Patents Assigned to Tripwire, Inc.
  • Patent number: 8914341
    Abstract: In various embodiments, a target host may provide a change data to a compliance server in response to detecting a change, and the change data may include one or more rules, settings, and/or parameters. Also, in various embodiments, the compliance server may determine whether the one or more rules, settings, and/or parameters meet one or more compliance policies and generate one or more test results based at least on the results of the determining. Further, in some embodiments, the target host may detect a change to a rule, setting, and/or parameter based on a collection policy defining what change data is to be collected by the target host and provide data associated with the rule, setting, and/or parameter as change data to the compliance server.
    Type: Grant
    Filed: July 3, 2008
    Date of Patent: December 16, 2014
    Assignee: Tripwire, Inc.
    Inventor: Robert A. DiFalco
  • Patent number: 8875129
    Abstract: Embodiments of the present disclosure provide methods and systems for generating an alert based upon detection of a pattern of events within a virtual infrastructure. Other embodiments may be described and claimed.
    Type: Grant
    Filed: February 5, 2010
    Date of Patent: October 28, 2014
    Assignee: Tripwire, Inc.
    Inventors: Andrew Wagner, Chyna Trople, Robert DiFalco
  • Patent number: 8874707
    Abstract: A network services platform provides services to remote enterprise networks. The services platform provides a control module to a computer in the enterprise network. The control module executes on the computer and interacts with the services platform to establish an Internet Protocol (IP) tunnel between the services platform and the computer. The control module also establishes a bridge between the IP tunnel and the enterprise network. The services platform allocates a unique private IP address space to the enterprise network, and translates IP addresses in network communications between enterprise network addresses and corresponding services platform addresses in the allocated unique private address space. The services platform provides network services to the enterprise network via the IP tunnel and bridge.
    Type: Grant
    Filed: December 24, 2013
    Date of Patent: October 28, 2014
    Assignee: Tripwire, Inc.
    Inventors: Alexander L. Quilter, Oliver Lavery, David J. Meltzer, Timothy D. Keanini
  • Patent number: 8868987
    Abstract: Embodiments of the present disclosure provide methods and systems for detecting and correlating log events, configuration changes and conditions producing alerts within a virtual infrastructure. Other embodiments may be described and claimed.
    Type: Grant
    Filed: February 5, 2010
    Date of Patent: October 21, 2014
    Assignee: Tripwire, Inc.
    Inventor: Andrew Wagner
  • Patent number: 8862941
    Abstract: Disclosed herein are methods, systems, and articles associated with remediation execution. In embodiments, a set of policy test failures may be selected for remediation. The set of policy test failures may be associated with a computer network with a number of nodes. For each failure within the set of policy test failures, a remediation script may be obtained to remediate a corresponding policy test failure. The remediation scripts may be selectively provided to nodes that are affected by policy test failures, for execution by the nodes. A remediation script result for each remediation script executed may be received. Based upon the remediation script results, it may be determined whether or not execution of the remediation scripts was successful.
    Type: Grant
    Filed: September 16, 2011
    Date of Patent: October 14, 2014
    Assignee: Tripwire, Inc.
    Inventors: David Whitlock, Guy Gascoigne-Piggford, Geoff Granum, Mark Petrie
  • Patent number: 8819491
    Abstract: Disclosed herein are methods, systems, and articles associated with remediation workflow. A method may include determining one or more test failures related to a policy test within a computer network, and reviewing the one or more test failures. The method may further include, based upon a result of the reviewing, creating a remediation work order that includes at least one of the one or more test failures. Each test failure within the remediation work order may be approved or denied. For each test failure that is approved for remediation, a remediation process may be executed.
    Type: Grant
    Filed: September 16, 2011
    Date of Patent: August 26, 2014
    Assignee: Tripwire, Inc.
    Inventors: David Whitlock, Guy Gascoigne-Piggford, Geoff Granum, Mark Petrie
  • Patent number: 8712815
    Abstract: Techniques for dynamically representing distributed information are disclosed. According to one embodiment, metrics for deployed resources in a predefined environment (e.g., an enterprise) is designed. The metrics includes at least various logic and data sources and is deployed as one or more Metrics Definition Packages (MDP), wherein data sources are used for calculating such metrics. The metrics is defined in terms of the data sources and their associated meta-data, but has no dependency upon specific external systems that are eventually used to populate the data sources when the Metrics Definition Package is executed. The metrics results from the execution of the Metrics Definition Package in accordance with the deployed resources (e.g., storage space, and security means) are represented in what is referred to as a Scorecard Definition Package (SDP) that is designed to represent the metrics results in a dynamic and comprehensible manner.
