What we review

Our security consultants will review your firewall configuration and rulesets, identifying, verifying and prioritising weaknesses based around:

  • Known Vulnerabilities: Missing security updates is a common weakness that can lead to devices being compromised.
  • Authentication: Authentication systems often have weaknesses such as username enumeration, lack of brute force protection, or even just common and weak passwords.

  • Access Control Systems: Where access is granted to hosts, services, or ports, our consultants will review the access to determine if it introduced unexpected weaknesses in the protection or if the allowed access is overly permissive.


Download our one pager for a more in-depth look at how we review your firewall settings.


We love what we do, and we’re passionate about cybersecurity. We continuously invest in research, technology, our people, and the depth of security services we offer.

Every company we partner with gets the full Secarma experience, where we get to know your fears, your challenges and your business goals. Our accredited consultants then deliver a truly bespoke experience to ensure your ongoing peace of mind.

It’s through our decades of training and experience, that we’re able to help protect your business.

  • EXPERIENCE Deep understanding of penetration testing, application security, cybersecurity & training.

  • METHODOLOGY Tailored, finely-tuned, in-house methodologies based on industry best practice.

  • VALUE We treat all clients as partners, and you'll have ongoing access to our consultancy team.

  • EDUCATION We help embed a culture of security, and teach developers how to think like hackers.

Secarma Accreditations Crest Accredited IT Health Check Service ISO 9001 IS0 27001 Cyber Essentials Accreditation