VPN Configuration Assessment

Assess the security configuration of your VPN to ensure a misconfiguration or vulnerability is not allowing external access to your corporate network.

Receive detailed security metrics and trends about all your hosts and risks through the SecurePortal.

SecurePortal allows you to access all your vulnerability data in a secure single platform.

Interact with your Security Report via the SecurePortal rather than an outdated paper report.

VPN Configuration Security Assessment

Virtual Private Networks (VPNs) are the modern way to allow remote employees access resources on the corporate network. These VPN systems have replaced traditional dial-in and other types of remote access. There are many types of VPNs using differing technologies offered by a lot of technology vendors.

The configuration of these VPNs can be quite troublesome with a lot of companies relying on both site-to-site VPNs for third party access as well as Remote Access VPNs for remote workers who need access to corporate resources when on the road or working from home.

What are the risks?

A VPN device normally straddles the external Internet and internal corporate network. Any security vulnerability or misconfiguration can lead to an external hacker being able to access corporate resources as if they were physically connected to your network.

How can we help?

Pentest People can perform a full VPN Security Assessment of all of your external facing VPN infrastructure. One of our qualified consultants will use industry leading techniques to identify and assess the configuration of the VPN device, looking for any weaknesses that may lead to compromise. The service would be delivered as part of the Pentest People Penetration Testing as a Service (PTaaS) and full access to the SecurePortal and other complimentary tools would be provided.

Find Out More Now!

VPN Configuration Security Assessment

Key Benefits

  • Identify Security Vulnerabilities within your VPN Configuration allowing you to proactively remediate any issues that arise
  • Improve your security posture, allowing you to reduce the threat of a cyber attack occurring against your business
  • Comply with various regulatory bodies who mandate regular Network Security Testing be performed within your infrastructure
  • Be able to prove to your supply chain that you are taking the necessary precautions to ensure your strong security posture
  • Be able to focus efforts on important security issues by identifying the high-risk items identified in the VPN Testing report

Frequently Asked Questions

  • What is a VPN Configuration Review?

    A VPN Configuration Review is where a Pentest People security consultant will look at the configuration from your VPN devices to ensure that they are configured in the correct way using the latest technologies. Any potential security issues will be raised and remediation advice provided.

  • What types of VPN devices can you review?

    We can assess the configurations of all major VPN Devices vendors. If you want to check if we can assess your VPN Device then please get in touch with us and we will be happy to confirm this.

  • My VPN is managed by a third party, can you still perform the review?

    Absolutely! If your VPN is managed by a third party we have found this is an even stronger case to perform this type of review to ensure that you are receiving a secure level of service that is protecting your core network infrastructure. 

  • What is the deliverable from the service?

    The deliverable from this service is a full VPN Configuration Report that is uploaded to our SecurePortal and available for you to interact with.

    This differs from the competition in the way this is delivered and we believe this is a much clearer way to work with an manage the results of the assessment.