220
vendor pen tests by Convergent Risks last year.
65%
of network infrastructure pen tests had Medium or higher risk.
100%
of web app pen tests had Medium or higher risk.
Penetration Testing
Our Targeted Framework Assessment strategy uses ethical attack methodologies for web application and infrastructure penetration testing. We employ Crest, CyberScheme, Tigerscheme and Check certified security professionals with front line defense experience in media & entertainment, military and financial services.
Our penetration testers are very familiar with the TPN security assessment program for the M&E sector. Our team is able to take your business safely through real-world attack scenarios, allowing you to find and fix vulnerabilities before attackers can exploit them. All of our penetration testing is performed using an established, standard methodology allowing our clients to demonstrate controlled improvement between test cycles. We analyze the data to determine if your system is vulnerable to internal or external attack.
The MPA/TPN Best Practice guidelines advise external infrastructure and web application pen testing by a third party annually, monthly external vulnerability scanning and quarterly internal vulnerability scanning all of which Convergent can provide as a managed service.
Code Reviews
We provide code review services to assess the source code of web applications as part of an overall security assessment. Our code professionals will assess the quality of the source code to identify vulnerabilities in libraries that may exist, especially weaknesses in the integration between the code base and libraries and this is supported by a detailed report showing the findings with guidance on remediation.