• slide
  • slide
  • slide
  • slide
  • slide
  • slide

Overview

TGS: Trustwave Government Solutions is a leading cybersecurity and managed security services provider who helps the United States government fight cybercrime, protect data and reduce security risk. Offering a comprehensive portfolio of managed security services, consulting and professional services, and data protection technology, Trustwave Government helps governments embrace digital transformation securely.
 

SLED: Trustwave helps public sector CISO and CIO’s who are seeking a means of getting the best-of-breed protections they need at a value that is affordable and efficient. With the ever-changing threat to their cyber infrastructure, state and local government and educational institutions and the need to sustain safe operations; Trustwave solves budget and talent shortfall challenges by providing best value.

TW: Trustwave is a leading cybersecurity and managed security services provider focused on threat detection and response. Offering a comprehensive portfolio of managed security services, consulting and professional services, and data protection technology, Trustwave helps businesses embrace digital transformation securely. which will enable our government customers to take a holistic approach to security risk management with our long history of supporting the government. By partnering with Trustwave you will also be empowered to assess, monitor and protect your most critical database assets in real time while simplifying audits, monitoring risk, and automating compliance requirements.
 

Products

trustwaveproducts.png

Database Security

  • DbProtect

    DbProtect is a centrally managed and highly scalable solution for comprehensive database security process control. Based upon proven technology, DbProtect is a comprehensive solution built on a platform that integrates database asset management, vulnerability management, rights management, policy management and database activity and monitoring as well as reporting and analytics. DbProtect enables agencies with complex, heterogeneous environments to optimize database security, manage risk and bolster regulatory compliance.

    • Discover and Manage – identify and manage your database assets
    • Audit & Vulnerability Management- analyze your data to highlight risks and vulnerabilities
    • User Rights Review & Rights Management – guard against unauthorized database access
    • Database Activity Monitoring – gain real time, agentless monitoring and alerting on database activity
    • Report and Remediate – document and share your findings

  • AppDetectivePro

    A laptop - based discovery and vulnerability assessment scanner, AppDetectivePro discovers databases within your infrastructure and assesses their security strength. Backed by a proven security methodology and extensive knowledge of application-level vulnerabilities, AppDetectivePro locates, examines, reports and fixes security holes and misconfigurations and also identifies user rights and privilege levels. As a result, government agencies can proactively harden their database applications.

    • Discovery - scan and identify all databases on your network
    • Vulnerability Assessment - policy scans help you identify vulnerabilities and misconfigurations
    • User Rights Review - scan and identify inappropriate user privileges
    • Report - document and share asset, policy and user rights results
    • Always up to date - New CIS/DISA STIG with monthly or ad hoc updates

Testing by SpiderLabs

  • SpiderLabs Blog

    Attracting more than a half-million annual readers, this is the security community's go-to destination for technical breakdowns of the latest threats, critical vulnerability disclosures and cutting-edge research.

  • Security Testing

    Detect, assess and classify vulnerabilities in applications, networks and databases. Access a broad array of penetration testing services to safely exploit vulnerabilities in IT systems and understand how hackers might exploit vulnerabilities.

  • Trustwave SpiderLabs

    An elite group of researchers, penetration testers and Incident responders

  • Proactive Threat Hunt

    Attackers will penetrate your preventative defenses, but that doesn’t mean they will succeed. Trustwave Proactive Threat Hunting leverages a human-driven approach with a creative focus on clues and hypotheses to detect and eliminate threats.

Managed Security and Response

  • Managed Security Services

    Threats are growing more hostile, the number of endpoints needing to be controlled is rising, budgets are tight and in-house resources devoted to security are at a premium. Powered by global threat intelligence from the elite Trustwave SpiderLabs team, our comprehensive catalog of flexible Managed Security Services help you protect against advanced threats, diminish your attack surface, identify new risks, and respond to and recover from incidents.

  • Managed Threat Detection and Response

    Your job is to keep your business moving. Our job is to stop threats so that your business can keep moving. Period. We embed our elite expertise and proven threat lifecycle capabilities into your security program and environment to help you identify threats, investigate the depth and scope of those threats, and help you respond by taking containment actions. We partner with you to eradicate threats. All day. Every day

    https://www.trustwave.com/en-us/services/managed-security/managed-threat-detection-and-response/

  • Managed Threat Detection and Response

    Your job is to keep your business moving. Our job is to stop threats so that your business can keep moving. Period. We embed our elite expertise and proven threat lifecycle capabilities into your security program and environment to help you identify threats, investigate the depth and scope of those threats, and help you respond by taking containment actions. We partner with you to eradicate threats. All day. Every day

  • New: Gov Cloud

    Cloud security is a shared responsibility. Cloud providers are responsible for securing the infrastructure that runs their applications or services. Cloud customers are responsible for securing what they’re running and storing in the cloud. If you’re moving or planning to move applications and data to the cloud, security needs to be part of your strategy.

