Network Device Security Review
A Pentest People consultant-led Network Device Security Review provides a thorough and independent examination of the configuration of your network devices, such as routers and switches with the aim of discovering issues that could leave your network vulnerable to a security breach.
Our experienced team of Network Security Penetration Testers have identified that the network infrastructure is often overlooked on corporate networks and it is very common to find these devices installed in a default state with issues such as default admin credentials still configured.
What are the Risks?
The whole corporate network is running on this key infrastructure and having the ability to gain access to this allows a potential attacker the luxury of being able to eavesdrop all of the trafﬁc or to cause a Denial of Service (DoS) attack at their will.
There are so many devices and vendors on the corporate network and these are usually outside of the corporate patching policy, leaving both software and potential conﬁguration vulnerabilities ready to be exploited.
From default user credentials to existing software vulnerabilities, network devices can be overlooked due to the separate nature and more specialised skill set required for configuration.
How Can Our Network Device Security Review Help?
Pentest People can perform a full Network Security Device Review of your internal network infrastructure.
One of our qualiﬁed network device security consultants will ﬁrst map out the internal network topology and identify all of the devices in use before using industry leading techniques to fingerprint and assess the version and conﬁguration of these devices. Each device is then thoroughly interrogated looking for any software or configuration weaknesses that could lead to compromise.
The service would be delivered as part of the Pentest People Penetration Testing as a Service (PTaaS) and full access to the SecurePortal and other complementary tools would be provided.
The Network Device Security Review allows access to the SecurePortal
Until now, the traditional deliverable from a Penetration Test engagement has been a lengthy 100+ page PDF report.
Pentest People have developed a solution to this issue where you interact with your vulnerabilities within the SecurePortal.
Constantly updating Vulnerability Information to stay in touch with the emerging threat landscape.
Receive overview and trend data of all of the current security issues you face in your organisation. All viewable on an interactive dashboard.
Rest assured that your assessments are performed by qualified Security Consultants.
Our specialised team of security consultants hold industry qualifications such as CHECK Team Member & Team Leader, CCIE, CISSP and CEH.
Understand the network device security issues you face through a very thorough assessment from a qualified security consultant.
- Identify Security Vulnerabilities within your Network allowing you to proactively remediate any issues that arise
- Improve your security posture, allowing you to reduce the threat of a cyber attack occurring against your business
- Comply with various regulatory bodies who mandate regular Network Security Testing be performed within your infrastructure
- Be able to prove to your supply chain that you are taking the necessary precautions to ensure your strong security posture
- Be able to focus efforts on important security issues by identifying the high-risk items identified in the Network Security report
Frequently Asked Questions About Network Device Security Reviews
A Network Device Security Review is where a Pentest People security consultant will look at the configuration from your network devices to ensure that they are configured in the correct way using the latest technologies. Any potential security issues will be raised and remediation advice provided.
There are many types of network device vendors and we can check the security configuration of the main vendors.
If you want to check if we can assess your Network Device then please get in touch with us and we will be happy to confirm this.
Absolutely! If your network is managed by a third party we have found this is an even stronger case to perform this type of review to ensure that you are receiving a secure level of service that is protecting your core network infrastructure.
The deliverable from this service is a full Network Device Configuration Report that is uploaded to our SecurePortal and available for you to interact with.
This differs from the competition in the way this is delivered and we believe this is a much clearer way to work with an manage the results of the assessment.