Tripwire is a leading global provider of risk-based security and compliance management solutions, enabling enterprises, government agencies, and service providers to effectively connect security to their business. Tripwire provides the broadest set of foundational security controls including security configuration management, vulnerability management, web application scanning, file integrity monitoring, log, and event management. Tripwire solutions deliver unprecedented visibility, business context, and security business intelligence, allowing extended enterprises to protect sensitive data from breaches, vulnerabilities, and threats. Learn more at www.tripwire.com or follow us @TripwireInc on Twitter.



GSA Schedule 70

Dec 20, 2011- Dec 19, 2021


May 01, 2015- Apr 30, 2025


Mar 03, 2015- Aug 10, 2020
*Additional Option Years Available

State and Local


Aug 28, 2012- Mar 31, 2022

City of Seattle Contract

Jul 11, 2014- Dec 19, 2021

Department of General Services PA - Symantec

May 01, 2009- Dec 19, 2021

Fairfax County IT Hardware, Software, & Services

Oct 04, 2015- Dec 04, 2021
*Additional Option Years Available

Orange County National IPA Co-Op

Jun 01, 2015- May 31, 2021

Pennsylvania COSTARS-6 IT Software Contract

Aug 31, 2017- Aug 31, 2021

State of Indiana Contract

Aug 01, 2017- Jul 31, 2021

State of New Mexico Contract

Aug 01, 2017- Aug 01, 2021

Texas DIR-TSO-4356

Dec 30, 2019- Dec 30, 2021
*Additional Option Years Available


Massachusetts Higher Education Consortium (MHEC)

Aug 10, 2019- Jun 30, 2022


May 02, 2014- Dec 19, 2021


Archived Events



Tripwire® IP360™ is a vulnerability management solution for the large enterprise, built by a company that continues to deliver innovative updates. This complimentary datasheet is a quick summary of Tripwire’s vulnerability management advancements over the past year.

In the words of Randy Marchany, CISO at Virginia Tech: "There are no device breach notification laws." With an ever-expanding universe of endpoints to manage, it's about protecting the information that's critical to your organization - which can be anywhere. To secure critical information, it's nece...


Many organizations face the challenging threat environment by strategically choosing a security controls framework as a reference for initiating, implementing, measuring, and evaluating their security posture, as well as managing risk.

Year after year, investigations performed after breaches and other security incidents reveal that the majority of security incidents occur because well-known security controls and practices were not implemented or were not working as organizations had assumed.

Tripwire® Enterprise's automated security configuration management for FISMA—along with its industry-best FIM—reduces the manual effort required for federal agencies to gain FISMA compliance, and eliminates the "spreadsheet chaos" associated with proving it. Download this solution brief to ...

Tripwire Enterprise is a security configuration management suite that provides fully integrated solutions for policy, file integrity and remediation management. The suite lets IT security directors and CISOs rapidly achieve a foundational level of security throughout their IT infrastructure a...

Federal security managers expect that most federally run systems are actively engaging with FISMA compliance for protecting federal data and systems. However, as we all know, federal information does not remain only in federally operated systems. Data and IT systems connect via the internet and othe...

Tripwire Enterprise can help you rapidly improve the foundation of your security and compliance programs with fully integrated policy, file integrity, and remediation management solutions designed to protect your organization’s key assets, services, and initiatives. Tripwire Enterprise helps your ...

This document will discuss how to evaluate the security and compliance offerings of cloud computing partners whose business cases are most compelling. It will also describe how Tripwire's solutions can help to build and deploy a rock solid security foundation for cloud applications.

Organizations continue to be attracted by the financial and technological benefits of cloud computing, and there has been a significant acceleration in the adoption of this computing platform over the last few years. According to Cisco, cloud workloads are expected to grow 172% in the next four year...