VPN Configuration Assessment
Virtual Private Networks (VPNs) are the modern way to allow remote employees to access resources on the corporate network. These VPN systems have replaced traditional dial-in and other types of remote access. There are many types of VPNs using differing technologies offered by a lot of technology vendors.
The configuration of these VPNs can be quite troublesome with a lot of companies relying on both site-to-site VPNs for third party access as well as Remote Access VPNs for remote workers who need access to corporate resources when on the road or working from home.
Receive detailed security metrics and trends about all your hosts and risks through the SecurePortal.
SecurePortal allows you to access all your vulnerability data in a secure single platform.
Interact with your Security Report via the SecurePortal rather than an outdated paper report.
What are the Risks?
A VPN device normally straddles the external Internet and internal corporate network. Any security vulnerability or misconfiguration can lead to an external hacker being able to access corporate resources as if they were physically connected to your network.
How Can We Help?
Pentest People can perform a full VPN Security Assessment of all of your external facing VPN infrastructure. One of our qualified consultants will use industry leading techniques to identify and assess the configuration of the VPN device, looking for any weaknesses that may lead to compromise.
The service would be delivered as part of the Pentest People Penetration Testing as a Service (PTaaS) and full access to the SecurePortal and other complementary tools would be provided.
Understand the VPN security issues you face through a very thorough assessment from a qualified security consultant.
- Identify Security Vulnerabilities within your VPN Configuration allowing you to proactively remediate any issues that arise
- Improve your security posture, allowing you to reduce the threat of a cyber attack occurring against your business
- Comply with various regulatory bodies who mandate regular Network Security Testing be performed within your infrastructure
- Be able to prove to your supply chain that you are taking the necessary precautions to ensure your strong security posture
- Be able to focus efforts on important security issues by identifying the high-risk items identified in the VPN Testing report
A VPN Configuration Review is where a Pentest People security consultant will look at the configuration from your VPN devices to ensure that they are configured in the correct way using the latest technologies. Any potential security issues will be raised and remediation advice provided.
We can assess the configurations of all major VPN Devices vendors. If you want to check if we can assess your VPN Device then please get in touch with us and we will be happy to confirm this.
Absolutely! If your VPN is managed by a third party we have found this is an even stronger case to perform this type of review to ensure that you are receiving a secure level of service that is protecting your core network infrastructure.
The deliverable from this service is a full VPN Configuration Report that is uploaded to our SecurePortal and available for you to interact with.
This differs from the competition in the way this is delivered and we believe this is a much clearer way to work with an manage the results of the assessment.