Overview

Carahsoft is pleased to offer Trustwave government solutions which will enable our government customers to take a holistic approach to security risk management with our long history of supporting the government. By partnering with Trustwave you will also be empowered to assess, monitor and protect your most critical database assets in real time while simplifying audits, monitoring risk, and automating compliance requirements.

  • Database Security

    With our database security portfolio, organizations all over the world gain complete visibility into data security and compliance issues without the need for deep expertise in the field. Trustwave database security software solutions help organizations discover, assess and report on vulnerabilities, misconfigurations and improper access controls within relational databases and big data stores.

  • DbProtect

    DbProtect is a centrally managed and highly scalable solution for comprehensive database security process control. Based upon proven technology, DbProtect is a comprehensive solution built on a platform that integrates database asset management, vulnerability management, rights management, policy management and database activity and monitoring as well as reporting and analytics. DbProtect enables agencies with complex, heterogeneous environments to optimize database security, manage risk and bolster regulatory compliance.

    • Discover and Manage – identify and manage your database assets
    • Audit & Vulnerability Management- analyze your data to highlight risks and vulnerabilities
    • User Rights Review & Rights Management – guard against unauthorized database access
    • Database Activity Monitoring – gain real time, agentless monitoring and alerting on database activity
    • Report and Remediate – document and share your findings

  • AppDetectivePRO
    A laptop - based discovery and vulnerability assessment scanner, AppDetectivePro discovers databases within your infrastructure and assesses their security strength. Backed by a proven security methodology and extensive knowledge of application-level vulnerabilities, AppDetectivePro locates, examines, reports and fixes security holes and misconfigurations and also identifies user rights and privilege levels. As a result, government agencies can proactively harden their database applications.
    • Discovery - scan and identify all databases on your network
    • Vulnerability Assessment - policy scans help you identify vulnerabilities and misconfigurations
    • User Rights Review - scan and identify inappropriate user privileges
    • Report - document and share asset, policy and user rights results
    • Always up to date - New CIS/DISA STIG with monthly or ad hoc updates
  • Secure Email Gateway (SEG)

    Complete email security requires visibility of all blended attack vectors coupled with granular policy and content controls – Trustwave Secure Email Gateway for Governments delivers all that and more.

    Backed by our elite security research team, SpiderLabs, Trustwave Secure Email Gateway provides unmatched protection against advanced threats and comprehensive data protection controls to keep confidential information from leaving your institution and falling into the wrong hands.

    • Flexible deployment options: on-premise software or cloud
    • Protection against blended threats that use multiple vulnerabilities and methods to spread
    • Multi-layered anti-spam approach that maximizes effectiveness and minimizes false positives
    • Granular and flexible policy engine to meet all your needs
    • Optional Trustwave Secure Email Encryption capability
    • Powerful DLP protection to help achieve regulatory compliance and protect your intellectual property
  • Secure Web Gateway (SWG)

    Trustwave SWG for Governments blocks new malware in real time with several advanced engines. To block dynamic new obfuscated or encrypted drive-by downloads, Trustwave SWG decrypts, unpacks and assembles web pages and exposes their malicious behavior. Trustwave leads the industry in this advanced capability.

    Trustwave is also the only SWG maker who provides managed security service experts to augment your team and optimize your protection. Why else do customers choose Trustwave Secure Web Gateway?

    • Built-in intelligence from the SpiderLabs security research team at Trustwave
    • Single solution for security, policy control and reporting
    • Multi-tenant cloud platform, virtual appliances or hardware appliance options
    • Behavior analysis engine that can capture and report on files related to blocked unknown malware. SWG forensics make the files available for investigation and processing via security tools at your convenience.
    • Web acceptable use policy enforcement, monitoring and reporting.
    • Integration with Trustwave technology, including Trustwave SIEM, Secure Email Gateway, Data Loss Prevention, Web Application Firewall and Network Access Control solutions
    • Performance and scalability: 64-bit architecture and support for up to 150 scanners per system, or a virtually unlimited cloud platform
    • Low total cost-of-ownership
    • Accessible to organizations of all sizes and skill levels
    • Appliance and Cloud available as a managed security service with unique Zero-Malware Guarantee
  • Penetration Testing

    A penetration test or "ethical hack" evaluates an application's or network's ability to withstand attack. During a penetration test, you authorize an expert (or "ethical hacker") armed with the same techniques as today's cybercriminals to hack into your network or application. Such an exercise will open your eyes to vulnerabilities you didn't know existed and the effects of exploitation.