    Trustwave helps organizations securely navigate their journey to the cloud. Consulting services help organizations design an effective program and deploy technologies. Managed security services ensure ongoing protection. With our flexible service delivery model, organizations can ask Trustwave to be the provider for all their security needs or to augment existing resources.

  • Digital Forensics and Incident Response

    A quick and efficient response to a cyberattack can save you time and money in the long run. Trustwave Digital Forensics and Incident Response (DFIR) consulting services allow you to determine the source, cause and extent of a security breach quickly, and to better prepare for the inevitable incident.

Security Technologies

  • Secure Email Gateway

    Protecting your email environment against spam, malware, phishing attacks, business email compromise, account takeover, ransomware and more is one of your top priorities. Trustwave Secure Email Gateway (SEG) multi-layered intelligence and detection engine performs deep analysis of your inbound email traffic, in real-time, to protect your users from cyber threats, enables you to integrate the workflow of your email content into business processes, while scrutinizing outbound email traffic to prevent the loss of your proprietary data, intellectual property, confidential documents and financial records.

  • AppDetectivePRO

    A laptop - based discovery and vulnerability assessment scanner, AppDetectivePro discovers databases within your infrastructure and assesses their security strength. Backed by a proven security methodology and extensive knowledge of application-level vulnerabilities, AppDetectivePro locates, examines, reports and fixes security holes and misconfigurations and also identifies user rights and privilege levels. As a result, government agencies can proactively harden their database applications.

    • Discovery - scan and identify all databases on your network
    • Vulnerability Assessment - policy scans help you identify vulnerabilities and misconfigurations
    • User Rights Review - scan and identify inappropriate user privileges
    • Report - document and share asset, policy and user rights results
    • Always up to date - New CIS/DISA STIG with monthly or ad hoc updates
  • DbProtect

    DbProtect is a centrally managed and highly scalable solution for comprehensive database security process control. Based upon proven technology, DbProtect is a comprehensive solution built on a platform that integrates database asset management, vulnerability management, rights management, policy management and database activity and monitoring as well as reporting and analytics. DbProtect enables agencies with complex, heterogeneous environments to optimize database security, manage risk and bolster regulatory compliance.

    • Discover and Manage – identify and manage your database assets
    • Audit & Vulnerability Management- analyze your data to highlight risks and vulnerabilities
    • User Rights Review & Rights Management – guard against unauthorized database access
    • Database Activity Monitoring – gain real time, agentless monitoring and alerting on database activity
    • Report and Remediate – document and share your findings
  • Secure Web Gateway

    Your employees rely on the web and email to do their jobs, but cybercriminals are lurking in the background 24/7. A Secure Web Gateway responds by keeping your staff's endpoints free of internet-borne malware infections, while enforcing your company's policies.

    Delivers real-time protection against malware and provides strong policy enforcement, with the added option of having the technology handled by our experts and augmented by our intelligence without you ever losing control.

Regulatory Frameworks

  • HIPAA

    HIPAA established rules around protecting the security and privacy of sensitive patient data. Trustwave can help you respond to the regulation's guiding principles of confidentiality, integrity and availability of electronic protected health information (ePHI).

  • CMMC

    Given the current cyber climate, security leaders must bolster data security defenses and make tactful adjustments to their security strategy. Depending on the sector they operate in, many don’t have a choice but to comply given the regulations in place. That happens to be the case with organizations in the DIB and the thousands of entities that make it up. Once the first draft of the Cybersecurity Maturity Model Certification.

For more information on these solutions, please contact us.

FED

Trustwave Government Solutions is a leading cybersecurity and managed security services provider who helps the United States government fight cybercrime, protect data and reduce security risk. Offering a comprehensive portfolio of managed security services, consulting and professional services, and data protection technology, Trustwave Government helps governments embrace digital transformation securely.

