Using external query vectors with the tools that are available to hackers, we audit your configurations manually as well, by our human analysts. We also perform a subset of PEN tests on a regular basis – alerting you for the need to get a full PEN test done if required.