Cookie Settings
Operationally Necessary Cookies
Analytics Cookies
Advertising Cookies
GLOSSARY
Tripwire IP360 is a vulnerability management solution which discovers assets, identifies vulnerabilities, and helps to prioritize cyberthreat risks. Tripwire IP360 is marketed by Portland, Oregon based Tripwire Inc. Tripwire has over 40+ patents and considerable intellectual property which makes IP360 unique and highly capable.
Tripwire IP360 is an enterprise-class vulnerability and risk management platform. Tripwire IP360 enables the reduction of cyber risk by identifying the highest risks, and then helping to remediate them. Tripwire IP360 provides a comprehensive risk-based vulnerability assessment with vulnerability scoring and endpoint intelligence integration. Tripwire IP360 is designed to rapidly integrate with existing IT systems like help desk, SIEM, intrusion detection, and more. Endpoint data gathered by Tripwire IP360 can also support automation across your security ecosystem.
Tripwire IP360 fits into any organization fairly easily. It requires at least one hardened Linux-based virtual or physical appliance. it also provides a web interface for configuration, administration, reporting and more.
Tripwire IP360 provides discovery of all network assets in the cloud and on-premise. It provides network visibility which includes all devices and their associated operating systems, resident applications and identified vulnerabilities. Tripwire IP360 is supplemented by discovery signatures provided by the Tripwire Vulnerability and Exposure Research Team (aka the VERT).
Tripwire IP360 discovers networked hosts, applications and services and then searches for specific vulnerabilities based on the identified operating system, applications and services. Agent-based vulnerability management provides an accurate assessment such as laptops and other devices. It is also available in the AWS and Azure marketplaces for authorized scanning. Tripwire IP360 can discover and assess both stopped and running containers which is important to organizations invested in DevOps procedures.
Scanners are often distributed for the consolidation of reporting. You can use out-of-the-box scan profile options or build and customize your own. Scan scheduling allows you to select the time windows for scanning that work best for your organization.
You will have to check with Tripwire directly to find out exactly what reporting is available with respect to compliance. Important compliance reporting is provided for PCI-DSS, IAVA, and SCAP/CyberScope standards:
Vulnerabilities are reported in standard CVE and CVSS formats. Reporting templates are Windows-based and leverage a SQL database.
Tripwire IP360 assigns a numerical rank to vulnerabilities. This makes it obvious as to the high risk vulnerabilities that require attention. Tripwire subsequently reviews each vulnerability for how easily it can be exploited. Tripwire also considers the privileges that an attacker can acquire during a successful exploitation. This creates two vectors, ease of exploit, and impact of exploit, that can be used to assess overall greatest risk. These two vectors are combined with the age of the vulnerability to provide a vulnerability risk score. This risk score can now be applied to the process of prioritizing and mitigating risk.
Best practices are important when using any software tool. These are areas which are often reviewed to the user’s benefit. This analysis can be provided as a professional services deliverable. Areas of importance to the best practice use of Tripwire IP360 include:
Tripwire IP360 is one of several security management solutions offered by Tripwire, including:
Want to learn more? Check out our FREE Bugcrowd University to sharpen your hacking skills.
Organizations the world over need your help! Join our researcher community to connect with hundreds of organization programs focused on finding their security vulnerabilities. Our vast directory includes programs for all skill levels, across many industries and from around the world.