Firewall Best Practices Hero Banner_1440x590_1811-15.jpg

Indeni Best Practice Assessment

Find out if your Check Point and Palo Alto Networks Firewalls meet industry compliance and vendor best practices.

Take a deep dive into:

  • Visibility into the health of devices
  • Insight into areas configuration deviations
  • Expert recommendations for remediation

Space is limited! Complete form to the right to request a free assessment.

Request Assessment

What is a Best Practice Assessment?

The Indeni Best Practice Assessment (IBPA) focuses on the most critical devices in your network - your firewalls. Through the IBPA users gain visibility into the health of their devices and uncover areas in which devices are deviating from configuration and performance best practices. Exiting the IBPA, Enterprises have visibility into the health of their devices, with expert recommendations for where risks exist.

The scope of the service will not only identify IT risks, but also the points of intersection between these risks and the following key areas:

Maintenance | Cluster Availability | Network Visibility | Compliance | Security Best Practices | Vendor Best Practices

For Enterprises to properly and thoroughly address risks related to this broad spectrum of topics, they should first conduct an expert review that identifies and prioritizes the risks found. Only then can the organization define and adopt an IT operations framework that is truly adequate for their business. The Indeni Best Practice Assessment is specifically designed to provide our clients with this preliminary step in addressing this important issue.

What devices are covered?

The IBPA delivers deep and actionable insights around these firewalls:

Check Point | Palo Alto Networks

Check Point-1
Palo Alto-2

Why take the IBPA?

Best Practice Automation is an area where many organizations lack skills or experience to even begin scoping what changes need to be put in place. In addition, there are many technical, environmental and human-based factors to be considered when attempting to uncover and mitigate these types of risks. Issues lurking in your environment that do not meet best practices may include:

  • Weak cipher used with SSL profiles
  • Default management certificate used
  • Forwarding servers listening on all VLANs
  • Default Action on Service Down used
  • iRule(s) uses the deprecated matchclass command
  • Fallback host used in HTTP profile

Without a knowledge-based approach to best practice implementation, many organisations risk losing connectivity due to performance and configuration deviations. In addition, we are seeing evidence that many organizations, particularly in the public and financial sectors, are coming under increasing pressure to provide ‘proof of care’ through the demonstration of rigorous risk management controls.