Explore our cybersecurity resource library, including case studies, whitepapers, best practices and expert thought leadership.Learn More >
PRIMARY CONTACT: Carl N. Kriebel CISSP
Schneider Downs firewall configuration review evaluates the rules from your firewalls to determine whether security risks exist in the configuration, whether the firewall software is up-to-date and if high risk services containing known vulnerabilities are allowed through the firewall. This review can be utilized for compliance verification and validation of perimeter security posture. We use a rating system and mitigation advice to prioritize and address your issues. We produce a detailed report showing how the device has been configured. We also report on any device vulnerabilities that are in the public domain that a hacker could target.
p: 614.621.4060 f: 614.621.4062