Firewalls, Routers, Switches – it’s all fair game for attackers.
We will conduct a detailed assessment of a given device configuration and conduct supporting checks and tests to verify best practice and secure deployment.
Testing can include ingress/egress filtering validation and network segmentation testing.