Now on Demand Ransomware Resilience & Recovery Summit - All Sessions Available
Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Compliance

Trustwave Launches On-Demand Pen Testing Service

Trustwave has launched a new subscription-based, penetration testing service that lets businesses schedule, manage and adjust penetration tests through a cloud-based portal.

Trustwave has launched a new subscription-based, penetration testing service that lets businesses schedule, manage and adjust penetration tests through a cloud-based portal.

Using the new service, Trustwave Managed Security Testing, customers can regularly test for security weaknesses within networks and applications, the Chicago-based company said.

Trustwave is making the new testing service available to customers that utilize its TrustKeeper cloud and managed security services platform, as well as new customers who are looking for penetration testing services only.

Trustwave Managed Security ServicesTrustwave explains that the service “demonstrates actual exploitable vulnerabilities with methods employed by real-world attackers” and provides an interactive report detailing both tactical and strategic recommendations for remediation.

“Today’s threats are stealthier and more hostile than ever so businesses must consistently update their security plans to stay in front of potential attacks. With mere point-in-time testing — testing that occurs just once or twice a year — businesses could unknowingly leave a network or application exposed to an attacker and possibly face a costly, damaging attack,” said Andy Bokor, General Manager, Threat Intelligence & Research at Trustwave. “With Trustwave Managed Security Testing, we leverage our cloud-based TrustKeeper platform to help customers more easily tap our security testing tools augmented by our ethical hackers to address complex attack scenarios, find vulnerabilities within their security, and remediate those vulnerabilities to strengthen their overall security posture.”

Trustwave currently offers five separate tiers of testing, where clients select the level of testing necessary based on the value of assets along with any associated data and the goals of testing efforts, such as meeting compliance requirements.

The service is available immediately with pricing starting at $5k per year.

Written By

For more than 15 years, Mike Lennon has been closely monitoring the threat landscape and analyzing trends in the National Security and enterprise cybersecurity space. In his role at SecurityWeek, he oversees the editorial direction of the publication and is the Director of several leading security industry conferences around the world.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

MSSP Dataprise has appointed Nima Khamooshi as Vice President of Cybersecurity.

Backup and recovery firm Keepit has hired Kim Larsen as CISO.

Professional services company Slalom has appointed Christopher Burger as its first CISO.

More People On The Move

Expert Insights

Related Content

Vulnerabilities

Less than a week after announcing that it would suspended service indefinitely due to a conflict with an (at the time) unnamed security researcher...

Identity & Access

Zero trust is not a replacement for identity and access management (IAM), but is the extension of IAM principles from people to everyone and...

Data Breaches

OpenAI has confirmed a ChatGPT data breach on the same day a security firm reported seeing the use of a component affected by an...

IoT Security

A group of seven security researchers have discovered numerous vulnerabilities in vehicles from 16 car makers, including bugs that allowed them to control car...

Vulnerabilities

A researcher at IOActive discovered that home security systems from SimpliSafe are plagued by a vulnerability that allows tech savvy burglars to remotely disable...

Risk Management

The supply chain threat is directly linked to attack surface management, but the supply chain must be known and understood before it can be...

Cybercrime

Patch Tuesday: Microsoft calls attention to a series of zero-day remote code execution attacks hitting its Office productivity suite.

Vulnerabilities

Patch Tuesday: Microsoft warns vulnerability (CVE-2023-23397) could lead to exploitation before an email is viewed in the Preview Pane.