    Type: Grant
    Filed: November 9, 2010
    Date of Patent: April 29, 2014
    Assignee: Tripwire, Inc.
    Inventors: Elizabeth A. Nichols, Patrick James McNerthney, Biao Ren
  • Publication number: 20140096181
    Abstract: Disclosed herein are representative embodiments of methods, apparatus, and systems for processing and managing information from a compliance and configuration control (“CCC”) tool and generating information for a security information and event management (“SIEM”) tool based on the information from the CCC tool. For example, in one exemplary embodiment, information from a CCC tool is transferred to a SIEM tool or logging tool by receiving the information from the CCC tool in a format that is not recognized by the SIEM tool or logging tool, and generating an output message in a message format that is recognized by the SIEM tool or logging tool. In particular embodiments, the message format is a customizable message format that is adaptable to multiple different SIEM tools or logging tools. In further embodiments, the data transferred to the SIEM tool comprises data indicative of compliance policy changes.
    Type: Application
    Filed: September 28, 2012
    Publication date: April 3, 2014
    Applicant: TRIPWIRE, INC.
    Inventor: Stephen Rivers
  • Publication number: 20140082620
    Abstract: Embodiments of the present disclosure provide methods and systems for triggering scripts based upon an alert within a virtual infrastructure. Other embodiments may be described and claimed.
    Type: Application
    Filed: October 21, 2013
    Publication date: March 20, 2014
    Applicant: TRIPWIRE, INC.
    Inventors: Andrew Wagner, Brian McFeely, Robert DiFalco
  • Publication number: 20140053145
    Abstract: Apparatus and methods are disclosed for implementing software reconciliation frameworks to process changes detected to software installed on computer hosts. According to one embodiment, a method includes receiving change data describing changes to one or more software components stored on a computer-readable storage device, determining installed software on a computer associated with the computer-readable storage device, receiving a manifest comprising a description of file changes associated with a software patch or update for the installed software, and comparing the change data to the manifest. Based on the comparing, if the change data matches the manifest, the changes are promoted, and if the change data does not match the manifest, the changes are marked for further analysis.
    Type: Application
    Filed: September 28, 2012
    Publication date: February 20, 2014
    Applicant: Tripwire, Inc.
    Inventor: Andrew C. Steigleder
  • Patent number: 8600996
    Abstract: Methods, systems, and articles for receiving, by a monitor server, change data associated with a change captured on a target host, are described herein. In various embodiments, the target host may have provided the change data in response to detecting the change, and the change data may include one or more rules, settings, and/or parameters. Further, in some embodiments, the monitor server may analyze the change data in order to group the change data into clusters. Once the change data have been classified as clusters, a report may be generated providing classification or categorization and cluster information for the various changes. In various embodiments, the generating may comprise generating a report to the target host and/or to an administrative user.
    Type: Grant
    Filed: December 8, 2009
    Date of Patent: December 3, 2013
    Assignee: Tripwire, Inc.
    Inventors: Tom Good, Gene Kim, David Whitlock
  • Patent number: 8566823
    Abstract: Embodiments of the present disclosure provide methods and systems for triggering scripts based upon an alert within a virtual infrastructure. For example, in response to detection of an event within the virtual infrastructure, a component is configured to generate an alert for a virtual machine and/or virtual object due to the event. The affected virtual machine and/or virtual object is represented and/or organized into a format against which a script may be executed. Other embodiments may be described and claimed.
    Type: Grant
    Filed: February 5, 2010
    Date of Patent: October 22, 2013
    Assignee: Tripwire, Inc.
    Inventors: Andrew Wagner, Brian McFeely, Robert DiFalco
  • Publication number: 20130073715
    Abstract: Disclosed herein are methods, systems, and articles associated with correlating detected changes within a computer network with remediation processes performed in response to policy test failures. In embodiments, on determination that a failure of a policy test has occurred within a computer network having a number of nodes, a remediation process may be executed to remediate the failure. Change at a node may be detected. Further, the detected change may be correlated with the execution of the remediation process, and the correlation may be identified.
    Type: Application
    Filed: September 16, 2011
    Publication date: March 21, 2013
    Applicant: Tripwire, Inc.
