Device Configuration Review

Firewalls, Routers, Switches – it’s all fair game for attackers.

We will conduct a detailed assessment of a given device configuration and conduct supporting checks and tests to verify best practice and secure deployment.

Testing can include ingress/egress filtering validation and network segmentation testing.