From The Blog
-
ConnectWise Slash and Grab Flaw Once Again Shows the Value of Input Validation We talk to Huntress About its Impact
Written by Sean KalinichAlthough the news of the infamous ConnectWise flaw which allowed for the creation of admin accounts is a bit cold, it still is one that…Written on Tuesday, 19 March 2024 12:44 in Security Talk Read 598 times Read more...
-
Social Manipulation as a Service – When the Bots on Twitter get their Check marks
Written by Sean KalinichWhen I started DecryptedTech it was to counter all the crap marketing I saw from component makers. I wanted to prove people with a clean…Written on Monday, 04 March 2024 16:17 in Editorials Read 1509 times Read more...
-
To Release or not to Release a PoC or OST That is the Question
Written by Sean KalinichThere is (and always has been) a debate about the ethics and impact of the release of Proof-of-Concept Exploit for an identified vulnerability and Open-Source…Written on Monday, 26 February 2024 13:05 in Security Talk Read 1057 times Read more...
-
There was an Important Lesson Learned in the LockBit Takedown and it was Not About Threat Groups
Written by Sean KalinichIn what could be called a fantastic move, global law enforcement agencies attacked and took down LockBit’s infrastructure. The day of the event was filled…Written on Thursday, 22 February 2024 12:20 in Security Talk Read 907 times Read more...
-
NetSPI’s Offensive Security Offering Leverages Subject Matter Experts to Enhance Pen Testing
Written by Sean KalinichBlack Hat 2023 Las Vegas. The term offensive security has always been an interesting one for me. On the surface is brings to mind reaching…Written on Tuesday, 12 September 2023 17:05 in Security Talk Read 2079 times Read more...
-
Black Kite Looks to Offer a Better View of Risk in a Rapidly Changing Threat Landscape
Written by Sean KalinichBlack Hat 2023 – Las Vegas. Risk is an interesting subject and has many different meanings to many different people. For the most part Risk…Written on Tuesday, 12 September 2023 14:56 in Security Talk Read 1793 times Read more...
-
Microsoft Finally Reveals how they Believe a Consumer Signing Key was Stollen
Written by Sean KalinichIn May of 2023 a few sensitive accounts reported to Microsoft that their environments appeared to be compromised. Due to the nature of these accounts,…Written on Thursday, 07 September 2023 14:40 in Security Talk Read 2064 times Read more...
-
Mandiant Releases a Detailed Look at the Campaign Targeting Barracuda Email Security Gateways, I Take a Look at What this all Might Mean
Written by Sean KalinichThe recent attack that leveraged a 0-Day vulnerability to compromise a number of Barracuda Email Security Gateway appliances (physical and virtual, but not cloud) was…Written on Wednesday, 30 August 2023 16:09 in Security Talk Read 2051 times Read more...
-
Threat Groups Return to Targeting Developers in Recent Software Supply Chain Attacks
Written by Sean KalinichThere is a topic of conversation that really needs to be talked about in the open. It is the danger of developer systems (personal and…Written on Wednesday, 30 August 2023 13:29 in Security Talk Read 1824 times Read more...
Recent Comments
- Sean, this is a fantastic review of a beautiful game. I do agree with you… Written by Jacob 2023-05-19 14:17:50 Jedi Survivor – The Quick, Dirty, and Limited Spoilers Review
- Great post. Very interesting read but is the reality we are currently facing. Written by JP 2023-05-03 02:33:53 The Dangers of AI; I Think I Have Seen this Movie Before
- I was wondering if you have tested the microphone audio frequency for the Asus HS-1000W? Written by Maciej 2020-12-18 14:09:33 Asus HS-1000W wireless headset impresses us in the lab
- Thanks for review. I appreciate hearing from a real pro as opposed to the blogger… Written by Keith 2019-06-18 04:22:36 The Red Hydrogen One, Possibly One of the Most “misunderstood” Phones Out
- Have yet to see the real impact but in the consumer segment, ryzen series are… Written by sushant 2018-12-23 10:12:12 AMD’s 11-year journey to relevance gets an epic finish.
Most Read
- Microsoft Fail - Start Button Back in Windows 8.1 But No Start Menu Written on Thursday, 30 May 2013 15:33 in News Be the first to comment! Read 116470 times Read more...
- We take a look at the NETGEAR ProSafe WNDAP360 Dual-Band Wireless Access Point Written on Saturday, 07 April 2012 00:17 in Pro Storage and Networking Be the first to comment! Read 87374 times Read more...
- Synology DS1512+ Five-Bay NAS Performance Review Written on Tuesday, 12 June 2012 20:31 in Pro Storage and Networking Be the first to comment! Read 81926 times Read more...
- Gigabyte G1.Sniper M3 Design And Feature Review Written on Sunday, 19 August 2012 22:35 in Enthusiast Motherboards Be the first to comment! Read 80249 times Read more...
