On-demand penetration testing

Trustwave has rolled out a new subscription-based, penetration testing service that can more efficiently and regularly identify security weaknesses within networks and applications so businesses can make improvements that better protect themselves from cybercrime, data loss and other security risks.

  • Thursday, 3rd October 2013 Posted 11 years ago in by Phil Alsop

With the new service, Trustwave Managed Security Testing, businesses can schedule, manage and adjust penetration tests based on their business priorities and security needs using a cloud-based portal. More frequent penetration testing helps businesses keep up with the ever-changing threat environment so that they stay a step ahead of emerging threats.


Trustwave Managed Security Testing is available to the more than two million businesses enrolled in the Trustwave TrustKeeper® cloud and managed security services platform, as well as new penetration testing customers. TrustKeeper is the portal through which businesses access a variety of subscription-based Trustwave offerings ranging from enterprise-grade managed security services to compliance and security automation tools for small- and medium-sized businesses. Trustwave continues to expand the portfolio of services available through TrustKeeper to deliver automated, sustainable and cost-effective data protection, risk management and threat intelligence to businesses globally.


“Today’s threats are stealthier and more hostile than ever so businesses must consistently update their security plans to stay in front of potential attacks. With mere point-in-time testing—testing that occurs just once or twice a year—businesses could unknowingly leave a network or application exposed to an attacker and possibly face a costly, damaging attack,” said Andy Bokor, General Manager, Threat Intelligence & Research at Trustwave. “With Trustwave Managed Security Testing, we leverage our cloud-based TrustKeeper platform to help customers more easily tap our security testing tools augmented by our ethical hackers to address complex attack scenarios, find vulnerabilities within their security, and remediate those vulnerabilities to strengthen their overall security posture.”