• slide
  • slide
  • slide
  • slide
  • slide
  • slide

Overview

Trustwave is a leading cybersecurity and managed security services provider focused on threat detection and response. Offering a comprehensive portfolio of managed security services, consulting and professional services, and data protection technology, Trustwave helps businesses embrace digital transformation securely.

 

Trustwave Government Solutions is a leading cybersecurity and managed security services provider who helps the United States government fight cybercrime, protect data and reduce security risk.  Offering a comprehensive portfolio of managed security services, consulting and professional services, and data protection technology, Trustwave Government helps governments embrace digital transformation securely.

Trustwave helps public sector CISO and CIO’s who are seeking a means of getting the best-of-breed protections they need to protect their environments. With the ever-changing threat to their cyber infrastructure, state and local government along with educational institutions, the need to sustain safe operations; Trustwave solves cybersecurity and talent shortfall challenges by providing best value.

Products

trustwaveproducts.png

Database Security

  • DbProtect

    DbProtect is a centrally managed and highly scalable solution for comprehensive database security process control. Based upon proven technology, DbProtect is a comprehensive solution built on a platform that integrates database asset management, vulnerability management, rights management, policy management and database activity and monitoring as well as reporting and analytics. DbProtect enables agencies with complex, heterogeneous environments to optimize database security, manage risk and bolster regulatory compliance.

    • Discover and Manage – identify and manage your database assets
    • Audit & Vulnerability Management- analyze your data to highlight risks and vulnerabilities
    • User Rights Review & Rights Management – guard against unauthorized database access
    • Database Activity Monitoring – gain real time, agentless monitoring and alerting on database activity
    • Report and Remediate – document and share your findings

  • AppDetectivePro

    A laptop - based discovery and vulnerability assessment scanner, AppDetectivePro discovers databases within your infrastructure and assesses their security strength. Backed by a proven security methodology and extensive knowledge of application-level vulnerabilities, AppDetectivePro locates, examines, reports and fixes security holes and misconfigurations and also identifies user rights and privilege levels. As a result, government agencies can proactively harden their database applications.

    • Discovery - scan and identify all databases on your network
    • Vulnerability Assessment - policy scans help you identify vulnerabilities and misconfigurations
    • User Rights Review - scan and identify inappropriate user privileges
    • Report - document and share asset, policy and user rights results
    • Always up to date - New CIS/DISA STIG with monthly or ad hoc updates

Testing by SpiderLabs

  • SpiderLabs Blog

    Attracting more than a half-million annual readers, this is the security community's go-to destination for technical breakdowns of the latest threats, critical vulnerability disclosures and cutting-edge research.

  • Security Testing

    Detect, assess and classify vulnerabilities in applications, networks and databases. Access a broad array of penetration testing services to safely exploit vulnerabilities in IT systems and understand how hackers might exploit vulnerabilities.

  • Trustwave SpiderLabs

    An elite group of researchers, penetration testers and Incident responders.

  • Proactive Threat Hunt

    Attackers will penetrate your preventative defenses, but that doesn’t mean they will succeed. Trustwave Proactive Threat Hunting leverages a human-driven approach with a creative focus on clues and hypotheses to detect and eliminate threats.

Managed Threat Detection and Response

  • Managed Security Services

    Threats are growing more hostile, the number of endpoints needing to be controlled is rising, budgets are tight and in-house resources devoted to security are at a premium. Powered by global threat intelligence from the elite Trustwave SpiderLabs team, our comprehensive catalog of flexible Managed Security Services help you protect against advanced threats, diminish your attack surface, identify new risks, and respond to and recover from incidents.

  • Managed Threat Detection and Response

    Your job is to keep your business moving. Our job is to stop threats so that your business can keep moving. Period. We embed our elite expertise and proven threat lifecycle capabilities into your security program and environment to help you identify threats, investigate the depth and scope of those threats, and help you respond by taking containment actions. We partner with you to eradicate threats. All day. Every day.

  • New: Gov Cloud

    Trustwave Managed Threat Detection and Response services can be delivered via the Trustwave Fusion platform hosted on AWS GovCloud. This flexible delivery model allows us to integrate with your existing security environment to detect and respond to threats, and ensure your organization meets data sovereignty requirements.

