FORGOT YOUR DETAILS?

Trustwave

Trustwave Holdings is a information security company that provides on demand data security, compliance and threat intelligence solutions and services to more than 2.5 million business customers in 96 countries.The company’s international headquarters is located in downtown Chicago, and regional offices are located in London, São Paulo, and Sydney. The company also operates Security Operations Centers in Chicago, Denver, Manilla, Minneapolis, and Warsaw. Trustwave is currently the only company that is an authorized PCI Forensic Investigator in all geographic regions.

E-SPIN and Trustwave

E-SPIN business with Trustwave start long before with Application Security Inc (AppSec - databse security - database vulnerability assessment, database activity monitoring). AppSec is take over by Trustwave (Nov 2013), so did E-SPIN continue existing business from AppSec to Trustwave. E-SPIN have actively in promoting Trustwave full range of products and technologies as part of the company Vulnerability Management, Security Management, Application Life Cycle (ALM) Virtualization Management solution portfolio. E-SPIN is active in provide consulting, supply, training and maintaining Trustwave products for the enterprise, government and military customers (or distribute and resell as part of the complete package) on the region E-SPIN do business. The enterprise range from university, corporate, government agencies to IT security professionals / analysts on the web application security or cyber security / cyber warfare /military defense applications.

Please feel free to contact E-SPIN for your inquiry and requirement, so we can assist you on the exact requirement in the packaged solutions that you may required for your operation or project needs.

AppDetectivePRO Product Overview

Databases are an enticing target for cyber criminals, and many organizations fall short in protecting these critical repositories of customer information and intellectual property. AppDetectivePRO is database vulnerability assessment software that businesses use to identify and remediate vulnerabilities, configuration errors, rogue installations and access issues in their database deployments.

Overview

Trustwave AppDetectivePRO is a database and big data store scanner that can immediately uncover configuration mistakes, identification and access control issues, missing patches or any toxic combination of settings that could lead to escalation-of-privilege or denial-of-service attacks, data leakage or unauthorized modification of data.

Because of its simple setup and intuitive interface, you don't have to be a database expert to use it. Immediately discover, assess and report on the security, risk or compliance posture of any database or big data store within your environment – either on premise or in the cloud – within minutes.

The quality of a database security solution directly correlates with the quality of its checks and tests. And a set of tests and checks is only as good as the research team that keeps it current. Trustwave SpiderLabs® is the leading database vulnerability research team in the industry and discovered 80 percent of the database vulnerabilities patched over the past four years. Our experts have discovered and reported hundreds of vulnerabilities in Oracle databases and dozens in Microsoft SQL Server, IBM DB2, MySQL, Sybase ASE and Hadoop.

AppDetectivePRO is equipped to fit your organization, no matter its shape or size. This includes:

Enterprises

  • Even some of the largest companies struggle with the maturity of their IT security programs. AppDetectivePRO helps solve this challenge by providing an easy-to-install scanner that can point to network segments, discover databases, scan them, find their issues, report on them and help remediate any discovered deficiencies.

Small and Midsize Businesses

  • When your IT staff is also your IT security staff, you need to automate scans. You also require best-of breed tools to help you uncover and repair weaknesses. No matter how small a database deployment you have, AppDetectivePRO offers security knowledge and an automated way to discover shortfalls – without the need to be an expert in database security.

Security Auditors and Risk Practices

  • AppDetectivePRO has long been used by security consultants to complete tasks such as compliance assessments and risk evaluations. These professionals recognize the database as a mission-critical asset that must be reviewed for vulnerabilities and other issues.

Supported Database Types

Why do our customers choose AppDetectivePRO for their database security needs?

Complete, Accurate and Intuitive

Discover new or rogue installations, develop security policies, perform safe penetration tests, audit for policy violations and deliver comprehensive reports on the security of your data stores from every possible angle.

Soup-to-Nuts Remediation

Facilitate action, from discovery to repair of any identified vulnerability or policy violation.

Flexible and Easy to Use

Agentless and doesn't rely on database administrator (DBA) expertise or privileges. It also features industry standard interfaces to integrate with existing security and IT operation solutions, and meets Common Vulnerabilities and Exposures (CVE) compatibility requirements.

