In today's global online economy your business
goals can only be achieved in a secure environment. Convergix
understands that availability is tantamount to security and
taht any interruption of your business can cause serious damage
at incredible costs. With a unique blend of technical tools
and personal service we perform best-of-breed services tailored,
to the clearly researched needs of our clients, to ascertain
that their Information Technology Infrastructure is secure.
Vulnerability monitoring enables security administrators
to keep abreast of new vulnerabilities. They will thus be
able to react to the various flaws that have been discovered
so that an attacker cannot exploit them to attack the organization's
Vulnerability monitoring informs managers of the flaws that
have been discovered and the counter-measures and patches
that should be applied.
We can carry out any type of technical security audit (wireless
network audit, network architecture audit, application architecture
audit, flow audit, OS audit, software audit, investigation
audit, code audit...)
Why order a security audit?
- To get an exhaustive view of one's security, with complete
fairness and independence.
- To obtain practical, directly applicable recommendations.
- To get recommendations sorted by priority order and difficulty
- Types of security audits available
- Verification audits
This type of audit analyzes the condition of a system or
network, examining the following aspects: organization, architecture,
protocols used, configuration, and operating and staff skills.
We use a practical approach, which is based on HSC's experience
and the methodology we have developed over the years. The
audit is carried out with the operating staff, in a limited
It consists in an active search for weaknesses in the system.
The audit is conducted from within the audited network,
using an approach based on intrusion attempts. This audit
is carried out without the operating staff, in a wide environment.
Penetration tests are a very technical endeavour which aims
at compromising, from outside, the security of your information
system, thanks to "human intelligence". They can
have several goals:
- Prove that the installed security system is inadequate
and can be bypassed.
- Check that an external, malicious person cannot easily
penetrate your information system.
- Complement a security audit (a penetration test can reveal,
for example, security problems due to the proprietary software