- The Asus P8Z77-M Pro Brings Exceptional Performance and Value to the Lab Written on Monday, 23 April 2012 13:02 in Consumer Motherboards Be the first to comment! Read 70880 times Read more...
New Trustwave Security Intelligence Dashboard Bolsters Enterprise Visibility into Threats and Vulnerabilities
Written by Sean KalinichReading time is around minutes.
New Trustwave Security Intelligence Dashboard Bolsters Enterprise Visibility into Threats and Vulnerabilities
Enhancements to the TrustKeeper Managed Security Services Portal Benefits Everyone from the CISO to Local IT Managers across Distributed Enterprises
CHICAGO – July 9, 2015 – Trustwave® today announced a major enhancement to the company’s managed security services portal designed to give distributed, complex enterprises more actionable threat intelligence so they can better detect and protect themselves from security incidents, vulnerabilities and data breaches.
Available as part of the Trustwave TrustKeeper® managed security services portal, Trustwave Enterprise View brings order to the multitude of data inputs that make up today’s modern security reality. It gives security teams better visibility into areas not normally covered by security information and event management (SIEM) solutions. With Trustwave Enterprise View, everyone from the CISO to the local IT manager in an organization benefits from customized views designed specifically for their role in the organization. Roles include:
- Chief Information Security Officers (CISOs) -- CISOs need a broad view of the overall organization to be able to report on vulnerability scanning and remediation. With Enterprise View, CISOs can now view vulnerability scan results as well as the historical trend of vulnerability remediation. It also allows CISOs to drill down in greater detail on specific business locations or vulnerabilities.
- Regional Information Technology Teams – At the regional level, understanding how each region is doing and the ability to focus on individual regions is critical. A Regional Director can use Enterprise View to measure new regions as they come online, and identify whether they are meeting corporate security and performance metrics.
- Local Information Technology (IT) Teams – Local IT managers, who can have hundreds of devices to manage, now have visibility into device scan status so they can ensure identified vulnerabilities are remediated as soon as possible. Enterprise View allows local IT managers to easily maintain visibility into all tickets relevant to their piece of the larger organization, track their progress and manage the overall volume against corporate security metrics.
“With Enterprise View, Trustwave offers increased visibility to help enterprises address their security challenges across their distributed organization whether it’s around the block or around the world,” said John Amaral, senior vice president of Product Management at Trustwave. “Contextualized visibility into areas like support tickets and their response and resolution time, overall device availability, recent vulnerability scan results, and many more security-critical metrics are just the beginning of what makes Trustwave Enterprise View an indispensable part of an organization’s security infrastructure.”
With more than 25 data sources to choose from, seven different overview panels, and distinct views into devices, incidents and data sources, Trustwave Enterprise View allows for the creation of the customized security business intelligence dashboards each role requires. With data that maps to organizational hierarchies, staff can see exactly what they need and drill down to the details. Hierarchies relate to information across the organization and multiple security applications – facilitating more rapid decision making. Access can be limited to specific locations within the Enterprise View hierarchy, so that IT pros can focus on their areas of control. From CISOs to local IT managers, Trustwave Enterprise View provides the visibility required to stay ahead of today’s security challenges.
Trustwave TrustKeeper is more than just an intuitive, easy-to-use portal that offers unique visibility into and control of information security. Behind the scenes, TrustKeeper is Trustwave’s cloud-based gateway to a powerful technology platform that unifies the company’s on demand threat, vulnerability and compliance management services.
Learn more about Trustwave TrustKeeper managed security services portal, including the new Enterprise View application, at: https://www.trustwave.com/Services/Managed-Security/Trustkeeper/.
About Trustwave
Trustwave helps businesses fight cybercrime, protect data and reduce security risk. With cloud and managed security services, integrated technologies and a team of security experts, ethical hackers and researchers, Trustwave enables businesses to transform the way they manage their information security and compliance programs. More than three million businesses are enrolled in the Trustwave TrustKeeper® cloud platform, through which Trustwave delivers automated, efficient and cost-effective threat, vulnerability and compliance management. Trustwave is headquartered in Chicago, with customers in 96 countries. For more information about Trustwave, visit https://www.trustwave.com.
###
Follow Trustwave on Twitter at www.twitter.com/Trustwave, on LinkedIn at www.linkedin.com/companies/Trustwave, and on Facebook at www.facebook.com/Trustwave. All trademarks used herein remain the property of their respective owners. Their use does not indicate or imply a relationship between Trustwave and the owners of such trademarks.
Latest from Sean Kalinich
- ConnectWise Slash and Grab Flaw Once Again Shows the Value of Input Validation We talk to Huntress About its Impact
- Social Manipulation as a Service – When the Bots on Twitter get their Check marks
- To Release or not to Release a PoC or OST That is the Question
- There was an Important Lesson Learned in the LockBit Takedown and it was Not About Threat Groups
- NetSPI’s Offensive Security Offering Leverages Subject Matter Experts to Enhance Pen Testing
Leave a comment
Make sure you enter all the required information, indicated by an asterisk (*). HTML code is not allowed.