    Now more than ever, Government organizations realize the need for pro-active security testing, and budgets are increasing as a result. Still, planning for and procuring security testing presents a number of challenges:

    • Anticipating future testing needs
    • Conducting testing in a timely manner
    • Making testing an efficient, business-as-usual initiative rather than an obstacle
    • Getting high quality testing across multiple asset types
    • Standardizing repeatable testing/reporting across asset types
    • Fulfilling compliance requirements
    • Effectively managing multiple tests, and re-testing, over the course of the year
  • Compliance Services (PCI, HIPPA)

    PCI

    Trustwave delivers industry-leading assessment services and compliance-enabling technology to government organizations that must comply with the Payment Card Industry (PCI) Data Security Standard (DSS). Trustwave Compliance Validation Service (CVS) can help you proactively manage and streamline your PCI compliance efforts and ensure the process is completed with security in mind.

    HIPPA

    For government organizations or programs providing healthcare or healthcare plans and their business associates, Trustwave provides knowledge and expert guidance at each milestone on the road to secure protected health information (PHI) according to the rules under the Health Information Portability and Accountability Act (HIPAA).

    Trustwave HIPAA services include:

    • HIPAA Compliance Pre-Assessment service for a high-level evaluation of the security, privacy and incident readiness posture of an organization as compared to the HIPAA Omnibus standards.
    • HIPAA Compliance Risk Assessment service to help organizations identify the risks associated with handling protected health information (PHI), electronic and otherwise.
    • HIPAA Compliance Gap Assessment service to identify all policy gaps, how they relate to critical HIPAA regulatory issues, and specific actionable recommendations to close those gaps.

  • Managed Security Services (MSS)

    Whether you're challenged with meeting IT budget demands, fighting new threat adversaries, or are just looking for more efficiency around your compliance and security initiatives, we understand that all organizations are different, and that's why our Managed Security Services are designed for that kind of flexibility.

    We work with many Governments around the world to solve their security and compliance challenges, enhance resources and support, and drive their organization forward. Our Security Solutions portfolio is powered by:

  • Incidence Response & Readiness

    Having responded to more than 2,000 data security incidents, performed thousands of network penetration tests and carried-out hundreds of application security tests, Trustwave SpiderLabs, and by extension its clients, stays apprised of the latest threats and methods of data compromise.

    We've worked cases involving the theft of Payment Card Industry (PCI) data, electronic protected health information (ePHI), personally identifiable information (PII), industry trade secrets, sensitive corporate information, classified data and other types of protected assets.

    Organizations large and small select Trustwave SpiderLabs to augment their team through our incident response and readiness expertise. This includes:

    • Free consultation to assess your organizations environment,
    • risk and needs
    • Integrated security technologies through a single source
    • 24x7x365 support and dedicated security and compliance analysts
    • Access to our cloud-based management portal
    • "Follow the Threat" global Security Operations Centers
    • $100,000 Breach Protection Program

  • Security Information & Event Management (SIEM)

    Part of our SIEM portfolio, Log Management Enterprise (LME) addresses needs for compliance, security audits, and basic security analysis and management.

    LME is designed for organizations that need an easy-to-implement log collection and management solution to serve either as a standalone solution, part of a larger SIEM solution or part of a Trustwave Managed Security Services solution. With Trustwave products, no additional storage, licensing, or compliance packages are needed – which means you can accurately predict costs.

