- Frequent vulnerability scans
- Network Firewall IPS/IDS
- Endpoint Protection
- SIEM Log Monitoring
- Annual third-party SOC II security audit
- Annual third-party penetration test
- Continuous security management and monitoring
Security Information Downloads
GCommerce, Inc. understands that security isn’t just creating secure applications, it involves monitoring, improving, and remaining vigilant against risks both internal and external. For in-depth details on our security controls and best practices, complete the form below. You will then be redirected to a page and receive an email with links to download our Information Security Policy and latest SOC 2 Type II Report.
GCommerce, Inc. welcomes your comments regarding our security controls. If you have questions, please contact GCommerce, Inc. at firstname.lastname@example.org. We will use commercially reasonable efforts to promptly determine and remedy the problem.