If remote users connect to your network via VPN, you run the risk of hackers using it as an entry point to your internal network. Foundstone helps avoid malicious infiltration and ensures true end-to-end security with the Virtual Private Network (VPN) Security Assessment.
We review the policy and procedures used to support and administer the VPN, and assess the current configuration of the VPN and associated systems. During the review, Foundstone's security consultants work with system and network administrators to obtain necessary information to evaluate existing policy and procedure documentation, assess actual procedures in use for VPN support and administration, review the technical architecture of the VPN deployment, and identify issues in any of these areas.
Foundstone also performs a technical assessment of the VPN configuration, which may include external and internal network scans, authentication and authorization testing, and system vulnerability testing. The report deliverables include an executive summary overview, a detailed technical report, and detailed testing results. Foundstone VPN Security Assessment methodology consists of the following: