Posted by: RAH Infotech | June 21, 2012

Trustwave Takes On Targeted Attacks with New Security Solutions

New and enhanced solutions offer a multi-pronged approach to protect against targeted malware

Trustwave, a leading provider of cloud-based compliance and information security solutions, today unveiled new and enhanced security solutions that help organizations protect against the growing number of stealthy and sophisticated targeted cyber security attacks.

Trustwave has enhanced its award-winning Secure Web Gateway, Secure Email Gateway, Network Access Control (NAC), Managed Unified Threat Management (UTM) and File Integrity Monitoring products, while also delivering the new Trustwave Vulnerability Manager. These Trustwave solutions prevent malware from entering the environment by detecting attacks through the Web and email, stop the propagation of malware from compromised devices and stop the infection of other devices.

Using social media sites like LinkedIn, cybercriminals can easily identify individuals within organizations that most likely have access to confidential data. Once attackers have found their target, they employ sophisticated methods to exploit holes in an organizations’ security posture while remaining undetected as they steal information. As reported in the Trustwave 2012 Global Security Report, attackers had an average of 173.5 days in their target’s environment before detection and 84 percent of organizations were unable to self-detect a data breach.

That dismal level of detection and protection of malware has a high cost. A recent Ponemon study that surveyed more than 2,500 C-level and IT security personnel from around the world, reported that targeted attacks cost enterprises an average of $214,000, with most of the cost related to “forensic investigation, investments in technology and brand recovery costs.

To read more, click here.

For enquiries, please contact: RAH Infotech | Email: marcom@rahinfotech | URL:


Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Google+ photo

You are commenting using your Google+ account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )


Connecting to %s


%d bloggers like this: