Tripwire Enterprise continuously monitors and detects system and file changes across business-critical endpoints. These changes are compared against Blue Coat’s indicators of a compromised database, and then unknown files are automatically sent to Blue Coat’s Malware Analysis Appliance for analysis and detonation.
Upon identification of an infected asset, incident response teams can seamlessly pivot between Blue Coat Security Analytics and Tripwire Enterprise to determine the scope of the breach and then take action to isolate, contain and remediate infected devices. Combined, the Tripwire and Blue Coat solution significantly reduces the time required to accurately detect and respond to advanced threats, thereby reducing the risk and minimizing the impact of breaches.
“Seamless, unified network security and endpoint detection and response are core security requirements,” said Peter Doggart, vice president of business development for Blue Coat. “The integration of Tripwire Enterprise with our network analysis and analytics platforms delivers a comprehensive solution that helps our mutual customers protect business-critical endpoints and infrastructure by minimizing the time to detect, analyze and remediate advanced malware.”
With cyber attacks continually increasing in frequency and sophistication, CISOs recognize that a multi-layered, coordinated defense strategy is the only way to adequately protect business-critical endpoints such as Web properties, trading systems, industrial control systems and POS systems, as well as the infrastructure that supports them. The rapid escalation of attacks in today’s threat landscape demands continuous detection and response capabilities. Tripwire and Blue Coat’s integration provides these capabilities to their mutual customers.
Elizabeth Ireland, vice president of marketing and business development for Tripwire, added: “Thousands of companies across all industries rely on Blue Coat and Tripwire to continuously monitor and protect their systems, networks and infrastructures. This integration further extends and automates the value and protection our customers depend on – delivering complete network to endpoint visibility, detection and response.”