Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Network Security

Trustwave Expands Managed Security Services, Adds Threat Intelligence Service

Trustwave, a provider of IT security and compliance solutions, today announced additions to its managed security services portfolio, including new managed Web Application Firewall and Information and Event Management (SIEM) solutions.

The offerings add to the company’s existing managed security services offerings, including managed encryption, network access control, two-factor authentication and unified threat management.

Trustwave, a provider of IT security and compliance solutions, today announced additions to its managed security services portfolio, including new managed Web Application Firewall and Information and Event Management (SIEM) solutions.

The offerings add to the company’s existing managed security services offerings, including managed encryption, network access control, two-factor authentication and unified threat management.

Trustwave LogoTrustwave’s Managed Web Application Firewall provides Web applications with real-time, continuous security and protection from vulnerabilities and data loss. The managed security service sends events from a Trustwave Web application firewall appliance to Trustwave Security Operations Centers where security experts use Trustwave SIEM technology to correlate and analyze application-specific events to generate alerts.

The company’s Managed SIEM Appliance consists of an on-premise event collector, which transmits events to Trustwave Security Operations Centers for analysis, reporting and archiving.

Trustwave also announced a new subscription-based service that gives organizations access to the research, insight and analysis from Trustwave’s security team. Dubbed SpiderLabs Threat Intelligence Program, the service is delivered as a daily feed and aims to provide timely security information to help customers better understand the changing threat landscape in areas including mobile security, targeted malware, infrastructure, cloud and virtual environments.

“One of the scarcest commodities is a security professional who can analyze a challenging threat landscape and who has experience with a wide variety of real-world situations,” said Wendy Nather, research director of enterprise security at 451 Research. “Trustwave SpiderLabs has a whole lab full of them, and is making their expertise available as a service to those customers needing a trusted source of security intelligence.”

Written By

For more than 15 years, Mike Lennon has been closely monitoring the threat landscape and analyzing trends in the National Security and enterprise cybersecurity space. In his role at SecurityWeek, he oversees the editorial direction of the publication and is the Director of several leading security industry conferences around the world.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Cody Barrow has been appointed as CEO of threat intelligence company EclecticIQ.

Shay Mowlem has been named CMO of runtime and application security company Contrast Security.

Attack detection firm Vectra AI has appointed Jeff Reed to the newly created role of Chief Product Officer.

More People On The Move

Expert Insights

Related Content

Cybercrime

The changing nature of what we still generally call ransomware will continue through 2023, driven by three primary conditions.

Data Protection

The cryptopocalypse is the point at which quantum computing becomes powerful enough to use Shor’s algorithm to crack PKI encryption.

Cybercrime

As it evolves, web3 will contain and increase all the security issues of web2 – and perhaps add a few more.

Identity & Access

Zero trust is not a replacement for identity and access management (IAM), but is the extension of IAM principles from people to everyone and...

Malware & Threats

The NSA and FBI warn that a Chinese state-sponsored APT called BlackTech is hacking into network edge devices and using firmware implants to silently...

Artificial Intelligence

The degree of danger that may be introduced when adversaries start to use AI as an effective weapon of attack rather than a tool...

Cybersecurity Funding

Network security provider Corsa Security last week announced that it has raised $10 million from Roadmap Capital. To date, the company has raised $50...

Network Security

Attack surface management is nothing short of a complete methodology for providing effective cybersecurity. It doesn’t seek to protect everything, but concentrates on areas...