Trustwave Government Solutions Database Security - Protecting Government Data

Relational databases and big data stores are a prime target for attackers due to the amount of sensitive and classified data residing within. Yet many government organizations fall victim to database intrusions because of common database flaws. To address their ever-expanding network perimeters that become more porous as they swell, government organizations need to push data security deeper. Reducing the risk of compromise and fulfilling compliance requirements (such as FISMA, STIG, RMF) requires extending data protection measures all the way through to the database.


When it comes to detecting compromises, organizations appear to be getting better at discovering breaches internally, as opposed to being notified by law enforcement or some other outside source. This is important because our data shows that incidents identified internally tend to have a much shorter dwell time. However, the global median dwell time from compromise to discovery is up from 99 days in 2016 to 101 days in 2017.

Addressing Continuous Diagnostics and Mitigation Requirements

Cyber-attacks on federal government networks are growing more sophisticated, frequent, and dynamic. It is paramount that the government protects networks, systems, and information – including citizen and mission data – from unauthorized access or disruption while providing essential services. Congress established the Continuous Diagnostics and Mitigation program (CDM) to provide a strong, consistent cyber defense designed to protect more than 70 civilian agency networks.

Government Security, Privacy and Compliance Start at the Endpoint

One universal priority among government agencies is the need to continuously improve security and achieve and maintain compliance. The cyberthreat landscape continues to grow not only in volume, but also variety of threats. Agencies have to rethink how they counter these threats; as traditional methods are no longer sufficient. Access control and continuous endpoint security are critical in this new and evolving situation. Download this solution brief to learn how ForeScout CounterACT can help with your agency’s cybersecurity programs