Security Configuration Management

It is estimated that 65% of cyber-attacks exploit systems with vulnerabilities introduced by configuration errors. This is one of the major reasons why configuration and change management has been gaining significance in the security aspect of the network. Misconfigurations known as vulnerabilities create significant security risks.

All network devices require scripts or configurations that determine how they should work in a network. These configurations are manually written and differ from vendor to vendor. Furthermore, device configurations change frequently due to application or technology deployments, network expansions, organizational changes and device failures or end-of-life replacements.


Deploying and managing device configurations in large networks with hundreds of devices makes it a time consuming, extensive process that is very error-prone.

Security configuration management is one of the most effective security controls you can implement, and it is the foundation to many regulatory standards and security frameworks. Proactive, continuous security configuration management makes it harder for attackers to compromise your assets. The Summit team has almost 20 years’ experience in helping prevent this for our clients