Firewall Security Assessment

ConnectDS are cyber security specialists based in the South East of England. We perform in-depth firewall assessments for your business to review the arrangement and success of your network security. We make sure your cyber security measures meet the technical requirements of your business and that they comply with the regulations.

Why are Firewall Assessments Vital?

Firewalls must be assessed and reviewed on an ongoing basis so that they maintain effectiveness in securing your company.

We implement measures in line with best practice and we customise our approach to your business. We operate consistently with your firewall change management and help you increase the chances of identifying weaknesses in your security systems before they become dangerous. We prevent your data from being compromised by cyber attackers.

Your firewall is your first line of defence against threats from outside your business; this is why is is essential for your firewall to be effective. Having a firewall gives you a false sense of security if skilled experts don’t configure and assess it to make sure your company is not vulnerable to the various cyber threats in play in the modern world.

What is Included in a Firewall Assessment?

Our firewall assessment service makes sure that your firewall is arranged correctly – It is a review of your current situation. ConnectDS assesses if any unnecessary rules have been set up that could expose your company’s private data. It also works out the current ruleset, to identify if rules are superseded, obsolete or may be a risk to your security. An example of these rulesets is the lack of a DENY ALL firewall rule or policy rule, or the dreaded “ALLOW ALL”!!!

ConnectDS’s firewall assessment service includes an evaluation of your firewall’s features and their uses so that we can identify any areas that can be more optimised. We will check whether any of these features are providing any limits to your capability and work to make these perform better.

At ConnectDS, we go the extra mile for all our clients. To make this happen, our firewall assessment moves further to technically examine the effectiveness of not only the inbound communications, but also the Egress (outbound) Traffic. We understand that the majority of modern advanced threats that occur are targeted at users, so it is important that we review the level of perimeter control to the internet from within the network. This review allows us to appreciate the risks that can take place as well as ensuring effective configuration across your company.

We make sure that your configuration aligns with best practice and to ensure the effectiveness of your firewall. ConnectDS performs all testing from a sensor within your local network; we perform a technical assessment of what is possible outbound as well as inbound, including actions such as:

  • Testing egress port and application access and filtering
  • Data Exfiltration to an external server and unapproved cloud file hosting services
  • Ingress reconnaissance and probing
  • Access to traffic anonymisation tools such as TOR (The Onion Router), unauthorised VPNs and Proxies
  • URL filtering, and access to undesirable sites such as pornography, gambling, and chat/IM
  • Ability to access online services for streaming and downloads of pirated material
  • Downloading of malicious files and viruses
  • Back door connectivity using tools including reverse port forwarding and reverse shells
  • Peer-to-Peer file sharing, to find activity such as BitTorrent that can be used for illegal activity
  • Communication through insecure protocols, including FTP, Telnet, IMAP and POP
  • Firewall base security, patch validation and version updates of threat security for threat detection modules.

What is a Firewall?

A firewall is a network security device that monitors incoming and outgoing traffic; it allows or blocks data packets based on its own security rules. A data packet is a unit of data made into a single package that travels along a defined network path. Internet Protocol (IP) transmissions use data packets for data that navigates the Web, and in other types of networks. The purpose of a firewall is to maintain a barrier between your internal network and incoming traffic from external sources like the internet. The firewall can block unwanted traffic like viruses and hackers.

Network security is a wide term that covers many technologies, devices and processes. It is a set of rules and configurations that protect the integrity, confidentiality and accessibility of computer networks and data using software and hardware technologies. Every company needs some network security solutions in place to keep them safe from the growing landscape of cyber threats taking place worldwide.

Today’s network architecture is complicated and businesses face a threat environment that changes constantly. Cyber criminals are always trying to find and exploit your system’s vulnerabilities. These vulnerabilities can exist in a range of areas such as devices, data, applications, users and locations. There are various network security management tools and applications that we use to deal with individual threats and regulatory non-compliance. A few minutes of system downtime due to an attack can cause massive disruption to your company’s profits and reputation. Therefore, it is essential that you put these security measures in place.

