Company Overview of Tripwire, Inc.
Tripwire, Inc. provides information technology (IT) security and compliance management solutions for enterprises, government agencies, and service providers. It offers Security Configuration Management, a process that assures the integrity of security configurations and the information they protect; enterprise vulnerability management solutions that include appliance-based vulnerability assessment and cloud-based scanning for the extended enterprise; and file integrity monitoring solutions. The company also provides File Integrity Monitoring solution that assesses and prioritizes system changes that helps in classifying good vs. bad change; Log and Event Management solution that provides sec...
101 SW Main Street
Portland, OR 97204
Founded in 1997
Key Executives for Tripwire, Inc.
Chief Executive Officer, President and Director
Co-Founder and Member of Advisory Board
Chief Financial Officer, Principal Accounting Officer and Vice President
Compensation as of Fiscal Year 2014.
Tripwire, Inc. Key Developments
Tripwire, Inc. and Check Point Software Technologies Ltd. Announce Technology Partnership and Integration
Dec 15 14
Tripwire, Inc. and Check Point Software Technologies Ltd. announced a technology partnership and integration. The collaboration is part of Tripwire’s Technology Alliance Program, designed to allow a wide variety of vendors to team with Tripwire to deliver innovative security solutions. The integration of Tripwire® Enterprise and Check Point’s ThreatCloud Emulation Service provides customers with unprecedented protection against advanced and zero-day threats, whether known or unknown. The integration of Tripwire Enterprise and Check Point’s ThreatCloud Emulation Service makes it possible for customers to closely monitor critical systems for changes as well as the introduction of new files, which can indicate an advance attack in progress. When a new suspicious file is identified on a protected endpoint, Tripwire Enterprise shares the information with ThreatCloud Emulation Service, which returns a verdict on the file. Depending on the outcome, the file can then be tagged as malicious or sent to the ThreatCloud Emulation sandbox for further examination. If the sandbox analysis detects a new danger, the emulation service provides updated threat information to all of Check Point’s security gateways worldwide. The integration of Tripwire Enterprise and Check Point Threat Emulation Service enables customers to: automatically review system binary changes for known and advanced threats, ensuring malicious changes are detected rapidly; accelerate the time it takes to detect zero-day threats and quickly determine endpoint risk priority in order to take additional actions; reduce the time to remediate critical threatsby prioritizing security actions based on changes to systems that are affected by threats identified by Check Point ThreatCloud and deliver enhanced protection against undiscovered exploits, targeted endpoint attacks and zero-days, and avoid repeat attacks.
Belden Inc., Tripwire, Inc. - M&A Call
Dec 10 14
To discuss the acquisition of Tripwire
Tripwire Announces Integration with Lastline for Advanced Threat Protection
Dec 9 14
Tripwire, Inc. announced a partnership and technology integration with Lastline, Inc. The collaboration is part of Tripwire’s Technology Alliance Program designed to allow a wide variety of vendors to team with Tripwire to deliver innovative security solutions. Lastline’s breach detection platform performs full-system emulation of hardware, including CPU, memory, and other system components, to identify advanced and evasive malware. The combined solution provides a comprehensive end-to-end approach to detect and respond to active breaches before detrimental effects occur. With attack information from Lastline, Tripwire Enterprise users can detect known and unknown threats that evade traditional network security appliances. Through the integration, Tripwire customers gain access to Lastline’s Advanced Threat Intelligence. This knowledgebase is continuously updated in real time with active command and control (C&C) servers, objects with zero-day exploits, toxic web sites and malware distribution points identified as having breach intent.
Similar Private Companies By Industry
Recent Private Companies Transactions
December 9, 2014