Bryan Kissinger, Ph.D., VP and CISO
Until recently, the majority of sensitive enterprise data was confined within internal corporate networks, where they are safely managed and monitored by in-house administrators. Today, over 18 percent of employees work remotely from their own devices over networks that are largely unmanaged. These devices and networks present a potentially vulnerable endpoint that can be easily exploited, requiring organizations to extend their security framework beyond the four walls of a corporate setup. It’s high time to revamp the older “we’re secure if we keep the bad guys out" philosophy and embrace a "never trust, always verify” model. This is the very credo behind Zero Trust security architecture.
But how can an organization that operates in its own niche space go up and running with such a security model and set up its complex framework?
Founded in 2001, Trace3 is a CA-based technology-consulting leader specializing in providing IT strategies, solutions, and services to help organizations embrace the dynamic information security landscape. From its humble beginnings as a value-added technology reseller, the company has evolved into a trusted IT advisor at the forefront of emerging IT.
“We pride ourselves on leading the technology consulting space through our innovation-first approach built on customized IT research, vertical-focused private-equity-led thematic briefings, and access to startups and venture capital seeking to solve security problems differently," says Bryan Kissinger, Ph.D., the VP and CISO at Trace3.
The company has garnered a strong reputation in bringing several new firms and innovative solutions to help solve some major security challenges for businesses.
Foraying into the New Era of Security
It is important to note that no two parts of an IT environment are similar, and organizations often lack resources to secure their global business ecosystem that includes higher risks geographic locations from malicious software and ransomware attacks.
Furthermore, the pandemic saw many companies adding external devices, onboarding many employees remotely, migrating to cloud environments, and including several third-party suppliers to their already vulnerable ecosystem. All this has created new opportunities for cybercriminals to access business networks, necessitating businesses to have a holistic understanding of how they’re secured beyond the implementation stage—which can be achieved only by redesigning their security architecture.
As a trusted IT advisor specializing in Zero Trust information security, Trace3 helps clients navigate the changing tides in the IT landscape and secure their critical assets with the latest technologies.
“While our focus remains unabated on the fundamental information security practices, we have integrated cloud security to help clients with their remote working information security needs," adds Kissinger. "We always stay on top of the leading trends in the IT space, including Zero Trust and adaptive security, to allow access to crucial business resources securely, irrespective of their locations.”
Zero-Trust Security—the Next Frontier in Data Security
As one of cybersecurity’s most resilient safety architectures, Zero Trust excels at allowing users to securely access data, regardless of their physical location, while protecting it from unauthorized access.
Trace3 excels in helping businesses embrace a Zero Trust security model in designing and implementing their IT systems by deploying industry-leading solutions.
With its business operations built around the concept of customer success, Trace3 always strives to provide the right-fit solutions tailored for clients’ needs instead of airdropping a set of off-the-shelf products into their environment. More importantly, collaborations with customers are not just revenue-making opportunities for Trace3; it stands by their side to help them run, grow, and transform their businesses.
A typical engagement at Trace3 begins with a comprehensive assessment of clients’ environment and a current state discovery of the organization's ecosystem. The company then performs a maturity mapping and analysis to identify their existing capabilities from a people, process, and technology perspective.
Based on this information, Trace3 creates maturity ranking and builds strategic roadmaps to help clients identify the gaps in their IT infrastructure and make investments in the right technology to improve their security posture. Oftentimes, clients already have technologies in their ecosystem, and a simple re-engineering can help meet their Zero Trust security requirements, which Trace3 excels at with its longstanding experience and expertise in the industry. In instances where businesses struggle to establish their Zero Trust architecture due to the lack of technologies, the company leverages its strategic partnerships with Cisco, Microsoft, and Google, and other emerging startups to deliver security solutions to achieve their goal.
With its competent line of services and keen attention to customer engagement, Trace3 has gleaned a legion of clients over the years. In one instance, the company worked in liaison with a leading multinational manufacturing organization that has its operations spread across several countries.
“We pride ourselves on leading the technology consulting space through our innovation-first approach built on customized IT research, vertical-focused private-equity-led thematic briefings, and access to startups and venture capital seeking to solve security problems differently”
Before engaging with Trace3, the client was struggling to micro-segment its infrastructure and implement various policies over different high-risk parts of their environment. The company held a workshop and conducted a current state discovery program to understand that they needed to establish Zero Trust architecture in five high-risk use cases. Trace3 worked with the client to reconfigure their existing Cisco ecosystem to create a right-sized, practical Zero Trust security architecture that cost-effectively helped them secure their high-risk environments.
Value beyond the Zero-Trust Architecture
In addition to Zero Trust security assessments, Trace3 collaborates with clients to perform general security evaluations. Following the same procedures used in Zero Trust engagements, the company builds a right-fit roadmap to help clients mature their security programs over time at a pace that is comfortable for them. Post-implementation, clients can see significant growth opportunities in their DevSecOps programs, identity and access management, and endpoint and email security architecture.
Another area that Trace3 excels at is its offensive security penetration testing services. Here, the company comes in and simulates an infiltration to help clients understand how their security framework looks like from a cyber attacker’s viewpoint.
Such pursuit of excellence enables Trace3 to serve as a partner of choice for several businesses looking forward to enhancing their security postures.
The company recently collaborated with a leading educational organization that was in dire need of implementing application and cloud security in their ecosystem.
After gaining a holistic understanding of their needs, Trace3 worked with them to implement and configure a secure application coding technology that helped their developers perform their operations seamlessly. The solution allowed them to build a secure DevOps environment.
Taking an Off Beat Path to Excellence
What separates Trace3 from the competition is the transparency and flexibility it brings to the business operations. For clients who wish to simply buy a solution, the company serves as a value-added technology reseller and works with its strategic partner network to help them make an objective and informed choice for the technology. It provides exceptional advisory service offerings to clients seeking additional assistance after deploying technology solutions.
We always stay on top of the leading trends in the IT space, including Zero Trust and adaptive security, to allow access to crucial business resources securely, irrespective of their locations
Trace3 houses a dedicated team of top-notch professionals who work with clients to help execute backend contracts and paperwork. By leveraging its unique professional project management capabilities, the company always ensures that its services go beyond customer expectations.
Behind Trace3’s penchant for service quality lies its team that includes several highly certified and credentialed engineers and sales experts in the industry. They adhere to a collaborative culture and undergo various training and education sessions within the organization. One among them is the Trace3 Legends program.
In 2021, the entire workforce at the company was trained on the latest network security concepts by one of its prestigious vendors as part of its initiatives to keep the team up-to-date from an industry standpoint. Trace3 also extends its education sessions to customers free of cost, intending to uplift them and the community they live in.
Trace3’s broad networks of partnerships with leading technology solution providers, emerging tech startups, and venture capital firms also result in gaining a progressive growth curve. The company often collaborates with these partners to resolve some of the most demanding challenges in the industry.
“Our security practice booked a 60 percent growth in 2021, and our cloud team won a Microsoft US partner award,” adds Kissinger.
Moving ahead, Trace3 aims to enhance its value proposition and in-house capabilities to better provide unrivaled managed services to its customers. Anticipating a big boom in the cloud-hosted environments, Zero Trust, data loss prevention, and identity management, the company plans to make huge investments in these segments and continue to stay at the forefront of making businesses future-ready.