sb-as logo
Story image

Trustwave introduces dashboard to manage security testing

21 Oct 2019

Trustwave has announced Trustwave Security Testing Services, a comprehensive portfolio that gives enterprises and government agencies the ability to acquire, apply and fully manage security scanning and testing across diverse environments through a single dashboard.

Through point-and-click navigation, users can scan business-critical applications to search for unpatched vulnerabilities, exploitable code or evidence of malicious activity.

Standard or highly-customised penetration tests can be scheduled as needed to assess network, application and database weaknesses and resiliency against cyberattacks.

In addition, enterprises have the ability to run network and web vulnerability scans as well as unlimited discovery scans to map and categorise company assets residing on-premises or in cloud or hybrid environments.

Proactive security testing has become synonymous with effective security programs but challenging for organisations with limited access to specialised cybersecurity skillsets.  

Trustwave and its bench of security practitioners negate the need for multiple vendors to satisfy testing requirements that often results in highly fragmented insights on vulnerability and risk.

Trustwave Security Testing Services is built on the Trustwave Fusion platform, the company’s cloud-native application that connects organisations to a range of security resources including Trustwave Managed Security Services, actionable threat intelligence and a global team of security specialists.

Through a dashboard, organisations gain access to a catalogue of testing and scanning services and security personnel that can be scaled as required.   

Trustwave security testing is led by Trustwave SpiderLabs, a team of professionals in ethical hacking, threat hunting, forensic investigations and security research.

These experts seek out and resolve security weaknesses before adversaries can capitalise on them.

In addition, Trustwave SpiderLabs performs red teaming engagements and realistic attack simulations that mimic techniques applied in the wild.     

“The attack surface continues to rapidly expand as companies shift to multi-cloud environments and adopt applications and technologies essential for data-driven decision-making,” says Trustwave consulting and professional services senior vice president Rob Stitch.

“This progression, however, also benefits cybercriminals who are proficient at exploiting the most minute vulnerability or misconfiguration. By making security testing simple to implement and easy to manage, enterprises maintain deep visibility on risk no matter how much their complexity grows.”

Story image
Microsoft top targeted brand by cyber criminals in Q4 2020
In Q4, 43% of all brand phishing attempts related to Microsoft (up from 19% in Q3), as threat actors continued to try to capitalise on people working remotely during the COVID-19 pandemic’s second wave. More
Story image
Palo Alto Networks advances attack surface management with Expanse
"By integrating Expanse's attack surface management capabilities into Cortex after closing, we will be able to offer the first solution that combines the outside view of an organisation's attack surface with an inside view to proactively address all security threats."More
Story image
Kaspersky steps in to protect automotive industry from cyber threats
The company’s TI report, previously available for a selected range of customers, is able to provide car manufacturers with in-depth analysis of industry-specific security threats.More
Story image
SASE vs zero trust – or the best of both worlds
Zero trust and SASE work together by converging a least-privilege access strategy with an architecture that simplifies how highly distributed users, BYOD, and cloud resources are secured.More
Story image
CompTIA forms Cybersecurity Advisory Council, led by 16 security execs
The new body will be co-chaired by Tech Data director of security solutions Tracy Holtz, and Alvaka Networks chief operating officer and chief information security officer Kevin McDonald.More
Story image
Sophos Rapid Response puts out the ransomware fire
“Attackers are using a range of techniques and whichever defence has a weakness is how they get in. When one technique fails they move on to the next, until they find a weak spot."More