Penetration Testing

Firewall reviews


Many organisations networks are configured to rely on strong perimeters; if your firewall is poorly configured then attackers may target services thought to be protected. Firewall reviews ensure that the device and its ruleset are properly hardened.

Firewalls are a primary line of defence for many organisations, therefore ensuring they are as hardened as possible is critical. Our Firewall Security Reviews cover the following security issues:

  • Overly permissive rules
  • Unintentionally exposed services
  • Insecure cryptographic options
  • Default credentials
  • Default services enabled, e.g. SNMP
  • Exposed administrative interfaces

Whilst the process of locking down a ruleset to only the minimum rules necessary seems simple on the face of it; things sometimes go wrong. With test rules accidentally left in place, rules being configured to be broader than intended, or just changes made over time leading to a looser ruleset than desired. An independent firewall configuraiton security review will help tighten things back up.

We offer a full suite of penetration testing services

In addition to Penetration Testing we also offer Cybersecurity Training and Cybersecurity Consultancy to offer a comprehensive suite of cybersecurity services.

Cybersecurity Training

Akimbo Core deliver cybersecurity workshops all around the UK, as well as remotely. Our workshops cover a range of topics from technical subjects such as how to get the most out of cybersecurity testing, to security awareness issues within businesses.

Cybersecurity Consultancy

From security architecture to security assessment, we offer a wide range of services to ensure the protection of your assets. We use a highly flexible methodology to ensure that our services are fully aligned to your needs, delivered by a bespoke team with the precise skills and depth of experience needed to understand your issues and then effectively deliver the desired outcome. With our security assurance services, you can have peace of mind knowing that your systems and data are well-protected.

CONTACT US


WE CAN FIND YOUR VULNERABILITIES

BEFORE YOU ARE BREACHED

GET IN TOUCH

    Play Cover Track Title
    Track Authors