• slide
  • slide
  • slide
  • slide
  • slide
  • slide

Overview

TGS: Trustwave Government Solutions is a leading cybersecurity and managed security services provider who helps the United States government fight cybercrime, protect data and reduce security risk. Offering a comprehensive portfolio of managed security services, consulting and professional services, and data protection technology, Trustwave Government helps governments embrace digital transformation securely.
 

SLED: Trustwave helps public sector CISO and CIO’s who are seeking a means of getting the best-of-breed protections they need at a value that is affordable and efficient. With the ever-changing threat to their cyber infrastructure, state and local government and educational institutions and the need to sustain safe operations; Trustwave solves budget and talent shortfall challenges by providing best value.

TW: Trustwave is a leading cybersecurity and managed security services provider focused on threat detection and response. Offering a comprehensive portfolio of managed security services, consulting and professional services, and data protection technology, Trustwave helps businesses embrace digital transformation securely. which will enable our government customers to take a holistic approach to security risk management with our long history of supporting the government. By partnering with Trustwave you will also be empowered to assess, monitor and protect your most critical database assets in real time while simplifying audits, monitoring risk, and automating compliance requirements.
 

Products

Database Security

  • DbProtect

    DbProtect is a centrally managed and highly scalable solution for comprehensive database security process control. Based upon proven technology, DbProtect is a comprehensive solution built on a platform that integrates database asset management, vulnerability management, rights management, policy management and database activity and monitoring as well as reporting and analytics. DbProtect enables agencies with complex, heterogeneous environments to optimize database security, manage risk and bolster regulatory compliance.

    • Discover and Manage – identify and manage your database assets
    • Audit & Vulnerability Management- analyze your data to highlight risks and vulnerabilities
    • User Rights Review & Rights Management – guard against unauthorized database access
    • Database Activity Monitoring – gain real time, agentless monitoring and alerting on database activity
    • Report and Remediate – document and share your findings

  • AppDetectivePro

    A laptop - based discovery and vulnerability assessment scanner, AppDetectivePro discovers databases within your infrastructure and assesses their security strength. Backed by a proven security methodology and extensive knowledge of application-level vulnerabilities, AppDetectivePro locates, examines, reports and fixes security holes and misconfigurations and also identifies user rights and privilege levels. As a result, government agencies can proactively harden their database applications.

    • Discovery - scan and identify all databases on your network
    • Vulnerability Assessment - policy scans help you identify vulnerabilities and misconfigurations
    • User Rights Review - scan and identify inappropriate user privileges
    • Report - document and share asset, policy and user rights results
    • Always up to date - New CIS/DISA STIG with monthly or ad hoc updates

Security Testing by SpiderLabs

Managed Security

  • Managed Security Services

    Whether you're challenged with meeting IT budget demands, fighting new threat adversaries, or are just looking for more efficiency around your compliance and security initiatives, we understand that all organizations are different, and that's why our Managed Security Services are designed for that kind of flexibility.

    We work with many Governments around the world to solve their security and compliance challenges, enhance resources and support, and drive their organization forward. Our Security Solutions portfolio is powered by:

    • Our deep expertise in advanced security technologies
    • Threat Intelligence built in to our services
    • "Follow the Threat" global Security Operations Centers
    • 24x7x365 support and dedicated security analysts
    • Our cloud-based TrustKeeper management portal
  • Managed Threat Detection and Response

    Your job is to keep your business moving. Our job is to stop threats so that your business can keep moving. Period. We embed our elite expertise and proven threat lifecycle capabilities into your security program and environment to help you identify threats, investigate the depth and scope of those threats, and help you respond by taking containment actions. We partner with you to eradicate threats. All day. Every day

    https://www.trustwave.com/en-us/services/managed-security/managed-threat-detection-and-response/

For more information on these solutions, please contact us.

FED

SLED

CDM

Continuous Diagnostics and Mitigation (CDM) Defend Comprehensive Database Security Strategy

Utilizing an Integrated Database Security Platform

  • Assets Management
    • CSM - Configuration Settings Management
    • VUL - Vulnerability Management


    Trustwave DBSS

    • App DetectivePro
    • DbProtect Vulnerability Management
  • Identity and Access Management
    • TRUST - Access Control Management (People Granted Access)
    • BEHAVE - Security-Related Behavior Management
    • PRIV - Privileges


    Trustwave DBSS

    • AppDetectivePro
    • DbProtect Rights Management
  • Data Protection Management
    • DATA_DISCOV - Provide consistent identification of "data assets" across the organization for processing, storing, and all transmitting information at all sensitivity levels
      • Automated Data Discovery; Data Classification; Tagging
    • DATA_PROT - Provide ability to protect the date itself through cryptographic methods and access control/monitoring
      • Encryption (multi-level); Data Masking; Data Policy Management; User Access Logging/Monitoring
    • DATA_DLP - Data Loss Prevention - Content, context and metadata monitoring, protection and inspection
    • DATA_SPIL - Data Breach/Spillage Mitigation - Protecting/remediating instances of unauthorized loss of data
    • DATA_IRM - Identification and granular encryption/protection of high value/sensitive data


    Trustwave DBSS

    • AppDetectivePro
    • DbProtect

Request a Deal

  SLED: Request a Deal   Trustwave Government Solutions: Request a Deal  

 

Additional adjustments requested for this page: https://dealreg.carahsoft.com/trustwave