Federal Contracts:

GSA Schedule 70

GS-35F-0119Y
Dec 20, 2011
Dec 19, 2016
 

SEWP V

NNG15SC03B/NNG15SC27B
May 01, 2015
Apr 30, 2020
 

ITES-SW

W52P1J-15-D-0008
Mar 03, 2015
Aug 10, 2020
 

View all contracts here

Register a deal

SLED

Trustwave helps public sector CISO and CIO’s who are seeking a means of getting the best-of-breed protections they need to protect their environments. With the ever-changing threat to their cyber infrastructure, state and local government along with educational institutions, the need to sustain safe operations; Trustwave solves cybersecurity and talent shortfall challenges by providing best value.

State & Local Contracts

City of Seattle Contract

Contract #0000003265 Term: December 19, 2021
 

CMAS

Contract # CMAS 3-12-70-2247E Term: through March 31, 2022
 

Fairfax County IT Hardware, Software, & Services

Virginia- Fairfax County CONTRACT EXPIRATION: December 04, 2021 (with 5 option years)
 

Orange County National IPA Co-Op

Through May 31, 2021
 

Texas DIR-TSO-4288

Texas DIR Contract: DIR-TSO-4288 Contract Period: Through February 21, 2021 (with 2 option years)
 

VASCUPP

Contract Number: UVA1482501 Term: May 2, 2014– December 19, 2021

CDM

Continuous Diagnostics and Mitigation (CDM) Defend Comprehensive Database Security Strategy

Utilizing an Integrated Database Security Platform

  • Assets Management
    • CSM - Configuration Settings Management
    • VUL - Vulnerability Management


    Trustwave DBSS

    • App DetectivePro
    • DbProtect Vulnerability Management
  • Identity and Access Management
    • TRUST - Access Control Management (People Granted Access)
    • BEHAVE - Security-Related Behavior Management
    • PRIV - Privileges


    Trustwave DBSS

    • AppDetectivePro
    • DbProtect Rights Management
  • Data Protection Management
    • DATA_DISCOV - Provide consistent identification of "data assets" across the organization for processing, storing, and all transmitting information at all sensitivity levels
      • Automated Data Discovery; Data Classification; Tagging
    • DATA_PROT - Provide ability to protect the date itself through cryptographic methods and access control/monitoring
      • Encryption (multi-level); Data Masking; Data Policy Management; User Access Logging/Monitoring
    • DATA_DLP - Data Loss Prevention - Content, context and metadata monitoring, protection and inspection
    • DATA_SPIL - Data Breach/Spillage Mitigation - Protecting/remediating instances of unauthorized loss of data
    • DATA_IRM - Identification and granular encryption/protection of high value/sensitive data


    Trustwave DBSS

    • AppDetectivePro
    • DbProtect

Request a Deal

  SLED: Request a Deal   Trustwave Government Solutions: Request a Deal  

 

Additional adjustments requested for this page: https://dealreg.carahsoft.com/trustwave

Contracts

Federal

GSA Schedule 70

GS-35F-0119Y
Dec 20, 2011- Dec 19, 2016

SEWP V

NNG15SC03B/NNG15SC27B
May 01, 2015- Apr 30, 2020

ITES-SW

W52P1J-15-D-0008
Mar 03, 2015- Aug 10, 2020

State and Local

CMAS

3-12-70-2247E
Aug 28, 2012- Dec 19, 2016

City of Seattle Contract

0000003265
Jul 11, 2014- Dec 19, 2016

Department of General Services PA - Symantec

4400004253
May 01, 2009- Jun 17, 2017

Fairfax County IT Hardware, Software, & Services

4400006323
Oct 04, 2015- Oct 04, 2020

Orange County National IPA Co-Op

MA-017-16010236
Jun 01, 2015- May 31, 2018

Pennsylvania COSTARS-6 IT Software Contract

COSTARS-006-176
Aug 31, 2017- Aug 31, 2019

State of Indiana Contract

0000000000000000000021430
Aug 01, 2017- Jul 31, 2019

State of New Mexico Contract

80-000-18-00002
Aug 01, 2017- Aug 01, 2021

Texas DIR-TSO-4288

DIR-TSO-4288
Feb 22, 2019- Feb 21, 2021

Education

Massachusetts Higher Education Consortium (MHEC)