Security, Compliance and Risk Reports

Creates or customizes a questionnaire from prepackaged security controls that are based on common industry standards and regulations. Questionnaire results are presented along with assessment results for a complete end-to-end report on the data store being reviewed.

Data Security Knowledge Base

Acquire extensive and continuously updated analytics of relational databases and big data security best practices, configuration settings and vulnerabilities.

Features

Discover

Review: Seamlessly survey your environment's accessible assets, user access levels and security feature usage.
Inventory: Identify and highlight recently added, rogue or missing data store installations and objections.
Verification: Quickly ascertain the configuration state of all of your data stores (relational or big data).

Assess and Monitor

Flexibility: Obtain an agentless assessment approach with no impact on the target data store.
Reference Center: Access a comprehensive and continuously updated library of relational database and big data store vulnerability and security configuration issues – backed by our elite SpiderLabs research team.
Customization: Examine data stores for issues related to vulnerabilities, misconfigurations and user rights, thanks to built-in, personal policies.

Report

Visibility: Gain a consolidated view of vulnerabilities, threats, risks and compliance efforts across varied data store environments – through reports and dashboards.
Empowerment: Document your current status, and demonstrate progress, effectiveness and operational efficiency.
Granular: Evaluate trends and drill down for a comprehensive view of each individual database or group of databases.

How It Works

Dig Deeper Into the Results
You're able to see scan results ordered by risk level for each asset and a complete knowledge base article about each finding.

Analyze Your Scan
View all of the assets you discovered in your session and a graphical representation of results from your latest scan.

Uncover Actionable Findings
Summary reports provide detailed information about each vulnerability unearthed during the scanning process.

DbProtect Product Overview

Databases are a prime target for attackers due to the amount of sensitive information they store such as customer information, intellectual property and proprietary secrets. Yet many businesses fall victim to database intrusions because of common flaws. Trustwave DbProtect is database security software that helps businesses prevent database breaches with database activity monitoring (DAM) and vulnerability assessment.

Along with DAM, DbProtect can perform blocking, locking and termination functions when malicious activity is detected. DbProtect’s assessment capabilities include identifying database vulnerabilities, configuration errors, rogue installations, and access issues.

Overview

Trustwave DbProtect is a security platform designed for consistent monitoring and management of enterprise databases within the data center.

Built on a centrally managed and distributed architecture, DbProtect uncovers database weaknesses. This includes configuration mistakes, identification and access control issues, missing patches, or any toxic combination of settings that could lead to escalation of privileges attacks, data leakage, denial-of-service (DoS), or unauthorized modification of data held within data stores – both relational databases and big data stores.

Through its multi-user/role-based access, distributed architecture and enterprise-level analytics and reporting, DbProtect enables organizations to secure all of their relational databases and big data stores throughout their environment (on premise or in the cloud) and achieve business objectives.

The quality of a database security solution directly correlates with the quality of its checks and tests. And a set of tests and checks is only as good as the research team that keeps it current. Trustwave SpiderLabs® is the leading database vulnerability research team in the industry and discovered 80 percent of the database vulnerabilities patched over the past four years. Our experts have discovered and reported hundreds of vulnerabilities in Oracle databases and dozens in Microsoft SQL Server, IBM DB2, MySQL, Sybase ASE and Hadoop.


Why do our customers choose DbProtect for their enterprise database security needs?

Complete, Accurate and Intuitive

Discover new or rogue installations, develop security policies, perform safe penetration tests, audit for policy violations and deliver comprehensive reports on the security of your data stores from every possible angle.

Distributed Architecture

Meets the scalability demands of large organizations with thousands of data stores. Distributed management and scheduling features enable an enterprise to assign and schedule remote engines to scan, and pull those results back to a central management console for analysis. The web-based user interface is designed for multi-tenancy and ensures database reviews are segmented.

Configurable Policies

Create policies ranging from all-encompassing to customized, depending on the specific needs of a business unit or workgroup. Multiple policies can be used to accommodate an organization's various business, security and compliance needs.

