A typical network audit comprises of a detailed architecture review, a thorough technical assessment for configurations for all critical components and cyber security review.

IP Network Security Testing Features :

Architecture review

  • Study existing architecture

  • Understand business and map the network

  • Perform Gap Analysis

  • Create list of strategic solutions

  • Create list of tactical solutions

  • Create detailed report of findings

Network Scalability Assessment

  • Study Network diagram

  • Study network components' configuration

  • Run tools to measure performance

  • Run tools to find chronic problems

  • Perform network load test if applicable

  • Create detailed report of findings

Penetration Testing Services


Network Security Audit is a fundamental part of any I.T Security standard; with security dynamics within your organization ever changing, new threats materializing, risks exposure increasing, new applications provisioned with inherent security concerns, auditing becomes an integral process to ensure risks are contained and controlled.

Frequent Network Security Audit allows your organization to periodically assess and review the security posture of a certain environments; identifying key risk factors, categorizing them based on priority and severity level, quantifying the risk and placing an action on the risk. Risk management process is tightly integrated with our Network Security Audit service.


Firewall audits are getting a lot of coverage these days thanks to standards such as SOX, PCI-DSS, and HIPAA. Even if you don?t need to comply with any of those standards ? yet ? business relationships with partners or customers may require you to show that your network is secure.

However, beyond compliance requirements, firewall audits are best practice for a very good reason. They increase your chances of catching weaknesses in your network security posture and finding places your policies need to be adapted. They also help prove you have been doing your due diligence in reviewing your security controls and policy controls, should you ever need to respond to a lawsuit, breach or regulatory issue that call your security standards into question.


Server audit performs a detailed security check for the following items :

  • System Configuration
  • System Accounts Policy
  • Audit Policy Settings
  • Registry Key Values
  • User Accounts Defined On Your System
  • Local Groups and their Members
  • Global Groups and their Members
  • Last Logons, 30 Days and Older
  • Passwords, 30 Days and Older
  • Passwords that Never Expire
  • Invalid Logon Attempts Greater than 3
  • Users not Allowed to Change Passwords


Patching is the process of repairing system vulnerabilities which are discovered after the infrastructure components have been released on the market. Patches apply to many different parts of an information system which include operating systems, servers, routers, desktops, email clients, office suites, mobile devices, firewalls, and many other components that exist within the network infrastructure. The number of patches which are required on a consistent basis can be overwhelming.

This is why it is necessary to devise a patch management process to ensure the proper preventive measures are taken against potential threats.The methods which are used for patch management will vary slightly according to the infrastructure design for each company information system. That said here is a general description of how patch management is typically deployed.


A review of the current state of your security architecture should form part of your ongoing security improvement initiatives. A security architecture includes the unified and integrated design, implementation, and operation of security practices across your organisation. This will enable you to formulate a plan to manage risks, maintain compliance with external regulations and contractual mandates, or at least align to industry best practice.

The Assessment includes: ? an interactive workshop to assess your current and desired state ? the option to choose from a selection of security assessments that assess the security landscape ? recommendations for improvement ? the development of a security roadmap based on business and technology initiatives

Our Culture

Valency Networks is a very agile, friendly and fun loving atmosphere and yet we maintain a cutting edge technical vibrant work environment.