The TraceSecurity compliance solution for schools and universities combine expertise in security systems and processes, a deep knowledge of industry compliance requirements, and a cloud-based delivery platform that gives your educational institution the ability to automate much of the compliance process internally.

TraceSecurity Compliance Solutions leverage TraceCSO, a powerful management platform that gives you unprecedented visibility into your Information Security Program.


The Compliance Challenge

Schools and universities of all types and sizes need to conduct business in a secure manner while achieving regulatory compliance and providing secure sharing of data. They are required to develop and implement security policies to protect against security breaches. They are also required to promote security awareness and safe computing practices among students, faculty and staff.

The Family Educational Rights & Privacy Act (FERPA) protects the privacy of student records and applies to students enrolled in higher education institutions as well as K-12 students. Any educational agency or educational institution that receives funds under any program administered by the Secretary of Education is required to comply with FERPA. Institutions which violate the Act can be faced with a withdrawal of federal funding.

Most educational institutions must also comply with the Gramm-Leach-Bliley Act (GLBA), the Health Insurance Portability and Accountability Act of 1996 (HIPAA), and other mandates.      


The TraceSecurity Compliance Solution

Our seasoned experts will help you demonstrate compliance to security policies, guidelines and best practices. At the same time, we help protect the personal financial information of your customers and ensure the integrity of your data. This comprehensive solution can help you meet specific regulatory challenges – all while providing maximum flexibility and cost control.

Our compliance solution includes a deep set of expert services:

Our security and compliance consultants offer a full range of assessment, testing and training services that will assure your organization’s compliance with all current mandates.  Services include:

  • Security Assessment: An independent test of the information security program.
  • Risk Assessment: To identify reasonably foreseeable risks that could result in service interruption or unauthorized disclosure, misuse, alteration, or destruction of confidential information.
  • IT Security Audit: An audit of the controls supporting the information security program.
  • Penetration Testing: A test of weaknesses using ethical attempts to exploit vulnerabilities.
  • Social Engineering: To test if employees are adhering to security policies.
  • Application Testing: Determines the strength of your online application security profile and identifies layer vulnerabilities.
  • Wireless Assessment: Provides a detailed look at the current risk of your wireless implementation as our security analysts attempt to compromise systems and information through ethical hacking methods.
  • Security Training: Flexible, customizable security awareness training.
  • Advanced Persistent Threat Assessment: A realistic assessment that fulfills several testing objectives simultaneously – all while reducing cost and delivery time compared to identical, individual security assessments, penetration testing and social engineering engagements.

Unlike solutions from conventional providers, these are not one-off services backed with limited expertise and resources. Your organization has access to teams of security experts who provide complete support and consultations through every phase of your engagement. Whether you have questions concerning specific policies or need assistance with remediation strategies, TraceSecurity provides the expertise you need to quickly and accurately resolve any security compliance issue.


Our compliance solution includes an integrated cloud-based compliance management platform:

We deliver and manage our services via TraceCSO -- the first integrated cloud-based IT GRC management platform. Optionally, TraceCSO is also the means by which you can automate and customize your organization’s ongoing compliance program. TraceCSO is powerful but also a remarkably affordable solution that is designed to make your information security program a valuable management asset that literally makes your organization compliant by default. Features include:

  • An intuitive, integrated dashboard to provide visibility into your information security program.
  • The ability to conduct unlimited, on-demand network vulnerability scanning.
  • The ability to facilitate an ongoing review of compliance with relevant industry security requirements.
  • Streamlined creation of security policies, distribution of policies, and reporting on acceptance of policies.
  • The ability to reduce training costs by creating internal employee training programs on policies, security and other topics.
  • On-demand report generation for auditors, board, management, and technical staff.
  • Facilitation of the internal risk management program.
  • Facilitation of the internal audit program.


We streamline processes so that you save time, money and effort!

Our software solutions help you develop standard, repeatable compliance processes so that you reduce the burden on your staff, as well as build a solid and efficient foundation for future compliance procedures. One of the biggest advantages our solutions provide is the ability to reduce the amount of time needed preparing for auditors. You can quickly and efficiently produce detailed reports critical to demonstrating adherence to compliance requirements.