    Inventors: David Whitlock, Guy Gascoigne-Piggford, Geoff Granum, Mark Petrie
  • Publication number: 20130073892
    Abstract: Disclosed herein are methods, systems, and articles associated with remediation execution. In embodiments, a set of policy test failures may be selected for remediation. The set of policy test failures may be associated with a computer network with a number of nodes. For each failure within the set of policy test failures, a remediation script may be obtained to remediate a corresponding policy test failure. The remediation scripts may be selectively provided to nodes that are affected by policy test failures, for execution by the nodes. A remediation script result for each remediation script executed may be received. Based upon the remediation script results, it may be determined whether or not execution of the remediation scripts was successful.
    Type: Application
    Filed: September 16, 2011
    Publication date: March 21, 2013
    Applicant: TRIPWIRE, INC.
    Inventors: David Whitlock, Guy Gascoigne-Piggford, Geoff Granum, Mark Petrie
  • Publication number: 20130073893
    Abstract: Disclosed herein are methods, systems, and articles associated with remediation workflow. A method may include determining one or more test failures related to a policy test within a computer network, and reviewing the one or more test failures. The method may further include, based upon a result of the reviewing, creating a remediation work order that includes at least one of the one or more test failures. Each test failure within the remediation work order may be approved or denied. For each test failure that is approved for remediation, a remediation process may be executed.
    Type: Application
    Filed: September 16, 2011
    Publication date: March 21, 2013
    Applicant: TRIPWIRE, INC.
    Inventors: David Whitlock, Guy Gascoigne-Piggford, Geoff Granum, Mark Petrie
  • Publication number: 20130073704
    Abstract: Disclosed herein are methods, systems, and articles for promoting changes that result from remediation performed within a computer network, for compliance review. Policy tests may be provided within the computer network, which comprises a number of nodes. The policy tests may relate to configuration parameters and compliance requirements for various nodes within the computer network. At least one pattern relating to nodes within the computer network that may be affected by execution of a remediation script is determined. Nodes within the computer network may be identified, based at least in part on the at least one pattern. Subsequent to execution of the remediation script, a list of nodes whose state has changed may be promoted for compliance review.
    Type: Application
    Filed: September 16, 2011
    Publication date: March 21, 2013
    Applicant: TRIPWIRE, INC.
    Inventors: David Whitlock, Guy Gascoigne-Piggford, Geoff Granum, Mark Petrie, Darren Gilroy
  • Patent number: 8176158
    Abstract: Embodiments of the present invention provide methods and systems for automated change audit of an enterprise's IT infrastructure, including independent detection of changes, reconciliation of detected changes and independent reporting, to effectuate a triad of controls on managing changes within the IT infrastructure, preventive controls, detective controls and corrective controls.
    Type: Grant
    Filed: August 9, 2006
    Date of Patent: May 8, 2012
    Assignee: Tripwire, Inc.
    Inventors: Robert A. DiFalco, Kenneth L. Keeler, Robert L. Warmack
  • Patent number: 8140635
    Abstract: An apparatus is provided with a change management module adapted to manage making changes to a data processing device of a data processing environment.
    Type: Grant
    Filed: March 31, 2005
    Date of Patent: March 20, 2012
    Assignee: Tripwire, Inc.
    Inventor: Robert A. DiFalco
  • Publication number: 20120023076
    Abstract: An automated method for facilitating management of a data processing environment is disclosed. In various embodiments, the method may include facilitating creation of a first memorialization, in digital form, of first one or more changes made to a first data processing device of the data processing environment. In various embodiments, the method may further include facilitating creation of a second and a third memorialization, both in digital form, of second and third one or more changes made to a second and a third data processing device of the data processing environment, respectively. In various embodiments, the method may still further include facilitating automated approval of the second and third changes made to the second and third data processing devices, using the first, second and third memorializations. Other embodiments of the present invention may include, but are not limited to, apparatus adapted to facilitate practice of the above-described method.
    Type: Application
    Filed: August 2, 2011
    Publication date: January 26, 2012
    Applicant: Tripwire, Inc.
    Inventors: Gregor W. Torrence, Troy D. Thompson
  • Publication number: 20110197094
    Abstract: Embodiments of the present disclosure provide methods and systems for detecting and correlating log events, configuration changes and conditions producing alerts within a virtual infrastructure. Other embodiments may be described and claimed.
    Type: Application
    Filed: February 5, 2010
    Publication date: August 11, 2011
    Applicant: TRIPWIRE, INC.
    Inventor: Andrew Wagner