Feeds

Trustwave gobbles up Application Security, gorges itself on tech

Fighting cybercrime, protecting data. Yo!

Beginner's guide to SSL certificates

Data security biz Trustwave has acquired fellow data security provider Application Security, a startup that specialises in automated database security scanning technologies.

Financial terms of the deal, announced on Monday, were undisclosed.

Privately-held Application Security develops security software for relational databases and big data stores that helps its enterprise customers uncover critical configuration mistakes and other toxic combinations of settings that could lead to denial-of-service attacks, unauthorised data modification or data breaches.

Trustwave said acquiring Application Security will allow it to enhance its existing range of corporate compliance services as well as developing technologies to protect high-value data, and reduce security risks.

Trustwave plans to integrate Application Security's DbProtect and AppDetectivePRO products into its portfolio of information security, compliance management and threat intelligence products and services. Application Security's technology will be used to augment Trustwave’s existing managed security services as well as providing the combined firm will the ability to extend protection of data and management of threats across endpoints, networks, applications and databases.

"By joining forces with Application Security, Trustwave can help customers strengthen security across their environment—from the network, applications, Web, and down to the data itself—so they can more effectively fight cybercrime, protect data and reduce security risks,” said Trustwave chairman and chief exec Robert J. McCullen in a canned statement. ®

Choosing a cloud hosting partner with confidence

More from The Register

next story
Bladerunner sequel might actually be good. Harrison Ford is in it
Go ahead, you're all clear, kid... Sorry, wrong film
Musicians sue UK.gov over 'zero pay' copyright fix
Everyone else in Europe compensates us - why can't you?
I'll be back (and forward): Hollywood's time travel tribulations
Quick, call the Time Cops to sort out this paradox!
Euro Parliament VOTES to BREAK UP GOOGLE. Er, OK then
It CANNA do it, captain.They DON'T have the POWER!
Megaupload overlord Kim Dotcom: The US HAS RADICALISED ME!
Now my lawyers have bailed 'cos I'm 'OFFICIALLY' BROKE
Forget Hillary, HP's ex CARLY FIORINA 'wants to be next US Prez'
Former CEO has political ambitions again, according to Washington DC sources
prev story

Whitepapers

Designing and building an open ITOA architecture
Learn about a new IT data taxonomy defined by the four data sources of IT visibility: wire, machine, agent, and synthetic data sets.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
5 critical considerations for enterprise cloud backup
Key considerations when evaluating cloud backup solutions to ensure adequate protection security and availability of enterprise data.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Driving business with continuous operational intelligence
Introducing an innovative approach offered by ExtraHop for producing continuous operational intelligence.