• Twitter
  • LinkedIn
  • 306-205-1121
  • info@rsolutions.com
rSolutions
  • Home
  • About Us
  • Cybersecurity
    • Managed Cybersecurity Services
    • Professional Cybersecurity Services
    • Sales & Licensing
  • Partners
  • Blog
  • Careers
  • Get in Touch
  • Search
  • Menu Menu

Network and Firewall Configuration Review

Identifies weaknesses or vulnerabilities in firewall configurations.

The Firewall Configuration Review includes:

  • An assessment of network resilience, including disaster recovery capabilities.
  • A review of network security controls.
  • An assessment of network design against industry standard recommendations.
  • Analyzing firewall configurations for insecure and duplicate ACLs.
  • Identification of insecure authentication mechanisms (i.e. weak passwords.) and VPN configurations.
  • A review of logging configurations.

Latest News

  • Here’s two things you need to know about this week…February 8, 2023 - 9:12 am
  • The 12 Threats of ChristmasThe 12 Threats of ChristmasDecember 22, 2022 - 10:05 am
  • Trust but verifyTrust, but Verify: Article 6 of 7November 29, 2022 - 2:26 pm
  • Attack Surface ManagementAttack Surface ManagementNovember 10, 2022 - 9:37 am

Skip to Section

rSolutions CorporationVisibility Drives Action
Logo image
Follow Us
Computer & Network Security • Regina, Saskatchewan • 300+ followers

Who We Are

  • About rSolutions
  • Our Partners
  • Our Blog
  • Contact Us
  • Privacy Policy

What We Do

  • Professional Services
  • Managed Security
  • Sales & Licensing
  • Trellix XDR
  • Fortinet Security
  • Splunk Data Intel

What’s New?

February 8, 2023

Here’s two things you need to know about this week…

December 22, 2022

The 12 Threats of Christmas

November 29, 2022

Trust, but Verify: Article 6 of 7

Link to: Get in Touch
  • Vancouver
  • Edmonton
  • Calgary
  • Regina
  • Winnipeg
  • Toronto
  • Ottawa
  • Halifax
  • Dallas
© rSolutions | Made with ♥ by Strategy Lab
  • Twitter
  • LinkedIn
  • Home
  • About
  • Services
  • Partners
  • Blog
  • Contact
  • Staff Login
Network Threat HuntingSecurity-based Health Check Scroll to top