document thumbnail

Virus Bulletin Email Security Review: Trustwave Secure Email Gateway

Trustwave Secure Email Gateway (SEG) won the VBSpam+ award from security industry authority and testing body Virus Bulletin, which evaluated Trustwave SEG against hundreds of thousands of live mail streams of spam, malicious emails, newsletters, and legitimate emails, representing mailboxes all over the world. As email continues to be the #1 threat vector today, with spam still having a huge impact both for IT professionals and for the millions of users who accidentally open phishing, fraudulent, or compromised emails, VBSpam test intends to reflect the experience of a real end-user as accurately as possible. In its tests, Trustwave blocked more than 99.9% of spam and malware without any false positives, earning a special VBSpam+ award for its exceptional performance. As these independent tests have shown, although the spam problem persists, it has been mitigated well at the gateway and network level with powerful solutions like Trustwave SEG.

document thumbnail

The Best of Both Worlds Blending Best Practices with New Security Protocols

Cybersecurity is an ever-evolving discipline. Attacks change, technologies come and go, processes adjust, new compliance mandates are regulated, and people are there to hold it all together. But none of this is new, and not likely to change much. It’s the way of life for today’s security organizations.

video thumbnail

Why Red Teaming isn't Pen Testing

Red Teaming has become a buzz word in the security industry of late and is often mistaken to be the same as penetration testing. But how does a Red Teaming engagement actually differentiate from pen testing?

document thumbnail

Virus Bulletin Web Review: Trustwave Secure Web Gateway

Trustwave Secure Web Gateway (SWG) won the VBWeb award from testing body Virus Bulletin, which evaluated Trustwave SWG against hundreds of malicious web pages hosting drive-by downloads, direct malware downloads, and potentially malicious behavior. Virus Bulletin declared Trustwave "continues its excellent performance on our test bed, once again blocking all exploit kits – no trivial achievement given how such kits constantly evolve…” In its tests, Trustwave blocked 100 percent of drive-by downloads and had a 0% false positive rate.

document thumbnail

Certified Database Security Partner

Become our service partner and provide the implementation, consultation, and training services that customers require to maximize ROI from their AppSecInc solutions. The CASP designation provides proof of your ability to implement DbProtect, create customized policies, and help companies operationalize AppSecInc's database security solutions.

document thumbnail

Multiple Managed Security Services (MSS) Legal Case Study

Learn how a top AmLaw100 Upholds Lawyer-Client Privilege

document thumbnail

Cybersecurity Education Catalog

This catalog provides Security Awareness Education and Secure Development Training programs and course options.

document thumbnail

Best Practices for Web Application Firewall Management

In this white paper, Trustwave experts share best practice ideas to help you be more effective with your web application firewall (WAF).

document thumbnail

Managed Threat Detection

Trustwave Managed Threat Detection (MTD) is a fully integrated service for detecting and investigating attacker activity. Trustwave MTD combines industry leading SpiderLabs Threat Intelligence with SpiderLabs security expertise and a proprietary analysis engine to analyze and correlate events. Collecting data from so many sources increases your security visibility, creating the foundation for detection and response.

document thumbnail

Digital Forensics and Incident Response Consulting

Responding to a data-loss incident quickly and in an organized manner is paramount in containing a breach, limiting exposure, stemming losses and preserving evidence. With Trustwave's comprehensive Digital Forensics and Incident Response (DFIR) consulting services, you can respond with confidence to a security incident knowing you're backed by Trustwave SpiderLabs' decades of DFIR expertise and experience responding to thousands of data security incidents.

document thumbnail

Trustwave Web Application Firewall Appliance Specifications

Specification sheet provides Web Application Firewall appliance configuration details.

document thumbnail

2018 Security Pressures Report

Based on a survey of 1,6000 information security decision-makers and influencers in six countries, the 2018 Security Pressures Report from Trustwave delves into the often-maddening world of keeping businesses safeguarded against cyber threats, attacks and compromises. The 44-page report, now in its fifth year, measures more than a dozen pressure sources – from biggest threats and responsibilities to data breach repercussions to staffing levels – and breaks the findings out by respondents from the United States, Canada, United Kingdom, Australia, Singapore and Japan.

video thumbnail

Blueprint for Building a Strategic GDPR Framework (Americas)

The General Data Protection Regulation (GDPR) is a European Union mandate. This webinar, with Trustwave’s Global Compliance and Risk Services Vice President, Michael Aminzade, discusses how to manage the complexity of GDPR and build a strategic framework for ongoing compliance throughout your organization.

document thumbnail

Trustwave DbProtect Rights Management

User rights management plays a vital role in database security by controlling which resources a user can access to perform his/her role and the types of actions he/she can perform on those resources. Over time user rights can escalate and lead to inappropriate access to sensitive data that can result in fraudulent changes or even data breaches.

video thumbnail

GDPR: What APAC Businesses Need to Know

In our webinar, GDPR: What APAC Businesses Need To Know, we discuss what the forthcoming regulation entails and what you need to do to ensure you comply.

document thumbnail

The Procrastinator’s Guide to Preparing for the GDPR

The Procrastinator’s Guide to Preparing for the GDPR, an Osterman Research White Paper, is an extensive guide to help you understand key requirements of the regulation and the approach you should take to address your organization’s compliance.

document thumbnail

Three Pillars for Successfully Addressing GDPR

This white paper offers you a strategic framework that can help your organization manage the complexity of GDPR and build an ongoing compliance program.

video thumbnail

Blueprint for Building a Strategic GDPR Framework (EMEA)

With the enforcement of the General Data Protection Regulation (GDPR) quickly approaching, your organization likely has an initial GDPR compliance plan in place. But is your program sustainable and designed for ongoing improvements such as 'privacy by design'?

video thumbnail

Database Security Best Practices

It is imperative to secure your relational databases and big data stores as they are a prime target for attackers because they often contain substantial amounts of sensitive information, such as customer information, intellectual property and proprietary secrets. In this video you will learn about how to secure your databases by incorporating database security best practices.

document thumbnail

What are Cyber Heroes Made of?

Ever wonder what it would be like to have your very own cyber heroes at your disposal? This infographic dissects the anatomy of these guardians of the internet galaxy and digs into their bag of tricks to discover how they are can be so smart, strong and selfless.