Truemag

  • Subscribe
    • New Subscription
    • Account Updates
    • Customer Service
  • News & Events
    • News
    • Events
  • Advertise
    • Media Kit
    • Reprints
    • Contacts
  • Editorial
    • Podcasts
    • Current Articles
    • Digital Editions
    • eNewsletter
    • Editor’s Desk
    • Edit Calendar
    • Contacts
  • Buyers Guide
    • Search
    • Sponsor Index
    • Vendor Update
  • Annual Software Ranking
    • Ranking Form
    • Annual Software Ranking
    • 2018 Software Ranking File Package

Trustwave Announces Internet of Things Services to Help Manufacturers and Businesses Strengthen Security

07.22.2015

Trustwave today announced expanded security services that help manufacturers and business users of “internet of things” (IoT) technologies, devices and applications, to more efficiently and pro-actively identify and remediate IoT related threats and vulnerabilities. From the device to the cloud, application and back, Trustwave Managed IoT Security allows organizations to test, monitor and secure the entire IoT environment.

Gartner, Inc. forecasts that 4.9 billion connected things will be in use in 2015, up 30 percent from 2014, and will reach 25 billion by 2020.[1] But security often remains an afterthought for new IT projects including the internet of things. According to the 2015 Security Pressures Report from Trustwave, a survey of 1,016 information security professionals, 77 percent of respondents said they had been pressured to unveil IT projects that were not security ready. And, 98 percent of applications tested by Trustwave in 2014 had at least one vulnerability.

“As everyday objects connect to the network, IT teams struggle to manage assets and attack vectors previously outside their purview,” said Steve Kelley, Senior Vice President of Product and Corporate Marketing at Trustwave. “Manufacturers of those products also struggle with getting them out to market on time while ensuring security. Trustwave’s Managed IoT Security helps both parties overcome those challenges by identifying and remediating security weaknesses within the products and ecosystem surrounding them in addition to round the clock monitoring to detect and deflect a breach.”

Preventing IoT-related data breaches is two-fold – technology manufacturers must incorporate security in their IoT products and the infrastructure surrounding them, and businesses that use IoT technologies must effectively monitor the ecosystem of databases, networks and web and mobile applications supporting those devices. Trustwave Managed IoT Security fulfills both of those requirements.

  • Incorporating Security into IoT Infrastructure: Developers and providers of IoT products and services use Trustwave Managed IoT Security to find weaknesses in embedded devices, back-end services and the connections in between. Trustwave’s elite team of SpiderLabs® ethical hackers attempt to compromise devices by exploiting vulnerabilities in the hardware, software and the manufacturers’ servers that are the conduit between IoT devices and applications.
  • Monitoring Security of IoT Ecosystem: IT professionals integrating IoT products and services into their operations decrease the likelihood of a breach of those assets with Trustwave Managed IoT Security. From actionable findings to real-time monitoring and advanced security services, Trustwave Managed IoT Security protects organizations from the security challenge brought about by the onslaught of new, and unusual, devices. Businesses can access Trustwave’s Managed IoT Security services through the company’s cloud-based portal, Trustwave TrustKeeper®.

 

trustwave.com

Jul 22, 2005Cassie Balentine
Reltio Cloud 2015.2 Improves Business Productivity, IT Operating Efficiency, and ComplianceDescartes Acquires BearWare, Inc.
Product Centrics
TrueNAS Open Source Storage Platform brings Full Windows ACL Support to Linux

Fully featured Windows file system ACLs are well supported in TrueNAS 12.0 (CORE and Enterprise), but not generally supported by Linux. Thanks to some innovation, and sweat from the iXsystems engineering team, TrueNAS SCALE 21.08...

Driving Successful Digital Transformation Initiatives in 2022

Well, the end of the year is the perfect time to reflect on all the past year's activities and plan for the coming year. As we plan for 2022, one thing...

Recovery Platforms

Established in 2013, Imanis Data, previously Talena...

Data Driven Efficiency

Founded in 2003, Tableau is a public software company...

Updated Hitachi CRM

Building Product Manufacturers (BPM) require...

Quick Links
Untitled Document
SW500 SW500 SW500 SW500 SW500
2022 © Rockport Custom Publishing, LLC