Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Vulnerabilities

Trustwave Lets Clients ‘Look Over the Shoulder’ of its Hackers

Chicago based Trustwave, a provider of security and compliance solutions, today released a tool that provides its enterprise clients the ability to manage all forms of penetration tests in real-time, and be presented with live, detailed test results and recommendations. With the results gathered from penetration tests, the generically named PenTest Manager displays rich media demonstrations including image slideshows and screen capture videos displaying how vulnerabilities can be exploited.

Chicago based Trustwave, a provider of security and compliance solutions, today released a tool that provides its enterprise clients the ability to manage all forms of penetration tests in real-time, and be presented with live, detailed test results and recommendations. With the results gathered from penetration tests, the generically named PenTest Manager displays rich media demonstrations including image slideshows and screen capture videos displaying how vulnerabilities can be exploited.

TrustWave PenTest ManagerPenTest Manager provides users with at-a-glance views of projects, test status and findings to manage application, network, physical and wireless penetration tests, performed by Trustwave’s security team, SpiderLabs. Having visual proof of exploitation proves to be valuable in showing executives and security staff the true impact of vulnerabilities. TrustWave claims that no other testing team allows clients to “look over the shoulder” of an ethical hacker in this manner as they expose weaknesses in critical systems.

“Rather than tracking findings in the typical PDF reports and spreadsheets, we give customers one centralized database to manage their vulnerabilities,” said Robert J. McCullen, chairman and CEO of Trustwave. “The way PenTest Manager delivers evidence provides real business value that solves a CISO’s problems while reducing costs with a portal-based management interface, which is what customers really need in their security solutions.”

Penetration Testing, also referred to ethical hacking, helps ensure proper security controls are in place to protect an organization from attack by cyber criminals hoping to steal valuable information and cause business disruption.

To ensure that application vulnerabilities don’t leave gaping holes for intruders, virtual patches for Web Application Firewalls (WAF) are custom-built by SpiderLabs, specific to each exploitable vulnerability. This minimizes the vulnerability of applications as developers fix the underlying software issues.

“The nature of the PenTest Manager encourages collaboration between the CISO and the testers, which can end up leading to more penetration testing requests rather than fewer,” said Wendy Nather, senior analyst, Enterprise Security Practice, The 451 Group. “By consolidating testing details, findings, mitigation and remediation tasks across multiple layers, a product like this can enrich the ongoing conversation between an MSSP and its clients.”

Written By

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Shay Mowlem named CMO of runtime and application security company Contrast Security.

Attack detection firm Vectra AI has appointed Jeff Reed to the newly created role of Chief Product Officer.

Shaun Khalfan has joined payments giant PayPal as SVP, CISO.

More People On The Move

Expert Insights

Related Content

Vulnerabilities

Less than a week after announcing that it would suspended service indefinitely due to a conflict with an (at the time) unnamed security researcher...

Data Breaches

OpenAI has confirmed a ChatGPT data breach on the same day a security firm reported seeing the use of a component affected by an...

IoT Security

A group of seven security researchers have discovered numerous vulnerabilities in vehicles from 16 car makers, including bugs that allowed them to control car...

Vulnerabilities

A researcher at IOActive discovered that home security systems from SimpliSafe are plagued by a vulnerability that allows tech savvy burglars to remotely disable...

Risk Management

The supply chain threat is directly linked to attack surface management, but the supply chain must be known and understood before it can be...

Cybercrime

Patch Tuesday: Microsoft calls attention to a series of zero-day remote code execution attacks hitting its Office productivity suite.

Vulnerabilities

Patch Tuesday: Microsoft warns vulnerability (CVE-2023-23397) could lead to exploitation before an email is viewed in the Preview Pane.

IoT Security

A vulnerability affecting Dahua cameras and video recorders can be exploited by threat actors to modify a device’s system time.