View

Sorting

Products found: 3

logo
Offer a reference bonus
0.00

Trustwave Managed Application Control

Trustwave’s MAC solution monitors and records all endpoint and server activity to prevent, detect and respond to cyber threats that evade traditional security defenses. Based upon flexible, policy-based application whitelisting technology, Trustwave has crafted a managed offering which gives you the freedom to outsource the day-to-day operations of administering the MAC solution within your enterprise, while retaining overall control of your corporate security policies. Leverage Trustwave’s deep managed security experience along with the ultimate application whitelisting solution to rapidly heighten your security posture, while retaining control of your security policies and freeing your internal team to focus on other important security objectives. Trustwave has a wealth of experience and knowledge on best practices for administering the MAC solution to secure any organization on a global scale.

Trustwave Managed Application Control

  • Real-time Visibility & Control
  • Over every endpoint and server
  • No polling or network scans
  • Signature-less Detection
  • With built-in advanced threat indicators
  • Granular, policy-based control
  • Multiple server and desktop OS support 
  • Default Deny Policy
  • Trust based and policy driven application control
  • Detect-and-Deny
  • Signature-less advanced threat indicators
  • Detonate-and-Deny
  • Automatic detonation services

Additional Benefits

  • Address legacy OS concerns while meeting compliance needs within PCI or HIPAA
  • Maintain best practices and ensure your policies and rules are optimally configured
  • Infuse Trustwave’s extensive security expertise into your organization
  • Free your internal team to focus on other security objectives
  • Actionable reports and intelligence across managed servers
  • Default Deny Policy
  • Trust based and policy driven application control
  • Detect-and-Deny
  • Signature-less advanced threat indicators
  • Detonate-and-Deny
  • Automatic detonation services
Trustwave’s MAC solution is the industry’s most comprehensive endpoint threat protection solution leveraging advanced application control for both servers and desktops. Combining a trust-based and policy-driven approach to application control with real-time threat intelligence from Trustwave, managed solution monitors and records all endpoint and server activity to prevent, detect and respond to cyber threats that evade traditional security defenses.

MAC Agent Features

  • Lightweight footprint
  • Minimal memory usage
  • Complete tamper protection
  • Centralized management
  • Horizontal scaling with support for up to 250,000 agents per managed platform

Supported Platforms & Use Cases

  • Comprehensive OS support for Microsoft Windows, Mac OS X, and Red Hat and CentOS Linux
  • Advanced server security monitoring and application control
  • Point-of-Sale systems
  • ATM / Banking systems
  • Critical infrastructure and Health Care systems

Fully Managed, Hands Free Operation. Total solution provided by Trustwave

  • Hourly event review by Trustwave SOC
  • Policy enforcement action(s) by Trustwave
  • As previously agreed by policy
  • Audit trail of all actions taken
  • Extended incident analysis / trending
  • Monthly reporting


... Learn more
-
-
ROI-calculator
Configurator
ROI-
-
11
7
logo
Offer a reference bonus
1.00

Trustwave Secure Email Gateway

Trustwave Secure Email Gateway, previously known as MailMarshal SEG, is a fast, easy-to-use email content security solution that ensures a safe and productive working environment by enforcing your Acceptable Use Policy and protecting against spam, viruses, and other undesirable content. Trustwave SEG has been delivering unmatched email security for seventeen years. As if stopping crypto viruses was not enough SEG has a superior depth of features, outstanding user interfaces, has a fault tolerant architecture that scales into the 100,000’s of users, top flight technical support that is inside Australia and provides fast access to all levels of relevant diagnostic logging. For anyone wanting to take back control of email security Trustwave SEG is Australia’s best solution.
  • Flexible deployment options: on-premise, private or public cloud
  • Protection against blended crypto threats that use multiple vulnerabilities and methods
  • Multi-layering of anti-spam engine, because there is no single magic bullet
  • Best in class management, easiest to use and maximum product and interface maturity
  • Powerful DLP protection to achieve regulatory compliance and protect your intellectual property
... Learn more
-
-
ROI-calculator
Configurator
ROI-
-
13
19
logo
Offer a reference bonus
1.00

TrustWave Web Application Firewall (WAF)

The Trustwave WAF integrates with Trustwave application scanning solution, App Scanner to provide customized protection for any application via virtual patching and is backed by the expertise of our elite SpiderLabs Research team, who deliver ongoing application vulnerability and emerging threat information. Attackers use a wide range or techniques to attack web applications: site scraping, malicious bots, zero-day, targeted attacks and more. The Trustwave WAF protects against these and others, including the OWASP Top 10 by offering a comprehensive set of capabilities, including positive and negative security, virtual patching, inspection of outgoing traffic, and more. The Trustwave WAF is fueled by the SpiderLabs Research team, who provide rules and threat intelligence that identify the latest web application attacks and threats. Features
  • Continuous Protection. Delivers continuous protection With a combination of positive and negative security, perpetual tuning and dynamic virtual patching.
  • Ease of Use. Centralized management dashboards and an intuitive UI let you prioritize and respond faster and more effectively to threats.
  • Multiple Deployment Options. Implement Trustwave WAF how you need it - inline or out-of-line and as a cloud service in Amazon Web Services or Microsoft Azure or as a physical or virtual appliance.
  • Real-Time Threat Detection. Identify abnormal behavior, improve threat blocking and prevent outbound data leaks with bi-directional traffic analysis and behavioral profiling.
  • Simplified Customization. Pre-define rules and customize scenarios to focus on the specific requirements of your applications and your business.
  • Improved Performance. Take advantage of features outside of security to improve performance by load balancing traffic or identifying issues and trends in the web application environment.
  • Built-in Threat Intelligence. The elite SpiderLabs team delivers ongoing application vulnerability and emerging threat information to the Trustwave WAF.
  • Built-In Compliance Reporting. Includes pre-built best practice controls and reports for compliance mandates including the PCI DSS.
  • Built-in Integration. Integration with Trustwave App Scanner provides customized protection for any application via virtual patching.
... Learn more
-
-
ROI-calculator
Configurator
ROI-
-
17
18

The ROI4CIO Product Catalog is a database of business software, hardware, and IT services. Using filters, select IT products by category, supplier or vendor, business tasks, problems, availability of ROI calculator or price calculator. Find the right business solutions by using a neural network search based on the results of deployment products in other companies.