WELCOME TO PCMG! | Request an eQuote



For contract & open market purchases, please call 800-625-5468, or click here to register/logon to your Business Direct Pricing Portal!

Select your Contract

For help with Federal, State & Local Goverment or Education contracts, or your PCMG Business Direct go to:

or Call 1-800-625-6568


Regulatory Compliance Assessments
Every industry has certain regulations that need to be followed. The failure to uphold these regulations can have long-term impacts on a business’ financial position or their reputation within the industry. Availing PCM Security’s regulatory compliance services can help your business assess and develop a reliable compliance program or optimize your existing compliance structure.

Audit Readiness Assessments

With myriad of regulatory compliance requirements, the documentation and support of these has become an extraordinary burden. PCM Security has experienced professionals that can assist in the documentation, gap assessments and preparation for a security regulatory audit. We can prepare the required documentation and develop an audit readiness program. Our experts are extensively familiar with all major regulatory mandates including PCI, HIPAA, ISO 2700x and Sarbanes-Oxley, and will help you improve the enterprise-wide data flow structure and processes.

Incident Response Readiness

Cyber security incidents are so common that experts say it’s not a question of if, but when. The ability to respond when an event occurs is critical to mitigating the brand, operational and financial damage. It is not just a technology plan. There are regulatory concerns, notification requirements of multiple jurisdictions, brand and customer response issues as well. PCM offers an incidence response readiness assessment that not only encompasses vigilance but comprehensive resource readiness which can include a crisis simulation and evaluation of your existing response program.

Third Party Risk Programs

In terms or enhancing profitability, accelerating time to market, and gaining cost efficiency, companies rely heavily on their network of third party vendors and service providers. Extensive ecosystems have been created utilizing complex extranets that provide corporate and network access to these “trusted” third parties. The risks involved are numerous – with Target’s HVAC vendor access the industry tipping point. PCM Security can design, implement and support your Third Party Risk Program. We evaluate the criticality and access of each trusted third party, develop security environment requirements rules and create a layered desk review, overview audit and in-depth audit plan for your program.

Governance and Risk Programs

The rapid pace of technological developments is weaving private data into everyday scenarios. This is a major reason for data-driven companies to seriously consider the importance of their security governance, privacy and risk management programs. With the increase in cloud computing models, distributed data processing and mobile environments, good security governance practices are quickly becoming the “reasonable man” defense when disaster strikes. PCM Security has the experienced resources and expertise to assist in the design and implementation of your organizations Governance and Risk Program.

GDPR – European Cyber Security

The European Union’s General Data Protection Regulations (GDPR) extends its jurisdiction beyond EU countries. Companies, both within and outside the EU, that provide data-driven services to any EU citizen are also required to be compliant with GDPR. Upon failure to meet the terms of this regulation, companies may be subjected to big fines as well as being exposed to standard non-compliance consequences. PCM Security can assist in ensuring your business’ compliance to GDPR through a privacy risk assessment to pin-point activities that do not comply with GDPR requirements.

Social Engineering Programs

Most security strategies developed by companies do not account for the human aspect, which become an entry point for cyber threats. Social engineering attacks such as phishing and spamming are dependent on human element. PCM Security can advise and support the development of your company’s Social Engineering Program. Partnering with the industry’s leading social engineering solution providers, PCM can offer training, audits and compromise test to support your social engineering efforts.

Compliance as a Service

The impact of today’s security regulatory environment is staggering and growing. Many companies do not have access to and/or cannot afford the resources necessary to manage the compliance and reporting concerns. PCM Security’s Compliance as a Service (CaaS) offering provides the opportunity to off load these resource issues to an experienced partner. PCM Security initially conducts a gap assessment for the regulatory standards to be managed. A roadmap is developed to put in place the necessary people and/or technology processes. Once in place PCM Security conducts routine, rotating assessments for compliance. We also provide for the documentation and reporting requirements mandated.

Forensic Analysis

Today, cyber criminals design attack vectors and methodologies to evade conventional signature and rule-based defenses, such as anti-virus and intrusion detection systems (IDS). When you need to get to the bottom of a data breach, simply looking through your audit logs is not going to be enough. PCM Security’s forensic analysis services will give you attack context, infrastructure-wide visibility and actionable intelligence. Prepare your enterprise for future disruptions with blueprints for entire attack lifecycles – from initial exploit to callback destinations.

Thank you for submitting your information.

Contact Us!

* Indicates required fields.

† We may require account set up and/or phone contact to verify legitimacy of request.

For more PCM-Security information, CLICK HERE.

More than an IT Provider - We’re Your Technology Partner!

Since 2002, PCM-G has been a leading provider of IT products, services, and solutions to government agencies, educational institutions, and healthcare facilities. We provide access to over 300,000 IT products like tablets, laptopsdesktops, servers, storage, and networking from leading manufacturers like Cisco, HPI, Apple, Adobe, Lenovo and Microsoft. With powerful eProcurement tools, comprehensive software licensing solutions and dedicated Account Executives, it's easy to get exactly what you need to tackle your technical challenges.

In addition, we offer world class procurement and logistics, IT consulting, and implementation services delivered through over 1200 technical professionals. Whether you want to deploy tablets securely or move your data center to the cloud, PCM-G is here to make it happen. Our Services experts will collaborate with you to understand your requirements and provide tailored services to allow your organization to lower costs, increase agility, improve efficiency and succeed in today's global economy and beyond.

Our Company


We Provide

About Us
Privacy Policy
Tech Journal
Site Map
Terms of Use and Sale
Why PCM-G?
Catalog Subscriptions
Contact Us
Email Subscriptions
My Account
Order Status
Product Recalls
We proudly welcome American Express® Cards

13755 Sunrise Valley Drive, Suite 750, Herndon, VA 20171
1-800-625-5468 | © 2016 PCM-G, Inc.


Embedded Elouqua Script