  • Digital Forensics and Incident Response

    A quick and efficient response to a cyberattack can save you time and money in the long run. Trustwave Digital Forensics and Incident Response (DFIR) consulting services allow you to determine the source, cause and extent of a security breach quickly, and to better prepare for the inevitable incident.

Security Technologies

  • Secure Email Gateway

    Protecting your email environment against spam, malware, phishing attacks, business email compromise, account takeover, ransomware and more is one of your top priorities. Trustwave Secure Email Gateway (SEG) multi-layered intelligence and detection engine performs deep analysis of your inbound email traffic, in real-time, to protect your users from cyber threats, enables you to integrate the workflow of your email content into business processes, while scrutinizing outbound email traffic to prevent the loss of your proprietary data, intellectual property, confidential documents and financial records.

  • AppDetectivePRO

    A laptop - based discovery and vulnerability assessment scanner, AppDetectivePro discovers databases within your infrastructure and assesses their security strength. Backed by a proven security methodology and extensive knowledge of application-level vulnerabilities, AppDetectivePro locates, examines, reports and fixes security holes and misconfigurations and also identifies user rights and privilege levels. As a result, government agencies can proactively harden their database applications.

    • Discovery - scan and identify all databases on your network
    • Vulnerability Assessment - policy scans help you identify vulnerabilities and misconfigurations
    • User Rights Review - scan and identify inappropriate user privileges
    • Report - document and share asset, policy and user rights results
    • Always up to date - New CIS/DISA STIG with monthly or ad hoc updates
  • DbProtect

    DbProtect is a centrally managed and highly scalable solution for comprehensive database security process control. Based upon proven technology, DbProtect is a comprehensive solution built on a platform that integrates database asset management, vulnerability management, rights management, policy management and database activity and monitoring as well as reporting and analytics. DbProtect enables agencies with complex, heterogeneous environments to optimize database security, manage risk and bolster regulatory compliance.

    • Discover and Manage – identify and manage your database assets
    • Audit & Vulnerability Management- analyze your data to highlight risks and vulnerabilities
    • User Rights Review & Rights Management – guard against unauthorized database access
    • Database Activity Monitoring – gain real time, agentless monitoring and alerting on database activity
    • Report and Remediate – document and share your findings
  • Secure Web Gateway

    Your employees rely on the web and email to do their jobs, but cybercriminals are lurking in the background 24/7. A Secure Web Gateway responds by keeping your staff's endpoints free of internet-borne malware infections, while enforcing your company's policies.

    Delivers real-time protection against malware and provides strong policy enforcement, with the added option of having the technology handled by our experts and augmented by our intelligence without you ever losing control.

Regulatory Frameworks

  • HIPAA

    HIPAA established rules around protecting the security and privacy of sensitive patient data. Trustwave can help you respond to the regulation's guiding principles of confidentiality, integrity and availability of electronic protected health information (ePHI).

  • CMMC

    Cybersecurity Maturity Model Certification (CMMC) is a framework to assess and enhance the cybersecurity posture of the Defense Industrial Base (DIB). The CMMC is intended to serve as a verification mechanism to ensure appropriate levels of cybersecurity practices and processes are in place to ensure basic cyber hygiene as well as protect controlled unclassified information (CUI) that resides on the Department’s industry partners’ networks.

For more information on these solutions, please contact us.

FED

Trustwave Government Solutions is a leading cybersecurity and managed security services provider who helps the United States government fight cybercrime, protect data and reduce security risk. Offering a comprehensive portfolio of managed security services, consulting and professional services, and data protection technology, Trustwave Government helps governments embrace digital transformation securely.

Federal Contracts:

GSA Schedule 70

GS-35F-0119Y
Dec 20, 2011
Dec 19, 2021
 

SEWP V

NNG15SC03B/NNG15SC27B
May 01, 2015
May 1, 2025
 

ITES-SW

W52P1J-15-D-0008
Mar 03, 2015
Aug 10, 2020
 

View all contracts here

Register a deal

SLED

Trustwave helps public sector CISO’s/CIO’s who are seeking a means of getting the best-of-breed protections they need to secure their environments. With the ever-changing threat to their cyber infrastructure, state and local government along with educational institutions, the need to sustain safe operations; Trustwave solves cybersecurity and talent shortfall challenges by providing best value.

