• darkblurbg

Co-sponsored by
AFCEA International
& U.S. Naval Institute

Register Exhibit Sponsor

Slide 1

Trustwave Government Solutions

Reston,  VA 
United States
  • Booth: 710


The leading provider of automated database & application vulnerability management solutions. Trustwaves "AppDetectivePro" and "DBProtect" solutions automates the security & compliance management of enterprise databases & applications. Whether preparing for an audit, needing to assess, baseline and report on STIG policy settings, Looking for: configuration mistakes, missing patches, erroneous user rights/permissions/access, etc,, our solutions will discover, assess, report and provide remediation


  • AppDetectivePro
    AppDetectivePRO is a database scanner that immediately uncovers configuration mistakes, identification & access control issues, missing patches, or any toxic combination of settings that could lead to...

    AppDetectivePRO: Agentless, Automated
    Data Scanning
    Through its simple setup and easy-to-use interface, you can
    immediately discover, assess, and report on the security, risk, or
    compliance posture of any database or Big Data store within your
    environment (on premise or in the cloud) in minutes.
    Complete, Accurate, and Intuitive Data
    Security Solution
    Automated inventory, testing, information gathering, and analysis
    empower you with the intelligence to harden the security of your
    data stores.
    Automated Data Security, Risk, and Compliance
    Questionnaire Development
    Create or customize from a number of prepackaged data
    security controls based on industry standards and regulatory
    Manage Data Security Assessment Results and
    Remediation Efforts
    Facilitates closing the loop from initial discovery of databases and
    Big Data stores to fixing the vulnerability or policy violation.
    Continuously Updated Data Security
    ASAP Updates - Extensive and continuously updated analytics
    and knowledgebase of relational databases and Big Data security
    best practices, configuration settings, and vulnerabilities.
    Our data security solutions provide a complete inventory of data
    stores along with their respective objects, users and enabled
    security features within your organization.
    • Easily review all of the accessible assets, user access levels,
    and security feature usage throughout your environment.
    • Identify and highlight recently added, rogue or missing data
    store installations and objects.
    • Quickly ascertain the configuration state of all your data
    stores (relational or Big Data)

    Our products examine
    relational databases
    and Big Data stores for
    configuration mistakes,
    identification and
    access control issues,
    missing patches, or
    any toxic combination
    of settings that could
    lead to escalation of
    privileges attacks, data
    leakage, denial of service
    (DoS), or unauthorized
    modification of data.
    We provide unique, agent-less, unauthenticated (network port
    inspection), and authenticated (credentialed) assessment
    approach with no impact on the target data store. This
    multifaceted approach provides an accurate assessment of the
    security of relational database or Big Data store.
    We also include a comprehensive and continuously updated
    library of relational database and Big Data store vulnerability and
    security configuration issues backed by SpiderLabs. Through
    built-in and customized policies, users can examine data stores
    for Vulnerability, Configuration, and User Rights issues.REPORT
    Our product reports and
    dashboards provide a
    consolidated view of
    vulnerabilities, threats, risks,
    and compliance efforts across
    heterogeneous data store
    environments. They empower
    organizations to document their
    current status, demonstrate
    progress, effectiveness, and
    operational efficiency. Through
    our reporting and analytics
    platform, organizations can
    evaluate trends, and drill down for
    a detailed view of each individual
    database, group of databases, or databases of specific business
    units or groups within the enterprise.
    • Intuitive, easy-to-configure and customize, rapidly
    • Supports business objectives that include enterprise security
    and financial risk posture, operational efficiency, regulatory
    compliance, and strategic planning