Configuration Review

We conduct internal reviews of key infrastructure security components, with full access to the system’s configuration including, (but not limited to) Firewall, IDS/IPS, Enterprise AV suite, Data leakage prevention solution, and endpoint security solutions.


The purpose of the review is to verify the operating condition and the effectiveness of its security configuration and rule sets. The review will be conducted, taking multiple considerations emerging from corporate policies, Industry best practices and regulatory requirements.

For additional information contact us.