Data & Security

We understand that information relating to your company, clients, and cases is extremely sensitive and confidential, which is why our number one priority is making sure that your data is safe and secure. We've gone to great lengths to ensure that our network, applications, and access points are regularly updated and tested to protect you from the latest threats and intrusions.

TLS Transport Encryption

All web traffic in and out of the Trackops network is encrypted using high grade 256-bit TLS 1.2+ encryption. Unencrypted traffic is not permitted under any circumstance. In addition, outgoing email transmissions sent from Trackops are sent via TLS, ensuring your communication is secure.

Real-Time Content Filtering

Trackops scans all incoming traffic for potential threats in real time. Our Level 1 PCI-certified firewall ensures that Trackops is always protected against any type of application layer hacking attempt (e.g. SQL injection, cross site scripting, illegal resource access, and other top 10 OWASP threats). In addition, incoming traffic is also scanned for bad bots and backdoor access attempts.

Enterprise DDoS Protection

Trackops utilizes active DDoS protection to mitigate denial of service attacks in real time. Our protection leverages a many-to-many defense methodology, automatically detecting and mitigating advanced DDoS attacks that exploit application and web server vulnerabilities, hit-and-run DDoS events, and large botnets.

Secure Data Storage

Your data is important, which is why we protect it both in transit and in storage. All data stored in our databases and cloud storage are backed up, distributed, and encrypted at rest using industry standard AES-256 encryption.

Independent Penetration Testing

Trackops retains third party independent penetration testing partners to test and probe both our network and applications. Our professional and experienced penetration testers use both automated and manual testing techniques to ensure our security is in top shape.

Vulnerability Scanning

Trackops conducts routine vulnerability scans against our network and applciations to ensure protection from the latest threats, including thousands of vulnerability signatures and those listed in the OWASP Top 10.

Role Based Access Controls

Trackops allows you to easily scope data and configure access on a granular level. Create custom user roles for specific types of employees, vendors, and contacts that limit access to your liking.

Built-In Security Features

Trackops offers a number of security features such as multi-factor authentication (MFA), mandatory password rotation and strong password rules. Easily disable or remove user access with the click of a button, and use reporting tools to find stale accounts and passwords or non-compliant staff.