SpiderLabs

States, municipalities or educational institutions have been the prime target of ransomware attacks.  Some of the biggest ransomware attacks have crippled organizations that have been held hostage for millions of dollars. Attackers want to hit the institutions that are going to hurt the most where their critical systems are on-line, like those that support essential services such as police, fire and utilities, have no choice but to pay. According to Shawn Kanady (See his blog), director at Trustwave SpiderLabs Digital Forensics and Incident Response, “ransomware is just the end payload; you need to focus on how the attacker got in.”

As cyberattacks become more sophisticated and strategic, they are much more effective at breaching security and compromising your organization.  Gain insight from Trustwave SpiderLabs into some of the best approaches to secure your cyber infrastructure to cope with ever-changing threats.

The SpiderLabs team at Trustwave includes security and penetration testers, incident responders, forensic investigators, malware reversers, security researchers, published authors and sought-after speakers. Our security breach investigations, malware reverse-engineering projects, millions of scans, thousands of penetration tests, leadership of open-source security projects and contributions to the security community have established Trustwave SpiderLabs as world-renowned experts on the past, present and future of security.

Managed Security Services

Right now, state and local government and educational institutions are trying to maximize their budgets at a time when tax revenues are down; costs are up. At the same time, most public sector organizations are operating in an environment that is supporting a fully remote work force which means the attack surface just increased.  With the ever-changing threat to their cyber infrastructure, CISO/CIO’s are seeking a means of getting the best-of-breed protections they need at a value that is affordable and efficient.

Trustwave solves budget and talent shortfall challenges by providing best value to sustain safe operations by engaging Trustwave’s Managed Security Services (MSS) to enable state and local government and educational institutions to gain greater efficiencies and cost savings at a time when the need is greatest as most of the workforce is remote. Our approach is to keep working with the technologies you have already been using versus ripping and replacing.

State & Local Contracts

City of Seattle Contract

Contract #0000003265 Term: December 19, 2021
 

CMAS

Contract # CMAS 3-12-70-2247E Term: through March 31, 2022
 

Fairfax County IT Hardware, Software, & Services

Virginia- Fairfax County CONTRACT EXPIRATION: December 04, 2021 (with 5 option years)
 

Orange County National IPA Co-Op

Through May 31, 2020  (with 2 option years)
 

Texas DIR-TSO-4288

Texas DIR Contract: DIR-TSO-4288 Contract Period: Through February 21, 2021 (with 2 option years)
 

VASCUPP

Contract Number: UVA1482501 Term: May 2, 2014– December 19, 2021
 

Register a deal

CDM

Continuous Diagnostics and Mitigation (CDM) Defend Comprehensive Database Security Strategy

Utilizing an Integrated Database Security Platform

  • Assets Management
    • CSM - Configuration Settings Management
    • VUL - Vulnerability Management


    Trustwave DBSS

    • App DetectivePro
    • DbProtect Vulnerability Management
  • Identity and Access Management
    • TRUST - Access Control Management (People Granted Access)
    • BEHAVE - Security-Related Behavior Management
    • PRIV - Privileges


    Trustwave DBSS

    • AppDetectivePro
    • DbProtect Rights Management
  • Data Protection Management
    • DATA_DISCOV - Provide consistent identification of "data assets" across the organization for processing, storing, and all transmitting information at all sensitivity levels
      • Automated Data Discovery; Data Classification; Tagging
    • DATA_PROT - Provide ability to protect the date itself through cryptographic methods and access control/monitoring
      • Encryption (multi-level); Data Masking; Data Policy Management; User Access Logging/Monitoring
    • DATA_DLP - Data Loss Prevention - Content, context and metadata monitoring, protection and inspection
    • DATA_SPIL - Data Breach/Spillage Mitigation - Protecting/remediating instances of unauthorized loss of data
    • DATA_IRM - Identification and granular encryption/protection of high value/sensitive data