Comprehensive Reporting

Able to produce hundreds of reports for all levels of the organization. Reports offer different level of summary and detail depending on the audience level – and can include compliance, security, trend (risk calculation over time) and operational (inventory of databases and their populations) information.

Soup-to-Nuts Remediation Guidance

Facilitates delegating efforts to address open issues, policy violations or vulnerabilities across your organization. Then, automatically forwards reports to respective administrators for immediate action.

Database Activity Monitoring

Identifies and alerts on unusual or suspicious behavior to help correlate with other network events.

Compatible and Complementary

Easily layer DbProtect into your existing security management, risk mitigation and compliance efforts.

Data Security Knowledge Base

Acquire extensive and continuously updated analytics of relational databases and big data security best practices, configuration settings and vulnerabilities.


Supported Database Types


Features

Discover
Review: Seamlessly survey your environment's accessible assets, user access levels and security feature usage.

Inventory: Identify and highlight recently added, rogue or missing data store installations and objections.

Verification: Quickly ascertain the configuration state of all of your data stores (relational or big data).

Assess and Monitor
Flexibility: Obtain an agentless assessment approach with no impact on the target data store.

Reference Center: Access a comprehensive and continuously updated library of relational database and big data store vulnerability and security configuration issues – backed by our elite SpiderLabs research team.

Activity Monitoring: Maximize the depth and breadth of intrusion detection and activity auditing through a hybrid architecture that examines any access to confidential information in your database.

Report
Visibility: Gain a consolidated view of vulnerabilities, threats, risks and compliance efforts across varied data store environments – through reports and dashboards.

Empowerment: Enables users to document their current status, and demonstrate progress, effectiveness and operational efficiency.

Granular: Evaluate trends and drill down for a comprehensive view of each individual database or group of databases.


How Its Works

One of the main dashboards for vulnerability scanning chronicles findings by risk and illustrates them through trending graphs.

The DbProtect Asset Management system allows users to access to the databases they only need to see. A role-based access control component ensures different access depending on one’s role.

The Asset Inventory dashboard allows users to see all the databases within their organizational view. They can track which assets are scanned versus not scanned, as well as the breakdown of asset types discovered on their network segmentation.

An easy-to-decipher dashboard presents real-time activity analysis that maximizes protection and limits false positives.

 

http://www.e-spincorp.com/contact-us/
Trustwave Endpoint Protection Suite (EPS) delivered from the cloud is designed to address all of these things. By delivering via the cloud, Trustwave Endpoint Protection Suite reduces deployment time and upfront costs for distributed endpoint security across your laptops, tablets, mobile or fixed POS systems and other devices. By integrating core endpoint protection functions, Trustwave
Trustwave Vulnerability Management Product Overview by E-SPIN
Trustwave Vulnerability Management allows you to manage a prioritized list of vulnerabilities, understand how to fix them and produce reports detailing and verifying your remediation progress over time. Trustwave Vulnerability Management offers you a front-row view into the systems, applications and databases residing on your network and how those assets may be vulnerable to attack.
Trustwave Application Scanning Product Overview by E-SPIN
Protect all of your web and mobile applications with comprehensive vulnerability testing from Trustwave App Scanner’s family of solutions. Trustwave App Scanner automates the process of finding security vulnerabilities in web applications and services. Its patented Hailstorm™ scanning engine contains an emulated browser, which traverses applications just as a user would. Hailstorm conducts mock “attacks”
Trustwave Web Application Firewall by E-SPIN
Trustwave Web Application Firewall is built on our scalable and extensible Trustwave Architecture, which includes TrustOS© and TrustedSentry. TrustOS is the common software platform that unifies all of our products. TrustedSentry is our standardized hardware model. Together, the Trustwave Architecture delivers greater efficiency by allowing for easy scaling and rapid integration across our products, as
Getting started with Database Security couldn’t be easier. Read this book to: Find out what Database Security is all about Understand Database Security process, architecture, tools Learn how to secure databases Audit User Activities in Oracle, Microsoft SQL, IBM DB2 Linux/UNIX/Windows (LUW), IBM DB2 z/OS, Sybase ASE, MySQL, Lotus Notes/Domino Developing database security plan How
TOP