CVE-2024-3400: PAN-OS Command Injection Vulnerability in GlobalProtect Gateway. Learn More

CVE-2024-3400: PAN-OS Command Injection Vulnerability in GlobalProtect Gateway. Learn More

Services
Capture
Managed Detection & Response

Eliminate active threats with 24/7 threat detection, investigation, and response.

twi-managed-portal-color
Co-Managed SOC (SIEM)

Maximize your SIEM investment, stop alert fatigue, and enhance your team with hybrid security operations support.

twi-briefcase-color-svg
Advisory & Diagnostics

Advance your cybersecurity program and get expert guidance where you need it most.

tw-laptop-data
Penetration Testing

Test your physical locations and IT infrastructure to shore up weaknesses before exploitation.

twi-database-color-svg
Database Security

Prevent unauthorized access and exceed compliance requirements.

twi-email-color-svg
Email Security

Stop email threats others miss and secure your organization against the #1 ransomware attack vector.

tw-officer
Digital Forensics & Incident Response

Prepare for the inevitable with 24/7 global breach response in-region and available on-site.

tw-network
Firewall & Technology Management

Mitigate risk of a cyberattack with 24/7 incident and health monitoring and the latest threat intelligence.

Solutions
BY TOPIC
Offensive Security
Solutions to maximize your security ROI
Microsoft Exchange Server Attacks
Stay protected against emerging threats
Rapidly Secure New Environments
Security for rapid response situations
Securing the Cloud
Safely navigate and stay protected
Securing the IoT Landscape
Test, monitor and secure network objects
Why Trustwave
About Us
Awards and Accolades
Trustwave SpiderLabs Team
Trustwave Fusion Security Operations Platform
Trustwave Security Colony
Partners
Technology Alliance Partners
Key alliances who align and support our ecosystem of security offerings
Trustwave PartnerOne Program
Join forces with Trustwave to protect against the most advance cybersecurity threats
Trustwave Blog

Trustwave Malware Protection Technology Achieves Common Criteria Validation

CHICAGO - January 28, 2014 - Trustwave today announced that the latest version of its Secure Web Gateway, which gives organizations the ability to address malware, zero-day vulnerabilities, as well as blended and advanced persistent threats, has achieved Common Criteria Validation with an EAL 2+ level of assurance.

The internationally-approved validation gives government agencies and enterprises across at least 26 countries confirmation that Trustwave Secure Web Gateway, through independent evaluation, has met specific security standards.

Malware is a persistent and growing problem-attacking organizations from all sides: the web, email, and through increasingly-embraced social media tools. A recent Osterman Research survey of security professionals shows that malware has infiltrated 74 percent of organizations through the Web during the past year, while fifty-eight percent of survey respondents said that malware being introduced from employees browsing the Web was a serious concern.

Trustwave Secure Web Gateway offers real-time protection from malware, zero-day vulnerabilities and data loss, and can help government agencies and enterprises embrace social media and evolving Web applications safely. For example, after repeatedly detecting data-stealing malware within its network, a global financial institution began using Trustwave Secure Web Gateway which took their malware infections down to zero.

"Today's advanced, targeted and evasive malware threats are extremely successful at circumventing traditional defenses and rendering them useless," said Phil Smith, senior vice president of Government Solutions at Trustwave. "This achievement and recognition for our award-winning anti-malware technology demonstrates our commitment to serving international, federal, state and municipal government entities and enterprises worldwide when it comes to reducing malware risks and protecting their sensitive information."

 

Trustwave Secure Web Gateway, available as software or on appliances, is also available as a managed security service. The Trustwave Managed Secure Web Gateway affords organizations advanced malware and zero-day threat protection without their having to worry about policy adjustments, fine-tuning and device management. This can free up IT staff to focus on strategic IT projects while protecting their citizen, consumer and government data. 

Several other Trustwave technologies have received Common Criteria validation including Trustwave Security Information and Event Management (SIEM), Trustwave Web Application Firewall and Trustwave Network Access Control.

For more information about Trustwave Secure Web Gateway, visit: https://www.trustwave.com/en-us/services/email-security/.

 

About Trustwave
Trustwave helps businesses fight cybercrime, protect data and reduce security risks. With cloud and managed security services, integrated technologies and a team of security experts, ethical hackers and researchers, Trustwave enables businesses to transform the way they manage their information security and compliance programs while safely embracing business imperatives including big data, BYOD and social media. More than two million businesses are enrolled in the Trustwave TrustKeeper® cloud platform, through which Trustwave delivers automated, efficient and cost-effective data protection, risk management and threat intelligence. Trustwave is a privately held company, headquartered in Chicago, with customers in 96 countries. For more information, visit https://www.trustwave.com.

Latest Trustwave Blogs

Behind the Scenes of the Change Healthcare Ransomware Attack Cyber Gang Dispute

Editor’s Note – The situation with the Change Healthcare cyberattack is changing frequently. The information in this blog is current as of April 16. We will update the blog as needed. April 16, 2024:...

Read More

Law Enforcement Must Keep up the Pressure on Cybergangs

The (apparent) takedown of major ransomware players like Blackcat/ALPHV and LockBit and the threat groups’ (apparent) revival is a prime example of the Whack-a-Mole nature of combating ransomware...

Read More

Effective Cybersecurity Incident Response: What to Expect from Your MDR Provider

Companies engage with a managed detection and response (MDR) provider to help ensure they detect cyber threats before they do any damage. The "response" part of the MDR moniker is key to that effort,...

Read More