What is Firewall Configuration?

We work to ensure that the technology on a customer’s external perimeter is configured correctly. We believe that ensuring you have a strong managed firewall configuration coupled with a regular vulnerability scan can significantly reduce your attack vector and deter would be attackers.

Firewall Configuration

  • Verify the rule base matches business requirements and policy.
  • Confirm the change management system reflects all the managed firewall rules and the business justification, Logging and auditing of firewall activity.
  • Check the firewall operating system version for known vulnerabilities.
  • Confirm the logging server is logging correctly receiving, processing and retaining the logs as per business policy and verify rulesets in line with any required compliance standards.

Our customers have used this service to meet compliance requirements, part of a security audit health check or to help configure technology where the correct skills are no longer available for the business.

Find out more

Get in Touch

Get our
updates direct
to your inbox.