64MM

Get_Event_Log
  • Home
  • Vulnerability Assessment
  • Penetration Test
  • SQA
  • Government Contracting
  • Blog
  • Resources
  • About
  • More
    • Home
    • Vulnerability Assessment
    • Penetration Test
    • SQA
    • Government Contracting
    • Blog
    • Resources
    • About
Get_Event_Log
  • Home
  • Vulnerability Assessment
  • Penetration Test
  • SQA
  • Government Contracting
  • Blog
  • Resources
  • About

GET EVENT LOG GET PEACE OF MIND

Specializing in RED TEAM, VULNERABILITY ASSESSMENT, PENETRATION TESTING, and SECURE SOFTWARE QUALITY ASSURANCE TESTING.  We work with individual, start-ups, SMB and local, state and federal government agencies.


Cybercrime, which includes everything from theft or embezzlement to data hacking and destruction, is up 600% since the pandemic of 2020. Is your business protected? Let Get Event Log LLC provide comprehensive testing, analysis and reporting of your organization’s known cyber liabilities. We provide one-time and ongoing maintenance to keep your business secure as you grow. Whether you’re a one-person office or employ hundreds, we can manage your IT security and provide valuable peace of mind.   


More than half of all cyberattacks are committed against small-to-midsized businesses (SMBs), and 60% of them go out of business within six months of falling victim to a data breach or hack.  If your business stores its own financial data or personal customer data online or on computers including, phone, credit card and Social Security numbers, your organization is at risk.  Contact Get Event Log LLC today and we’ll work with you to create a plan for your unique needs. 

Email us with questions or for quotes

Vulnerability Assessment

A vulnerability assessment is the methodical evaluation of potential and existing threats and bugs in your organization’s systems, networks, applications, hardware, and other parts of the IT organization.  A comprehensive vulnerability test identifies, prioritizes, and assigns severity levels to the identified weaknesses, and then recommends whether to mitigate or remediate them.


The vulnerability assessment process involves:

      

  • Identification of vulnerabilities     
  • Evaluation of the risk posed by any vulnerabilities identified     
  • Treatment of any identified vulnerabilities    
  • Reporting on vulnerabilities and how they can be mitigated or remediated

Get More information

Penetration Testing

Penetration testing, also called “pen testing” for short, is a simulated attack on your organization’s network to assess security and determine its vulnerabilities. Pen testing goes far beyond a vulnerability assessment in identifying weaknesses, including the potential for unauthorized parties to gain access to the system's features and data, as well as identifying strengths, and enabling a full risk assessment to be completed.  


These attacks are designed to do the following:      


  • Identify network security issues and vulnerabilities     
  • Identify policy compliance failures     
  • Improve employee awareness of proper security practices     
  • Assess an organization’s effectiveness in responding to an attack


This will follow eight basic steps:

Network Enumeration and Mapping

Reconnaissance

Network Sniffing

Vulnerability Scanning

Exploit Launching

Further Exploitation

Social Engineering

Reporting

Get More information

Software Quality Assurance Testing

  • Automation
  • DHS Section 508 Certified
  • Usability
  • Integration
  • System
  • Sanity
  • Smoke
  • Interface 
  • Regression
  • Acceptance
  • Database
  • iOS/Android Mobile

  

Typical Test Objectives

  • Evaluate work products 
  • Validate whether the test object is complete and works as expected 
  • Build confidence in the quality of the test object 
  • Demonstrate conformance to requirements 
  • Find and prevent defects 
  • Find failures 
  • Reduce the risk of the software not being of high enough quality 
  • Provide enough information to stakeholders
  • Comply with contractual, legal or regulatory requirements 

Get More information

Member Of

GEL LLC

Saint Augustine, Florida, United States of America

For information or prices: +1 ‪(303) 521-4926 or +1 (904) 792-2304 chris@geteventlog.com

Social

What's up?

Copyright © 2025 GEL LLC - All Rights Reserved.

This website uses cookies.

We use cookies to analyze website traffic and optimize your website experience. By accepting our use of cookies, your data will be anonymously aggregated for analysis.

DeclineAccept