A proxy firewall is an early type of firewall device that acts as the gateway from one network to another for a specific application. Proxy servers can provide extra functionality such as content caching and security by preventing direct connections from outside the network. However, the activity of the proxy firewall can affect throughput capabilities and the applications they can support.

A stateful inspection firewall is often called a traditional firewall. It allows or blocks traffic based on state, port, and protocol. This kind of firewall monitors all activity from the opening of a connection until it is closed. It makes filtering decisions on administrator-defined rules and context, which refers to using data from previous connections and packets belonging to the same connection.

Modern firewalls include next-generation (next-gen) capabilities. These capabilities overcome the problems of stateful inspection firewalls and provide you with visibility of network traffic and user activity. UTM (Unified Threat Management) firewalls have embedded security detection and prevention engines that give further examination with functions such as Intrusion Detection Systems  and Intrusion Prevention Systems (IDS / IPS), Network AV (Anti-Virus), Application filtering, and Web filtering. We have the necessary skills to perform Man-in-the-Middle SSL traffic inspection (MitM).

At ConnectDS, our firewalls include:

  • Standard firewall capacity like stateful inspection
  • Co-ordinated intrusion prevention
  • Application awareness and control to find and block malicious apps
  • Upgrade pathways to include future information feeds
  • Techniques to address changing security threats

A threat focused NGFW (Next Generation Firewall) means you can:

  • Know which assets are most at risk with comprehensive environment awareness
  • Swiftly react to attacks with intelligent security automation that creates policies and improves your defences dynamically
  • Improve the discovery of evasive or suspicious activity with network and endpoint event correlation
  • Lessen the time from detection to cleanup with retrospective security that monitors for suspicious activity and behaviour after the first inspection
  • Ease administration and reduce intricacy with policies that protect across the whole attack continuum.

Firewalls are much more complex today than in the past. In an up to date business, firewalls deal with complex networking and remote access. Due to embedded next-gen and UTM (Unified Threat Management) features it is more essential than ever to make sure these devices are arranged in the most favourable way to protect your company from internal and external threats carried out by cyber criminals.

Common FAQs about Firewall Security Assessment

Please see below for some common questions on our firewall security assessment, if you would prefer to speak to someone then give us a call and speak to one of our team in our Surrey or London offices.

ConnectDS conduct firewall audits using a specialist appliance to probe the firewall and attempt to assess and bypass restrictions currently in place.
For any questions regarding the right firewall for you, speak to a member of our team.
Unified Threat Management (UTM) Firewall is a single device responsible for network security, including anti-virus anti-spam, content and web filtering.
A next-gen firewall is a conventional firewall combined with other network device filtering such as deep packet inspection and intrusion detection.

There are 3 main types of firewall:

  • Hardware firewalls – these sit at the edge of your network.
  • Software firewalls – these sit on each endpoint or servers, such as web application firewalls.
  • Cloud firewalls – this is a firewall maintained and run on the internet, also known as Firewall-as-a-Service (FaaS).
Rules define what traffic is allowed or blocked by your companies firewall.
In order to get the most out of your firewall, network traffic should be monitored on a regular basis and firewall configurations should be adjusted accordingly.
Traditional firewalls have many limitations compared to newer next-gen firewalls provided by ConnectDS.
A great way to clean up and optimise firewall rules is with a firewall security audit.
Speak to a member of our team on how you can increase the security of your firewall.

Our Firewall Security Assessment
will help your Secure Your Network

Please talk to our friendly team for more information on our comprehensive firewall security assessment. Our team are located out of our London and Surrey offices but work with businesses across the UK.

cyber exchange member logo
Cyber Essentials logo
CISP logo
IASME logo


Sign up to our email newsletter – opt out at anytime -View our Privacy Policy.