliances for Tripwire. "Our integration with CORE Insight Enterprise makes it possible for enterprises to go beyond finding and fixing vulnerabilities to operating their vulnerability management programs at peak efficiency."

Large enterprises need to gather, analyze and prioritize an overwhelming amount of vulnerability and network topography data and combine it with cyberattack domain expertise in order to gain a comprehensive understanding of the security risks facing their most critical assets. To decrease the cost and complexity of risk-based security management, enterprises need the ability to effectively prioritize threats in the context of business, regulatory compliance and operational metrics.

The integration combines vulnerability information from Tripwire® IP360&trade with detailed exploit and network topology data from CORE Insight to model threat scenarios and enable vulnerability validation and proactive remediation. With this integration, mutual customers gain the ability to:

· Discover complex attack paths that expose vulnerability risks to other areas of the business.

· Validate vulnerability findings with directed simulation and/or live tests of exploitable conditions.

· Model the impact of remediation actions on the security posture of the business.

"The most common mistake organizations make is to take a reactive posture to imminent security threats to critical assets. Enterprises must go on the offensive by thinking like an attacker, and then they can preempt attacks rather than wait to deal with their consequences," said Eric Cowperthwaite, vice president of advanced security and strategy at CORE Security. "We are very pleased to partner with Tripwire and help organizations of all sizes better protect themselves against outside attacks through the use of our combined technologies and processes, providing an even stronger solution to this problem."

For more information about the integration between CORE Security and Tripwire IP360, please visit: http://www.tripwire.com/register/tripwire-ip360-and-core-insight-enabling-predictive-security-intelligence/.

About CORE Security

CORE Security is the leading provider of predictive security intelligence solutions for enterprises and government organizations. We help more than 1,400 customers worldwide preempt critical security threats throughout their IT environments, and communicate the risk the threats pose to the business. Our patented, proven, award-winning enterprise solutions are backed by more than 15 years of applied expertise from CoreLabs, the company's innovative security research center. For more information, visit www.coresecurity.com.

About Tripwire

Tripwire is a leading global provider of risk-based security and compliance management solutions, enabling enterprises, government agencies and service providers to effectively connect security to their business. Tripwire provides the broadest set of foundational security controls including security configuration management, vulnerability management, file integrity monitoring, log and event management. Tripwire solutions deliver unprecedented visibility, business context and security business intelligence allowing extended enterprises to protect sensitive data from breaches, vulnerabilities, and threats. Learn more at www.tripwire.com, get security news, trends and insights at http://www.tripwire.com/state-of-security/ or follow us on Twitter @TripwireInc.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
Partner Perspectives
What's This?
In a digital world inundated with advanced security threats, Intel Security seeks to transform how we live and work to keep our information secure. Through hardware and software development, Intel Security delivers robust solutions that integrate security into every layer of every digital device. In combining the security expertise of McAfee with the innovation, performance, and trust of Intel, this vision becomes a reality.

As we rely on technology to enhance our everyday and business life, we must too consider the security of the intellectual property and confidential data that is housed on these devices. As we increase the number of devices we use, we increase the number of gateways and opportunity for security threats. Intel Security takes the “security connected” approach to ensure that every device is secure, and that all security solutions are seamlessly integrated.
Featured Writers
White Papers
Cartoon
Current Issue
Dark Reading's October Tech Digest
Fast data analysis can stymie attacks and strengthen enterprise security. Does your team have the data smarts?
Flash Poll
Threat Intel Today
Threat Intel Today
The 397 respondents to our new survey buy into using intel to stay ahead of attackers: 85% say threat intelligence plays some role in their IT security strategies, and many of them subscribe to two or more third-party feeds; 10% leverage five or more.
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-3409
Published: 2014-10-25
The Ethernet Connectivity Fault Management (CFM) handling feature in Cisco IOS 12.2(33)SRE9a and earlier and IOS XE 3.13S and earlier allows remote attackers to cause a denial of service (device reload) via malformed CFM packets, aka Bug ID CSCuq93406.

CVE-2014-4620
Published: 2014-10-25
The EMC NetWorker Module for MEDITECH (aka NMMEDI) 3.0 build 87 through 90, when EMC RecoverPoint and Plink are used, stores cleartext RecoverPoint Appliance credentials in nsrmedisv.raw log files, which allows local users to obtain sensitive information by reading these files.

CVE-2014-4623
Published: 2014-10-25
EMC Avamar 6.0.x, 6.1.x, and 7.0.x in Avamar Data Store (ADS) GEN4(S) and Avamar Virtual Edition (AVE), when Password Hardening before 2.0.0.4 is enabled, uses UNIX DES crypt for password hashing, which makes it easier for context-dependent attackers to obtain cleartext passwords via a brute-force a...

CVE-2014-4624
Published: 2014-10-25
EMC Avamar Data Store (ADS) and Avamar Virtual Edition (AVE) 6.x and 7.0.x through 7.0.2-43 do not require authentication for Java API calls, which allows remote attackers to discover grid MCUser and GSAN passwords via a crafted call.

CVE-2014-6151
Published: 2014-10-25
CRLF injection vulnerability in IBM Tivoli Integrated Portal (TIP) 2.2.x allows remote authenticated users to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via unspecified vectors.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Follow Dark Reading editors into the field as they talk with noted experts from the security world.