Keep in Touch

Have a suggestion, comment, or question? Drop us a line and we'll reply you soon!



(888) 774-9244


P.O. BOX 517 Orinda CA

Firewall Audits and Optimization

Firewall configuration has become more challenging as more network-based services are added, along with the increasing number of protocols necessary to flow through the firewall. Thus, risks that impose a threat to the organization's security often go undetected.

Secure Client VPN Access

For efficiency and productivity companies utilize remote access VPN. In case of an emergency network outage, remote access VPN must be designed properly and efficiently.

Secure Partner and Vendor Connections

As companies rely more heavily on their networks and online business for business (B2B) transactions  (this is important as only relevant information is allowed in and out), network security becomes increasingly important. How much network access a company gives to its partners or suppliers, along with the security and data-recovery strategies of the partners, will affect the company's risk level. When you integrate your network with the networks of other companies, whatever happens to them can also happen to you.

Security risks from B2B transactions often relate to privacy, which includes protecting credit-card information and other data from outsiders. Authentication is another concern. It is critical for companies to verify that the people with whom they are transacting business are the people they claim to be.

Firewall Audits

Do you feel like your firewall rules are out of order?

Do you have too many rules and are they too complex? Not sure whats going on?

We have specialized tools we can use to solve these issues and optimize rules offline. Whether you have 10 rules or 1,000, they will be optimized in sequence reflecting your unique traffic needs and patterns.

Companies are usually concerned with incoming traffic and are not watching another threat--outbound traffic. However, this is incredible vital. Threats often come from within your network and data vulnerabilities often come from within your organization's walls.

So how do you protect your organization from internal threats? Next generation firewalls have capabilities, such as URL filtering, along with blocking known malware sites to protect employees and the organization as a whole from the exfiltration of data.

In summary, we do everything from cleaning your rules so that your firewall is optimized to then blocking outbound traffic to allow the necessary information to flow out of your network.

CipherEx uses specialized tools that analyze and optimize firewall policies to reduce risk and optimize firewall performance. Firewall rules are copied and analyzed offline with no packet transmission, reducing risk and improving change management.

Firewall Policy Optimization

Firewalls work more efficiently and are easier to manage when the policies are uncluttered and free of unused rules and objects. CipherEx engineers will help you to optimize rules and will point out possible security holes and threats in an easy-to-understand report.

Our Values


We accept responsibility for our work and are transparent in our communication.


"To improve is to change; to be perfect is to change often." -Winston Churchill We can handle ambiguity and roll with the punches.


We are relentless in the work we do. When you choose CipherEx you get the best.


We treat every company and their customers as if they were our own. Your success is our success!