Trustwave

Computer and Network Security

Acquired by Cybereason
Chicago, United States Founded 1995
Total raised
Stage
Founded
1995
Headcount
1,113
HQ
Chicago, United States
Sector

About

Trustwave Holdings helps businesses fight cyber crime, protect data, and reduce security risk. With cloud and managed security services, integrated technologies, and a team of security professionals, ethical hackers, and researchers, the company provides solutions for businesses to manage their information security and compliance programs. Trustwave's research operations in Israel are the result of two acquisitions (Breach Security Inc in 2010 and M86 Security in 2012). Today, the companyhas an R&D center in cyber security, data protection, and security risk.Trustwave SpiderLabs, based in Chicago, has also a research group in the Israeli facility.

Company Intelligence Q&A

Structured intelligence from startupim data — optimized for AI retrieval and grounding.

When was Trustwave acquired and by which company?
Trustwave was acquired by Cybereason in November 2024.
What is Trustwave's primary business activity?
Trustwave specializes in computer and network security, helping businesses combat cyber crime, protect data, and mitigate security risks.
When was Trustwave founded?
Trustwave was founded in 1995.
How many employees does Trustwave have worldwide?
Trustwave has approximately 1,113 employees worldwide.
When did Trustwave establish its presence in Israel?
Trustwave established its presence in Israel in June 2010.
What was the first acquisition that contributed to Trustwave's research operations in Israel?
Trustwave acquired Breach Security Inc. in 2010, which was the first acquisition contributing to its Israeli research operations.
What was the second acquisition that expanded Trustwave's research operations in Israel?
Trustwave acquired M86 Security in 2012, further expanding its research operations in Israel.
Where is Trustwave's headquarters located?
Trustwave's headquarters is located in Chicago, Illinois, United States.

Tags

data-protectioncyber-security