Tripwire adds focus on security analytics to its technology alliance
The partner program is designed to allow a wide variety of vendors to collaborate with Tripwire on the delivery of innovative security analytics solutions that correlate and distill multiple sources of security data into actionable intelligence.
“Big data analytics is the key to next generation security intelligence programs”
Most organizations capture and analyze only small slices of the information security data they collect. Network logs, Security Information and Event Management (SIEM) tools, identity management and vulnerability management technologies each produce rapidly changing data in widely disparate formats, which presents a significant analysis challenge.
Despite the challenges in normalizing and correlating such a diverse and dynamic range of sources, organizations that leverage security analytics dramatically expand their network visibility and develop a much deeper understanding of their security risks. Security analytics can detect anomalous behavior in a timely fashion, expand situational awareness of conditions conducive to security breaches, and can recommend and automate corrective action. Security analytics can also be used to analyze long term trends and perform root cause analysis to help identify risk and predict future threats.
“To discover and thwart complex threats, organizations need to collect and analyze large volumes of data,” said Charles Kolodgy, research vice president for IDC. “The use of security analytics for this purpose will transform information security. However, to realize the significant benefits offered by security analytics requires an agile approach that can dynamically perform risk assessments utilizing data from multiple tool sets.”
Tripwire has partnered with a variety of leading security analytics vendors including, Brinqa, LockPath, Risk I/O and FireMon to deliver the critical system state data necessary to power analytics. With this intelligence, organizations can detect, investigate and remediate vulnerabilities and indicators of compromise quickly before they impact critical business assets.