Build and configuration reviews
Securing your systems and devices to a high standard.
What is a build and configuration review?
Build and configuration reviews assess operating system and device configurations to ensure they are in line with security best practices.
We provide build and configuration reviews for a multitude of systems including desktops, mobiles, laptops, servers, and network devices (such as firewalls). With each review, you will receive a detailed report documenting the vulnerabilities that affect your devices and our recommendations for fixing them.
Why your business needs a build and configuration review
Build and configuration reviews will ensure your organisation’s systems and devices are secure. They discover potential threats and weaknesses that may ultimately impact your business operations.
Build and configuration reviews are highly recommended for gold-build images to ensure systems are deployed in line with best practice. They are also useful for production systems to ensure the security and integrity of data within your live environment.
How Sentrium can support you
Sentrium is committed to providing you with a tailored cyber security solution to address your challenges. We conduct your build and configuration review based on your systems and devices, giving you an optimal solution that is both efficient and comprehensive.
We assess the configuration of your wireless networks to identify weaknesses and search for evidence of devices emitting wireless signals that may be used to gain unauthorised access. This ensures your workplace can remain flexible and secure for legitimate users.
Active Directory Review
An Active Directory review is a cost-effective way to improve your security. It ensures policies, processes and controls are implemented throughout your organisation’s domain. We provide an in-depth review to ensure compliance with security best practices.
Firewalls provide security acting as a barrier between trusted and untrusted networks, controlling which communications can enter and leave your network. We review your firewall configurations and rule sets to ensure they are operating securely in line with your organisation’s requirements.
Laptop / Desktop Review
A review of your laptop or desktop assesses the security of your device including its hardware, software and data. We identify vulnerabilities and weaknesses in your device configuration that could be used to gain unauthorised access to sensitive data, systems or networks.
A review of your Windows or Linux servers identifies vulnerabilities that could lead to a security breach. Our assessment of your servers will ensure their configuration is in line with security best practices to protect your IT infrastructure.
Mobile Device Review
A security review of your iOS and Android mobile devices will detect whether the device can be compromised should it be lost or stolen. We identify vulnerabilities in your devices to ensure your organisation’s sensitive data cannot be accessed.