    Why do customers choose Trustwave Log Management Appliances?

    • Audit-ready reporting on compliance objectives.
    • Near real-time access to security events and logs.
    • Powerful correlation and notifications with more than 70 configurable templates.
    • Granular permissions support organizational roles.
    • Turnkey appliance requires no other infrastructure.

  • Endpoint Security

    By delivering via the cloud, Trustwave Endpoint Protection Suite reduces deployment time and upfront costs for distributed endpoint security across your laptops, tablets, mobile or fixed POS systems and other devices. By integrating core endpoint protection functions, Trustwave also simplifies management and lowers operational costs. This enables greater adoption and optimal defense-in-depth against a wide range of threats.

    Trustwave has also recently added the Trustwave Secure Mobility platform which includes support for both Android and iOS devices with a rapidly accelerating feature list. See the feature chart in the How it Works section for an expanded view of the Endpoint Protection Suite feature list.

    Trustwave Endpoint Protection Suite Delivers:

    All-in-One Protection
    Integrated policy enforcement, compliance management, anti-virus and malware deliver complete defense-in-depth coverage for your users, network and data. Add-on modules for file integrity monitoring and Windows log collection to further enhance security.

    Simplified Security
    Cloud-based delivery eliminates hardware setup and reduces management overhead for faster, easier and more efficient distributed endpoint protection.

    Lower Operational Costs

    Make your security budget go further by avoiding expenses for on-site equipment and minimizing ongoing management labor.

  • App Scanner
    Trustwave App Scanner is a dynamic application security testing (DAST) software solution that allows IT professionals to protect their applications and mitigate the risk resulting from the constantly evolving threat landscape by identifying vulnerabilities in cloud and web applications. Trustwave App Scanner allows you to maximize the efficiency and effectiveness of your distributed of IT, development and security teams that collaborate to manage risk across your applications. App Scanner helps you stay head of the latest threats by enabling you to:

    • Quantify and prioritize risk to develop a risk-based approach to remediation
    • Reduce risk management complexities with a flexible, modular architecture
    • Save time with more thorough and accurate scanning
  • Web Application Firewall (WAF)
    Trustwave Web Application protects public web applications as well as custom and internal applications from complex attacks. Our solution offers customized, behavior-based security for each protected application and is integrated with our award-winning Trustwave SIEM, which correlates and consolidates attack information from many sources beyond Web applications. Trustwave Web Application Firewall can be implemented as a physical or virtual on premise appliance or as a managed security service, providing virtual patching to protect your vulnerable applications from attack, without having to wait for the next release cycle. Only the Trustwave Web Application Firewall uses a patent-pending profiling system and multiple, collaborative detection engines to ensure the flow of mission-critical traffic while supplying complete protection for applications to keep your confidential information safe from targeted attacks.

    • Adaption application profiling system continuously builds a dynamic security model of each protected Web application to ensure only valid traffic is allowed
    • ExitControl analysis engine inspects outgoing traffic for data loss, defacement and security information exposure
    • Application layer signatures provide actionable information on detected vulnerabilities
    • Geo-location blocking provides customization for blocking requests generated by specific countries
    • Highly scalable appliance covers flexible site definitions, flexible deployment modes and support for up to 10G NIC cards
    • Facilitates compliance with PCI DSS requirement 6.6
    • FIPS 140-2 Level 1 compliant
    • Anti-virus protection for file uploads
    • Provides enhanced virtual patching with user defined rules based on regular expressions syntax
      • Powered by ModSecurity to improve user defined rules capabilities
    • Custom response page to communicate a response to potential hackers based on the type of attack initiated

For more information on these solutions, please contact us.

