In a VPN implementation, remote systems are provided with a secure route for internal network access. Potentially, such access is obtained from physically insecure locations.
This network presence; coupled with potential flaws in authentication mechanisms, implementation framework or configuration state; could result in the compromise of network boundaries from an external VPN endpoint. Such a compromise may lead to the VPN becoming a conduit for an attack on the organisation’s internal network infrastructure.
Why perform a VPN assessment?
To identify firewal configuration vulnerabilities, determines if there are any vulnerabilities inherent in the network devices and highlights general issues with the architecture.
- To verify the security of both, your SL based VPN and your IPsec based VPN.
- To verify that you have end-to-end security and not just an encryted tunnel.
Get in touch!
Get in touch and speak to an expert consultant on