Authored by: PlexTrac Author Posted on: May 20, 2021 PlexTrac Achieves SOC2 Type 1 Compliance IMMEDIATE RELEASE: Wednesday, May 26, 2021 PlexTrac is proud to announce that as of April 30, 2021, it has reinforced its commitment to the security of its clients and partners by becoming SOC 2 Type 1 compliant. Attention is now focused on working through the steps for becoming Type 2 compliant to further demonstrate the company’s dedication to the stability and security of its systems. Along with existing security protocols, this new certification is representative of PlexTrac’s ongoing efforts to ensure the safety of customers’ data. This dedication to security is critical to fulfilling PlexTrac’s mission of empowering every security professional to focus on the real security work. Founder and CEO Dan DeCloss said, “I’m proud of our team and their tireless efforts not only to provide a product that improves the lives of security professionals but also to ensure PlexTrac itself is held to the highest security standards.” About PlexTrac PlexTrac, Inc. is a fast-growing cybersecurity company driven by a mission to improve the security posture of organizations and security teams of all sizes. The PlexTrac solution is a software platform focused on streamlining the reporting and remediation of cybersecurity risks and aiding efficient collaboration within security teams. Supporting organizations using a purple teaming paradigm, PlexTrac serves as the central communication hub to aggregate all of the components of an organization’s cybersecurity program. PlexTrac Author At PlexTrac, we bring together insights from a diverse range of voices. Our blog features contributions from industry experts, ethical hackers, CTOs, influencers, and PlexTrac team members—all sharing valuable perspectives on cybersecurity, pentesting, and risk management.
Better Together: CTEM Vendors That Play Nice—and Win Big—Together Exploring NodeZero, Pentera, and PlexTrac for next-gen threat management. Let’s be honest, the cybersecurity tools in your belt keep growing. Then again, so do the cyber threats. How do you... READ ARTICLE
The Most Popular Penetration Testing Tools in 2025: 30 Products to Support Your Pentesting Efforts This Year Penetration testing is a crucial part of cybersecurity and involves finding and exploiting vulnerabilities in networks, applications, systems, or physical environments before the bad actors can. Penetration testing also plays... READ ARTICLE
The CVE Program Regains Funding: A Critical Juncture for Global Cybersecurity If you’ve spent any amount of time in cybersecurity, you’ve likely encountered the CVE (Common Vulnerabilities and Exposures) Program. It’s a foundational piece of how we identify and talk about... READ ARTICLE