We understand that information relating to your company, clients, and cases is extremely sensitive and confidential, which is why our number one priority is making sure that your data is safe and secure. We've gone to great lengths to ensure that our network and applications are regularly updated, tested, and independently audited to protect you from the latest threats and intrusions.
All web traffic in and out of the Trackops network is encrypted using high grade 256-bit TLS 1.2+ encryption. Unencrypted traffic is not permitted under any circumstance. In addition, outgoing email transmissions sent from Trackops are sent via TLS, ensuring your communication is secure.
Trackops scans all incoming traffic for potential threats in real time. Our Level 1 PCI-certified firewall ensures that Trackops is always protected against any type of application layer hacking attempt (e.g. SQL injection, cross site scripting, illegal resource access, and other top 10 OWASP threats). In addition, incoming traffic is also scanned for bad bots and backdoor access attempts.
Trackops utilizes active DDoS protection to mitigate denial of service attacks in real time. Our protection leverages a many-to-many defense methodology, automatically detecting and mitigating advanced DDoS attacks that exploit application and web server vulnerabilities, hit-and-run DDoS events, and large botnets.
Your data is important, which is why we protect it both in transit and in storage. All data stored in our databases and cloud storage are backed up, distributed, and encrypted at rest using industry standard AES-256 encryption.
Trackops retains third party independent penetration testing partners to test and probe both our network and applications. Our professional and experienced penetration testers use both automated and manual testing techniques to ensure our security is in top shape.
Trackops conducts routine vulnerability scans against our network and applications to ensure protection from the latest threats, including thousands of vulnerability signatures and those listed in the OWASP Top 10.
Trackops routinely conducts third party SOC 2 Type II audits to validate application security and corporate governance. Auditors are tasked with inspecting and validating Trackops' security controls and operational policies throughout the organization.
Trackops offers a number of security features such as role based access, multi-factor authentication (MFA), mandatory password rotation and strong password rules. Easily disable or remove user access with the click of a button, and use reporting tools to find stale accounts and passwords or non-compliant staff.