
Tracc Development
Information Technology And Services, 750 B St, San Diego, California, 92101, United States, 1-10 Employees
Who is TRACC DEVELOPMENT
It's a scary world out there. All companies need to have some level of security around their data but many dont have the resources to bring an expert onboard at $200,000 per year. For tho...
Read More

-
Headquarters: 750 B St, San Diego, California, 92101, United States
-
Date Founded: 1991
-
Employees: 1-10
-
Revenue: Under $1 Million
-
Active Tech Stack: See technologies
-
CEO: Jeff Dunbar
Industry: Information Technology and Services
SIC Code: 7371
|
NAICS Code: 115210 |
Show More
Does something look wrong? Fix it. | View contact records from TRACC DEVELOPMENT
Tracc Development Org Chart and Mapping
Sign in to CIENCE GO Data to uncover contact details
Free credits every month
Frequently Asked Questions Regarding Tracc Development
Answer: Tracc Development's headquarters are located at 750 B St, San Diego, California, 92101, United States
Answer: Tracc Development's official website is https://tracc.com
Answer: Tracc Development's revenue is Under $1 Million
Answer: Tracc Development's SIC: 7371
Answer: Tracc Development's NAICS: 115210
Answer: Tracc Development has 1-10 employees
Answer: Tracc Development is in Information Technology and Services
Answer: Tracc Development contact info: Phone number: Website: https://tracc.com
Answer: It's a scary world out there. All companies need to have some level of security around their data but many dont have the resources to bring an expert onboard at $200,000 per year. For those companies, Tracc offers part time security officer (vCISO) services on a monthly basis tailored to fit their needs. Free from the salary and overhead of a senior level hire, many smaller companies find vCISO services affordable and efficient ways of dealing with security compliance, governance, reporting, management, and disaster planning. Tracc will audit the following CIS Top 20 Critical Security Controls and document the state of each control including a gap analysis of current vs. desired state. This information will be presented on a regular basis and include the following controls: 1. Inventory of Authorized and Unauthorized Devices 2. Inventory of Authorized and Unauthorized Software 3. Secure Configurations for Hardware and Software on Mobile Devices, Laptops, Workstations and Servers 4. Continuous Vulnerability Assessment and Remediation 5. Controlled Use of Administrative Privileges 6. Maintenance, Monitoring and Analysis of Audit Logs 7. Email and Web Browser Protections 8. Malware Defenses 9. Limitation and Control of Network Ports, Protocols, and Services 10. Data Recovery Capability 11. Secure Configuration of Network Devices such as Firewalls, Routers and Switches 12. Boundary Defense 13. Data Protection 14. Controlled Access based on the Need to Know 15. Wireless Access Control 16. Account Monitoring & Control 17. Security Skills Assessment and Appropriate Training to Fill Gaps 18. Application Software Security (including management of Code Reviews) 19. Incident Response & Management 20. Penetration Tests and Red Team Exercises (in process or planned)
Premium Sales Data for Prospecting
-
Sales data across over 200M records
-
Up-to-date records (less decayed data)
-
Accurate Email Lists (real-world tested)
-
Powerful search engine and intuitive interface

Sign in to CIENCE GO Data to uncover contact details
Free credits every month