top of page
![](https://static.wixstatic.com/media/03c3c4_103080616b02499e810297ae2c21d544~mv2.jpg/v1/fill/w_288,h_162,al_c,q_80,usm_0.66_1.00_0.01,blur_2,enc_auto/03c3c4_103080616b02499e810297ae2c21d544~mv2.jpg)
Penetration Testing
This includes one-time or periodic software scans or hacking attempts in order to find vulnerabilities in a technical and logical perimeter. It generally does not assess security throughout the network, nor does it accurately reflect personnel-related exposures due to disgruntled employees, social engineering, etc. Regularly, reports are given to the client.
Compliance Monitoring
Conduct change management by monitoring event log to identify changes to a system that violates a formal security policy. For example, if an impersonator grants himself or herself too much administrative access to a system, it would be easily identifiable through compliance monitoring.
![GPC Logo.JPG](https://static.wixstatic.com/media/03c3c4_da2a07243e214b29a65a13de71c4a1f3~mv2.jpg/v1/crop/x_0,y_25,w_348,h_148/fill/w_253,h_103,al_c,q_80,usm_0.66_1.00_0.01,enc_auto/GPC%20Logo_JPG.jpg)
bottom of page