Contracts

GSA Schedule Contracts

GSA Schedule 70

GSA Schedule 70 GSA Schedule No. GS-35F-0119Y Term: December 20, 2011- December 19, 2021


SEWP Contracts

SEWP V

Contract Number: Group A Small: NNG15SC03B Group D Other Than Small: NNG15SC27B Term: May 1, 2015 - April 30, 2020


Federal Contracts

ITES-SW

Vendor(s): CoN Certified Term: March 2015 - March 2020


State & Local Contracts

City of Seattle Contract

Contract #0000003265 Term: December 19, 2021

CMAS

Contract # CMAS 3-12-70-2247E Term: through March 31, 2022

Fairfax County IT Hardware, Software, & Services

Virginia- Fairfax County CONTRACT EXPIRATION: October 4, 2020 (with 5 option years)

Ohio State Contract- 534354

Contract # 534354 Term: December 19, 2021

Orange County National IPA Co-Op

Through May 31, 2020 (with 2 option years)

VASCUPP

Contract Number: UVA1482501 Contract Term: May 2, 2014– December 19, 2021


Events

News

Latest News

Being able to deploy security solutions in a fast and efficient manner is not only convenient, but also vital in helping protect organizations from ever-evolving security threats. If the necessary ...
READ MORE >
Trustwave won top honors for Best Managed Security Service in the Trust Awards category at the SC Awards 2017. Winners are recognized for outstanding leadership and providing superior security ...
READ MORE >
Trustwave today announced that Gartner, Inc., a leading information technology research and advisory company, has positioned Trustwave in the "Challengers" quadrant in the most recent "Gartner Magic ...
READ MORE >
Trustwave today announced that its database security products received their Certificate of Networthiness (CoN) from the U.S. Army, approving their use in the Army Enterprise Infrastructure (AEI).
READ MORE >
After the city and county of Denver experienced a distributed denial-of-service attack earlier this year, the municipality’s IT security leader called a meeting with the broader organization to ...
READ MORE >

Resources

Relational databases and big data stores are a prime target for attackers due to the amount of sensitive information residing within, such as customer information, intellectual property and proprietary secrets. For more than 15 years, the database security experts at Trustwave have helped organizati...

The Trustwave Web Application Firewall (WAF) provides the ability to identify vulnerabilities in web codes and applications in addition to the ability to virtually patch these vulnerabilities. Trustwave WAF also delivers the ability to monitor policy configurations of web servers, track, and control...

The Department of Homeland Security (DHS) Continuous Diagnostics and Mitigation (CDM) Tools and Continuous Monitoring program, is designed to assist U.S. Federal Government agencies in developing and deploying a comprehensive risk and security management solution.

Each scan engine is typically installed on a host with 8-16 GB RAM, 2-4 Precessor Cores 2.0 GHz+, 50 GB free disk space running Windows Serve 2003 or Windows Server 2008 or Window Server 2008 R2 or Windows Server 2012 64-bit Standard Editions or higher. in order to run authenticated vulnerability or...

DbProtect is a data security platform that uncovers database configuration mistakes, identification and access control issues, missing patches, or any toxic combination of settings that could lead to escalation of privileges attacks, data leakage, denial-of-service (DoS), or unauthorized modificatio...

Provide recipient with the knowledge of their Risk Exposures and Compliance posture for their databases, prioritize them and understand how a continuous process would improve an organization’s database security & compliance program’s effectiveness.

If cybercrime is a business, you can consider this report your guide to its business plan. Use it to learn more about what the criminals are doing now, what they may do in the future, and the steps you can take to keep them away.

When installing AppDetectivePRO you can configure it to install an embedded Microsoft SQL Server 2012 Express Edition that will be used specifically for the AppDetectivePRO installation or you can point it at an already installed Microsoft SQL Server instance on the host.

In 2012, the Office of Management and Budget identified continuous monitoring of federal IT networks as one of 14 CrossAgency Priority (CAP) goals, established in accordance with the Government Performance and Results Modernization Act. To support federal departments and agencies in meeting t...

AppDetectivePRO is a database and Big Data scanner that can immediately uncover configuration mistakes, identification and access control issues, missing patches, or any toxic combination of settings that could lead to escalation of privileges attacks, data leakage, denial-of-service (DoS), or unaut...