Network Device Security Review
Assess the critical network devices that make up your corporate network looking for software and configuration vulnerabilities.
Receive detailed security metrics and trends about all your hosts and risks through the SecurePortal.
SecurePortal allows you to access all your vulnerability data in a secure single platform.
Interact with your Security Report via the SecurePortal rather than an outdated paper report.
A Pentest People consultant led Network Device Security Review provides a thorough and independent examination of the configuration of your network devices, such as routers and switches with the aim of discovering issues that could leave your network vulnerable to a security breach.
Our experienced team of Penetration Testers have identified that the network infrastructure is often overlooked on corporate networks and it is very common to find these devices installed in a default state with issues such as default admin credentials still configured.
The whole corporate network is running on this key infrastructure and having the ability to gain access this allows a potential attacker the luxury of being able to eavesdrop all of the traffic or to cause a Denial of Serice (DoS) attack at their will. There are so many devices and vendors on the corporate network and these are usually outside of the corporate patching policy, leaving both software and potential configuration vulnerabilities ready to be exploited.
Pentest People can perform a full Network Security Device Review of your internal network infrastructure. One of our qualified consultants will first map out the internal network and identify the devices in use before using industry leading techniques to identify and assess the configuration of these devices, looking for any weaknesses that may lead to compromise.
A Network Device Security Review is where a Pentest People security consultant will look at the configuration from your network devices to ensure that they are configured in the correct way using the latest technologies. Any potential security issues will be raised and remediation advice provided.
There are many types of network device vendors and we can check the security configuration of the main vendors.
If you want to check if we can assess your Network Device then please get in touch with us and we will be happy to confirm this.
Absolutely! If your network is managed by a third party we have found this is an even stronger case to perform this type of review to ensure that you are receiving a secure level of service that is protecting your core network infrastructure.
The deliverable from this service is a full Network Device Configuration Report that is uploaded to our SecurePortal and available for you to interact with.
This differs from the competition in the way this is delivered and we believe this is a much clearer way to work with an manage the results of the assessment.