MEGASCAN
required to reassess
Traditional
Assessment
 Continuous Configuration, Detection &
Response
 The Goal is Security, not Audit
 Lower Costs, Greater Efficiency
 Increased Availability, Detect and Respond
 Measurable, Sustainable, Reliable
Continuous Diagnostics and Mitigation
Manual
Configuration
Assessment
C:WindowsInfUsbstor.pnf
C:WindowsInfUsbstor.inf
Net.exe start > services.txt
•Baselining Systems Tells You What You Currently Have
•Files, Registry, Database Configurations, Network Devices, Active Directory, Critical Infrastructure
Know Your Current System
State
•Security Policies Can Define Your Desired State
•Industry Standard Hardening, Compliance, Self-Created
Know your Desired System
State
•Compare Your State To Desired and Correct Differences
•Assessment, Deviations, Variance, Remediation, Automation
Know How To Transition From
Current To Desired State
•Agent and Agentless Change Detection
•Scheduled Scanning & Real Time
Know When Your Desired
State Changes
•Deep Change Inspection
•Who, What, When, Where, Detailed Content, Change Management Processes
Know Why & Who made
Changes
•Sources Of Truth
•Change Windows, Patch Reconciliation, BAU, CMDB Reconciliation, Threat Intel
Know If Changes Are Good or
Bad
•Inspect, Take Action, Report
•Historical Changes, Auto-Remediate, Audit Ready, Change Dashboards
Know How To Respond, Alert
and Share
tripwire.com | @TripwireInc

Stop Advanced Adversaries: With the Top 5 Critical Controls

  • 22.
    MEGASCAN required to reassess Traditional Assessment Continuous Configuration, Detection & Response  The Goal is Security, not Audit  Lower Costs, Greater Efficiency  Increased Availability, Detect and Respond  Measurable, Sustainable, Reliable Continuous Diagnostics and Mitigation Manual Configuration Assessment
  • 40.
  • 45.
    Net.exe start >services.txt
  • 47.
    •Baselining Systems TellsYou What You Currently Have •Files, Registry, Database Configurations, Network Devices, Active Directory, Critical Infrastructure Know Your Current System State •Security Policies Can Define Your Desired State •Industry Standard Hardening, Compliance, Self-Created Know your Desired System State •Compare Your State To Desired and Correct Differences •Assessment, Deviations, Variance, Remediation, Automation Know How To Transition From Current To Desired State •Agent and Agentless Change Detection •Scheduled Scanning & Real Time Know When Your Desired State Changes •Deep Change Inspection •Who, What, When, Where, Detailed Content, Change Management Processes Know Why & Who made Changes •Sources Of Truth •Change Windows, Patch Reconciliation, BAU, CMDB Reconciliation, Threat Intel Know If Changes Are Good or Bad •Inspect, Take Action, Report •Historical Changes, Auto-Remediate, Audit Ready, Change Dashboards Know How To Respond, Alert and Share
  • 48.