Contracts

Federal

GSA Schedule 70

GS-35F-0119Y
Dec 20, 2011- Dec 19, 2016

SEWP V

NNG15SC03B/NNG15SC27B
May 01, 2015- Apr 30, 2020

ITES-SW

W52P1J-15-D-0008
Mar 03, 2015- Aug 10, 2020

State and Local

CMAS

3-12-70-2247E
Aug 28, 2012- Dec 19, 2016

City of Seattle Contract

0000003265
Jul 11, 2014- Dec 19, 2016

Department of General Services PA - Symantec

4400004253
May 01, 2009- Jun 17, 2017

Fairfax County IT Hardware, Software, & Services

4400006323
Oct 04, 2015- Oct 04, 2020

Orange County National IPA Co-Op

MA-017-16010236
Jun 01, 2015- May 31, 2018

Pennsylvania COSTARS-6 IT Software Contract

COSTARS-006-176
Aug 31, 2017- Aug 31, 2019

State of Indiana Contract

0000000000000000000021430
Aug 01, 2017- Jul 31, 2019

State of New Mexico Contract

80-000-18-00002
Aug 01, 2017- Aug 01, 2021

Texas DIR-TSO-4288

DIR-TSO-4288
Feb 22, 2019- Feb 21, 2021

Education

Massachusetts Higher Education Consortium (MHEC)

MC15-04
Aug 10, 2019- Jun 30, 2022
*Additional Option Years Available

VASCUPP

UVA1482501
May 02, 2014- Dec 19, 2016

Events

News

View upcoming Trustwave events here

View Trustwave webinars here

View the Trustwave blog here

Recent Articles

Latest News

Winners of the Trust Award were chosen by a distinguished group of leading IT security professionals from SC Media's readership and selected by SC Media’s editorial team.
READ MORE >
The SC Awards Europe and SC Awards U.S. are recognized throughout the security industry as the gold standard of excellence in cybersecurity.
READ MORE >
In this report, Gartner evaluated MSSPs on several criteria to assess their completeness of vision and ability to execute. The ability to execute criteria included product or service, overall ...
READ MORE >
Gain powerful perspectives on nefarious motives, preferred social engineering techniques, new malware variants and reasons wide-net campaigns from years past are being shelved in favor of targeted ...
READ MORE >
Trustwave Government Solutions is debuting its new Threat Hunting service for forward-leaning government agencies that are tired of having their cyber clocks cleaned.
READ MORE >
Trustwave, a Chicago-based cybersecurity company that has specialized in cyberattack response, has launched Threat Hunting for Government, a service designed to proactively and continuously search ...
READ MORE >
As the Defense Department beefs up its cyber threat hunting capabilities, it's taken a slower approach toward modernizing GPS.
READ MORE >
Being able to deploy security solutions in a fast and efficient manner is not only convenient, but also vital in helping protect organizations from ever-evolving security threats. If the necessary ...
READ MORE >
Trustwave won top honors for Best Managed Security Service in the Trust Awards category at the SC Awards 2017. Winners are recognized for outstanding leadership and providing superior security ...
READ MORE >
Trustwave today announced that Gartner, Inc., a leading information technology research and advisory company, has positioned Trustwave in the "Challengers" quadrant in the most recent "Gartner Magic ...
READ MORE >
Trustwave today announced that its database security products received their Certificate of Networthiness (CoN) from the U.S. Army, approving their use in the Army Enterprise Infrastructure (AEI).
READ MORE >
After the city and county of Denver experienced a distributed denial-of-service attack earlier this year, the municipality’s IT security leader called a meeting with the broader organization to ...
READ MORE >

Resources

In Capable Hands

While every organization has unique security struggles, virtually every one of them must confront the same security challenges, from preventing malware to identifying vulnerabilities to responding to threats, plus adhering to compliance requirements. No business is immune from attack. Trustwave Capabilities offer a robust set of solutions designed to help resolve your impediments, whether they are based on topic, industry or mandate.

Case Study

Many federal agencies are in the process of shifting sensitive information to public cloud systems. This movement started back in 2011 when the goal of transforming the federal government into a "cloud first" organization was first introduced. The need was great: Nearly 75 percent of the government'...

Datasheet

What started as a cost-effective way for people to send and receive messages, email is now the de facto communications tool with billions of users worldwide, collectively sending hundreds of billions messages every day. Its use case now extends far beyond sending and receiving simple messages.

A database is often called the backbone of an organization. Databases contain sensitive and proprietary information - such as employee information, medical records, customer information, financial data and more – making them a prized target for cyber criminals determined to find new ways to acc...

DbProtect is a highly scalable data security platform that enables organizations to secure their relational databases and big data stores with a distributed architecture, both on premise and in the cloud, with enterprise level analytics.

tttt.png
Datasheet
AppDetectivePRO is an in-depth database security assessment solution offered by Trustwave. This Evaluation Guide provides information for the installation of the software, how to run scans that provide database security diagnostics data, how to review the data, and how to run reports.

A database is often called the backbone of an organization. Databases contain sensitive and proprietary information - such as employee information, medical records, customer information, financial data and more - making them a prized target for cyber criminals who constantly look for ways to access ...

Trustwave’s elite security team, SpiderLabs, stays a step ahead of today’s threats to help you make informed decisions about protecting your systems from malicious hackers. With vast insight into the latest vulnerabilities, attack vectors, exploits, malware and security breaches gathered from...

Resources

If cybercrime is a business, you can consider this report your guide to its business plan. Use it to learn more about what the criminals are doing now, what they may do in the future, and the steps you can take to keep them away.

Welcome to the 2020 Trustwave Global Security Report, our annual review of the phenomena, trends and statistics affecting computer security and worldwide safety, as observed by Trustwave systems and security analysts throughout 2019.

To learn more about how agencies can protect their critical assets, GovLoop teamed with Trustwave, a cybersecurity and managed security services provider specializing in threat detection and response that helps organizations fight cybercrime, protect data and reduce security risk. This report covers...