This site uses cookies. By continuing to browse this site you are agreeing to our use of cookies. Find out more.X

Trustwave launches SIEM solution

Share this article:

Trustwave has announced the launch of new security information and event management (SIEM) software to bring together data correlation and reporting.

Named the Trustwave SIEM Enterprise, the company said that it brings together advanced data correlation and threat intelligence with pre-configured rule and role-based controls and reporting.

According to the company, Trustwave SIEM Enterprise also includes extensive third-party device support, hundreds of pre-packaged security and compliance reports, advanced threat correlation and intelligence feeds, and Big Data processing power.

Leo Cole, general manager of security solutions at Trustwave, said: “Today's security professionals are demanding more value and manageability out of SIEM. They need to advance from traditional log management to more sophisticated threat correlation, improved security intelligence and sustainable risk management, without the deployment and management complexity that often turns traditional SIEM tools into ‘shelf-ware.'

“Trustwave SIEM Enterprise gives security analysts the power to do what they've wanted to do with SIEM but couldn't before due to complexity and limited resources.”

Share this article:

SC webcasts on demand

This is how to secure data in the cloud


Exclusive video webcast & Q&A sponsored by Vormetric


As enterprises look to take advantage of the cloud, they need to understand the importance of safeguarding their confidential and sensitive data in cloud environments. With the appropriate security safeguards, such as fine-grained access policies, a move to the cloud is as, or more, secure than an on-premise data storage.


View the webcast here to find out more

More in News

Researcher develops BadUSB code to compromise USB sticks - and their computer hosts

Researcher develops BadUSB code to compromise USB sticks ...

Karsten Nohl also reveals how an enhanced security approach can beat his USB architecture compromise.

Cybercrime threat landscape evolving rapidly

Cybercrime threat landscape evolving rapidly

New research claims to show that, whilst spam levels fell to a five-year low last month, the increasing complexity of cyber-criminal attacks shows no sign of easing, with increasing levels ...

Tor Project unearths attack that identifies users

Tor Project unearths attack that identifies users

Users of The Onion Router (TOR) network have been warned of an attack that could deanonymise them if they used the service from February to July this year.