    Trustwave DBSS

    • AppDetectivePro
    • DbProtect

Request a Deal

Contracts

Federal

GSA Schedule 70

GS-35F-0119Y
Dec 20, 2011- Dec 19, 2021

SEWP V

NNG15SC03B/NNG15SC27B
May 01, 2015- Apr 30, 2025

ITES-SW

W52P1J-15-D-0008
Mar 03, 2015- Aug 10, 2020
*Additional Option Years Available

State and Local

CMAS

3-12-70-2247E
Aug 28, 2012- Mar 31, 2022

City of Seattle Contract

0000003265
Jul 11, 2014- Dec 19, 2021

Department of General Services PA - Symantec

4400004253
May 01, 2009- Dec 19, 2021

Fairfax County IT Hardware, Software, & Services

4400006323
Oct 04, 2015- Dec 04, 2021
*Additional Option Years Available

Orange County National IPA Co-Op

MA-017-16010236
Jun 01, 2015- May 31, 2021

Pennsylvania COSTARS-6 IT Software Contract

COSTARS-006-176
Aug 31, 2017- Aug 31, 2021

State of Indiana Contract

0000000000000000000021430
Aug 01, 2017- Jul 31, 2021

State of New Mexico Contract

80-000-18-00002
Aug 01, 2017- Aug 01, 2021

Texas DIR-TSO-4288

DIR-TSO-4288
Feb 22, 2019- Feb 21, 2021
*Additional Option Years Available

Education

Massachusetts Higher Education Consortium (MHEC)

MC15-04
Aug 10, 2019- Jun 30, 2022

VASCUPP

UVA1482501
May 02, 2014- Dec 19, 2021

Events

Upcoming Events

November 05, 2020 at 1:00 AM ET
November 11, 2020 at 2:00 PM ET

Archived Events

News

View upcoming Trustwave events here

View Trustwave webinars here

View the Trustwave blog here

Recent Articles

Archived Events

Latest News

Winners of the Trust Award were chosen by a distinguished group of leading IT security professionals from SC Media's readership and selected by SC Media’s editorial team.
READ MORE >
The SC Awards Europe and SC Awards U.S. are recognized throughout the security industry as the gold standard of excellence in cybersecurity.
READ MORE >
In this report, Gartner evaluated MSSPs on several criteria to assess their completeness of vision and ability to execute. The ability to execute criteria included product or service, overall ...
READ MORE >
Gain powerful perspectives on nefarious motives, preferred social engineering techniques, new malware variants and reasons wide-net campaigns from years past are being shelved in favor of targeted ...
READ MORE >
Trustwave Government Solutions is debuting its new Threat Hunting service for forward-leaning government agencies that are tired of having their cyber clocks cleaned.
READ MORE >
Trustwave, a Chicago-based cybersecurity company that has specialized in cyberattack response, has launched Threat Hunting for Government, a service designed to proactively and continuously search ...
READ MORE >
As the Defense Department beefs up its cyber threat hunting capabilities, it's taken a slower approach toward modernizing GPS.
READ MORE >
Being able to deploy security solutions in a fast and efficient manner is not only convenient, but also vital in helping protect organizations from ever-evolving security threats. If the necessary ...
READ MORE >
Trustwave won top honors for Best Managed Security Service in the Trust Awards category at the SC Awards 2017. Winners are recognized for outstanding leadership and providing superior security ...
READ MORE >
Trustwave today announced that Gartner, Inc., a leading information technology research and advisory company, has positioned Trustwave in the "Challengers" quadrant in the most recent "Gartner Magic ...
READ MORE >
Trustwave today announced that its database security products received their Certificate of Networthiness (CoN) from the U.S. Army, approving their use in the Army Enterprise Infrastructure (AEI).
READ MORE >
After the city and county of Denver experienced a distributed denial-of-service attack earlier this year, the municipality’s IT security leader called a meeting with the broader organization to ...
READ MORE >

Resources

In Capable Hands

While every organization has unique security struggles, virtually every one of them must confront the same security challenges, from preventing malware to identifying vulnerabilities to responding to threats, plus adhering to compliance requirements. No business is immune from attack. Trustwave Capabilities offer a robust set of solutions designed to help resolve your impediments, whether they are based on topic, industry or mandate.

Resources

Data is the lifeblood of today’s digital organization. Organizations rely on data for insights that will create more engagement, increase sales and achieve long-term profitability. You need proactive database security to get ahead of risk, respond intelligently and harden your attack surface.

Whitepaper

Relational databases and big data stores are a prime target for attackers due to the amount of sensitive and classified data residing within. Yet many government organizations fall victim to database intrusions because of common database flaws. To address their ever-expanding network perimeters that...

Relational databases and big data stores are a prime target for attackers due to the amount of sensitive information residing within, such as customer information, intellectual property and proprietary secrets. Yet many businesses fall victim to database intrusions because of common database flaws...