Trustwave Unified Threat Management
Protect your network with Unified Threat Management (UTM) from Trustwave managed services.
Network perimeter security is a cornerstone of an effective information security program. Firewalls and Unified Threat Management provide the foundation necessary to protect your organization’s data, network and critical assets from outside intruders and threats. Yet, many organizations continue to be challenged by managing network security in-house, due to the heavy burden of day-to-day management requirements and rising costs.
Overview:
Protect your network with Unified Threat Management (UTM) from Trustwave managed services. Trustwave UTM provides a comprehensive set of integrated network security technologies designed to defend against external threats, while also offering protective measures from the inside of the network out.
UTM also provides rogue device detection and internal vulnerability scanning consolidated into a single appliance and delivered by Trustwave as a fully managed service.
Trustwave Managed UTM services reduce the burden of network security management, eliminate fragmented network security controls and conform to compliance and audit requirements. As a fully managed solution, Trustwave Unified Threat Management extends well-beyond traditional services found in competing offerings.
As a fully managed solution, Trustwave Unified Threat Management extends well-beyond traditional services found in competing offerings by providing:
Five Security Operations Centers that provide around the clock support, staffed with security experts who have in-depth knowledge and experience working with complex network environments for highly distributed environments. Save time and money while reducing your burden.
Integrated threat intelligence from SpiderLabs, the Trustwave advanced security research team. Let our team of experts worry about your security so you don’t have to. Increase your uptime by preventing security infections and keeping malware out.
Compliance help for any of a number of regulations and industry compliance standards including PCI, FFIEC/GLBA, SOX, and HIPAA, and more. We have deep expertise in compliance and can help you navigate the complexity of mandates.
Zero capital investment with long-term reduced, predictable costs.
Features:
The Trustwave Managed UTM service includes the following component support:
- Stateful Firewall
- Deep Inspection Intrusion Prevention
- Web & Email Anti-Virus
- Web Content Filtering
- Rogue Device and Wireless Access Point Detection
- Internal Vulnerability Scanning
- Virtual Private Networking
- Wi-Fi Hotspot
Visibility into the Trustwave UTM service is provided by our award-winning TrustKeeper cloud portal, which provides:
- Easy reporting access for security status and service performance
- Log and event data provide support for compliance and audit needs
- Convenient access from any web browser
How It Works
Trustwave Architecture
All Trustwave technologies are built on our scalable and extensible Trustwave Architecture, which includes TrustOS™ and TrustedSentry™. TrustOS is the common software platform that unifies all of our products. TrustedSentry is our standardized hardware model. Together, the Trustwave Architecture delivers greater efficiency by allowing for easy scaling and rapid integration across our products, as well as third-party solutions.
TrustKeeper Cloud Platform
Visibility into Trustwave services are provided by our award-winning TrustKeeper cloud portal, delivering:
- Easy reporting access for security status and service performance
- Log and event data provide support for compliance and audit needs
- Convenient access from any web browser
Documentation:
Download the Trustwave Unified Threat Management Datasheet (PDF).