London: 020 0200 8142
Leeds: 0113 880 0722 Northampton: 01604 882 882

Security Device Configuration Reviews

Security devices such as firewalls, VPN endpoints and IDS (Intrusion Detection Systems) are critical components to any network. They often represent a sizeable investment in security, which to be fully realised relies on their effective and secure configuration. A security device audit reviews those aspects of security that cannot be assessed by any other audit type and ensures that they are operating as effectively as possible.

What can you gain from a security device audit by Perspective Risk?

  • You ensure that your investment in security is as effective as possible
  • You benefit from the security that devices such as firewalls and intrusion detection systems provide, knowing that the device itself is not likely to be compromised
  • You are supported in meeting government regulations and compliance requirements
  • You can benchmark your security device configurations against industry standard practices

What does a security device audit by involve?

  • Working with a consultant with an in-depth knowledge of the security of the device you wish to audit
  • Understanding the function of the device and the environment in which it operates, to ensure that our audit provides relevant and achievable recommendations
  • A comprehensive audit of every facet of the device configuration – from traffic analysis and security hardening to device management and a complete review of any filtering rules or other protection mechanisms
  • Audits are based on a robust set of industry and government security standards incorporating guidance from NSA and CIS benchmarks
  • Any vulnerabilities or weaknesses in the configuration of security devices are fully documented in a report, which includes detailed recommendations such as the exact command syntax for the device to address the issues

Why choose Perspective Risk for security device audits?

  • Our expert consultants are experienced in reviewing firewall and other rule and signature-based security devices
  • We cover all major technologies including Cisco, CheckPoint, Fortinet, Juniper
  • You receive a prioritised report based on key gaps relevant to your organisation
  • You gain an in-depth view of critical device security
  • Your security devices are audited against the latest threats

We are Perspective Risk

  • Information security is crucial to every aspect of your business – operational efficiency, profitability, business continuity, customer confidence, brand loyalty, protection against fraud and meeting regulatory requirements.

    Our penetration testing, pen testing, pen tests and cyber security testing has proven time and time again to be an effective security assessment of business IT infrastructure.

    Perspective Risk provides in-depth security assessments, risk management and compliance solutions to help you keep your confidential information safe and your critical systems secure. We’re innovative, flexible and supportive, helping you through any information security issues to deliver real business benefits and excellent value.

  • Call Me

    Pop your details in below and we’ll be in touch soon!

    • This field is for validation purposes and should be left unchanged.

    ×
    Get Quote
    • This field is for validation purposes and should be left unchanged.
    ×