Firewall Configuration


We work to ensure that the technology on a customer’s external perimeter is configured correctly. We believe that ensuring you have a strong firewall configuration coupled with a regular vulnerability scan can significantly reduce your attack vector and deter would be attackers.

Firewall configuration

  • Verify the rule base matches business requirements and policy,
  • Confirm the change management system reflects all the firewall rules and the business justification, Logging and auditing of firewall activity,
  • Check the firewall operating system version for known vulnerabilities,
  • Confirm the logging server is logging correctly receiving, processing and retaining the logs as per business policy and Verify rulesets in line with any required compliance standards.

Our customers have used this service to meet compliance requirements, part of a security audit our health check or to help configure technology where the correct skills are no longer available for the business.

Request a Callback

Use the form below to request a callback and we'll be in touch within 24 hours. Or call us on 0121 709 2526.

Sign up to our Newsletter