October/November 2015 Digital Edition
Digital Version of July/August 2015
June/July 2015 Digital Edition
Digital Version of May/June 2015
Trustwave SIEM earns Common Criteria validation
Trustwave, a provider of cloud-based compliance and information security solutions, announced on Oct. 9 that its Trustwave SIEM (Security Information and Event Management) has achieved Common Criteria validation with the EAL 3+ level of assurance.
This accreditation demonstrates Trustwave's commitment to meeting the needs of federal, state and municipal government entities and enterprises worldwide by delivering a solution that meets stringent security standards, said the company in a news release.
Common Criteria is an internationally approved set of security standards that provides a clear and reliable evaluation of the security capabilities of Information Technology (IT) products. This framework provides confirmation that the development, evaluation and validation of an IT product has met specific security standards in accordance with an independent assessment accepted by the most security-conscious customers, such as federal governments.
The international scope of Common Criteria, currently adopted by 26 nations, allows users from other countries to purchase IT products with the same level of confidence, due to the recognition of the certification across the complying nations.
“The rigorous evaluations driven from the Common Criteria process help drive more adoption of industry-leading technologies, and we’re pleased to announce that Trustwave SIEM joins the list of security products evaluated under this important international standard,” said Philip Smith, senior vice president of government solutions at Trustwave. “Trustwave SIEM is not only used by enterprises and governments worldwide, we use Trustwave SIEM as the backbone to our expansive Managed Security Services offering. Available as a managed service, software or appliances, Trustwave SIEM provides effective and efficient log and event management, threat management, and incident response.”