• Analyzed systems: CheckPoint Firewall, Cisco, Juniper, PaloAlto, Fortigate, McAfee and others
  • General analysis of rules and of security zone configuration
  • Analyzing software version in terms of known vulnerabilities
  • Analysis of device access configuration, device management methodology
  • Analysis of event logging mechanisms, system event logging, transferring events to external systems
  • Revision of users gaining access to devices, granulation of access rights, administrative profiles, cooperation with external authorization and clearing systems
  • Analyzing security rules configuration in the scope of ACL rules and best practice
  • Analysis of encryption mechanisms
  • Analyzing software update mechanisms and security functionality signatures

Business benefits:

  • Professional IT security level assessment
  • Remedy plan for the existing system configuration
  • Enhanced credibility to business partners and clients
  • Reduced risk of unauthorized access to the network or system data being disclosed
  • Increased security for obtaining business objectives
  • Greater awareness, among both the management and the staff, regarding the existing and potential threats

The service delivery time as well as cost depend on the number of inspected systems. For a detailed offer, please contact us in the way most convenient for you by phone, email, or the form below:

Ask for more details