MC15-04
Aug 10, 2019- Jun 30, 2022
*Additional Option Years Available

VASCUPP

UVA1482501
May 02, 2014- Dec 19, 2016

Events

News

View upcoming Trustwave events here

View Trustwave webinars here

View the Trustwave blog here

Recent Articles

Latest News

Winners of the Trust Award were chosen by a distinguished group of leading IT security professionals from SC Media's readership and selected by SC Media’s editorial team.
READ MORE >
The SC Awards Europe and SC Awards U.S. are recognized throughout the security industry as the gold standard of excellence in cybersecurity.
READ MORE >
In this report, Gartner evaluated MSSPs on several criteria to assess their completeness of vision and ability to execute. The ability to execute criteria included product or service, overall ...
READ MORE >
Gain powerful perspectives on nefarious motives, preferred social engineering techniques, new malware variants and reasons wide-net campaigns from years past are being shelved in favor of targeted ...
READ MORE >
Trustwave Government Solutions is debuting its new Threat Hunting service for forward-leaning government agencies that are tired of having their cyber clocks cleaned.
READ MORE >
Trustwave, a Chicago-based cybersecurity company that has specialized in cyberattack response, has launched Threat Hunting for Government, a service designed to proactively and continuously search ...
READ MORE >
As the Defense Department beefs up its cyber threat hunting capabilities, it's taken a slower approach toward modernizing GPS.
READ MORE >
Being able to deploy security solutions in a fast and efficient manner is not only convenient, but also vital in helping protect organizations from ever-evolving security threats. If the necessary ...
READ MORE >
Trustwave won top honors for Best Managed Security Service in the Trust Awards category at the SC Awards 2017. Winners are recognized for outstanding leadership and providing superior security ...
READ MORE >
Trustwave today announced that Gartner, Inc., a leading information technology research and advisory company, has positioned Trustwave in the "Challengers" quadrant in the most recent "Gartner Magic ...
READ MORE >
Trustwave today announced that its database security products received their Certificate of Networthiness (CoN) from the U.S. Army, approving their use in the Army Enterprise Infrastructure (AEI).
READ MORE >
After the city and county of Denver experienced a distributed denial-of-service attack earlier this year, the municipality’s IT security leader called a meeting with the broader organization to ...
READ MORE >

Resources

In Capable Hands

While every organization has unique security struggles, virtually every one of them must confront the same security challenges, from preventing malware to identifying vulnerabilities to responding to threats, plus adhering to compliance requirements. No business is immune from attack. Trustwave Capabilities offer a robust set of solutions designed to help resolve your impediments, whether they are based on topic, industry or mandate.

Case Study

Many federal agencies are in the process of shifting sensitive information to public cloud systems. This movement started back in 2011 when the goal of transforming the federal government into a "cloud first" organization was first introduced. The need was great: Nearly 75 percent of the government'...

Datasheet

What started as a cost-effective way for people to send and receive messages, email is now the de facto communications tool with billions of users worldwide, collectively sending hundreds of billions messages every day. Its use case now extends far beyond sending and receiving simple messages.

A database is often called the backbone of an organization. Databases contain sensitive and proprietary information - such as employee information, medical records, customer information, financial data and more – making them a prized target for cyber criminals determined to find new ways to acc...

DbProtect is a highly scalable data security platform that enables organizations to secure their relational databases and big data stores with a distributed architecture, both on premise and in the cloud, with enterprise level analytics.

tttt.png
Datasheet
AppDetectivePRO is an in-depth database security assessment solution offered by Trustwave. This Evaluation Guide provides information for the installation of the software, how to run scans that provide database security diagnostics data, how to review the data, and how to run reports.

A database is often called the backbone of an organization. Databases contain sensitive and proprietary information - such as employee information, medical records, customer information, financial data and more - making them a prized target for cyber criminals who constantly look for ways to access ...

Trustwave’s elite security team, SpiderLabs, stays a step ahead of today’s threats to help you make informed decisions about protecting your systems from malicious hackers. With vast insight into the latest vulnerabilities, attack vectors, exploits, malware and security breaches gathered from...

Resources

If cybercrime is a business, you can consider this report your guide to its business plan. Use it to learn more about what the criminals are doing now, what they may do in the future, and the steps you can take to keep them away.

Welcome to the 2020 Trustwave Global Security Report, our annual review of the phenomena, trends and statistics affecting computer security and worldwide safety, as observed by Trustwave systems and security analysts throughout 2019.

To learn more about how agencies can protect their critical assets, GovLoop teamed with Trustwave, a cybersecurity and managed security services provider specializing in threat detection and response that helps organizations fight cybercrime, protect data and reduce security risk. This report covers...