Contact Us
Contact Us
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Subscribe to our newsletter
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.

Network Segregation Review

Network segregation process ensures restrictions are in place to avoid unnecessary exposure of systems within particular networks.

Read more
Complete this form to get in touch

Are you happy for Defendza to keep you informed on the latest developments in cyber security (attack reports, guidance, DIY articles)? Of course you can unsubscribe at any time. Please see our privacy policy

Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.


Network segregation involves dividing a network into smaller chunks where each chunk can be defined with rulesets to control the communication between specific hosts and services.

Corporate environment often use VLANs to separate data from telephony, or production environments from corporate environment.

Why you need Network Segregation Review?

Numerous real life examples exist where network segmentation is mandatory due to pro-active internal initiatives or regulatory decisions. In PCI industry, network segmentation is done to avoid exposure of CDE (Cardholder Data Environment) towards corporate environment. Similarly, in retail sector, corporate environment is cordoned off from production environment where customer and production website networks operate.


Communication & Debrief

We take customer communication as seriously as reporting or assessment execution. We engage with customers during all stages, and ensure that customer contacts are up to date in the language they understand. Post engagement, a free debrief is conducted to help the customers understand the weaknesses and prepare a mitigation plan.


The assessment-execution phase is followed by the analysis & reporting. Defendza performs analysis on the testing output, evaluates the risk impact and likelihood of exploitation in realistic scenarios before providing action plans to remediate the identified risks. All our reports address business as well as the technical audience with supporting raw data, including mitigation measures at strategic and tactical levels. 

Network Segregation Checks

Layer2 and layer3 checks are performed to check for weaknesses in network segregation controls. These include consultants being physically present in one network segment and attempt access into target network segments. Various other checks include scans to identify allowed traffic for multiple protocols. By attempting VLAN hopping attacks using computers to mimic as switch, it's possible to identify weaknesses in switch configurations. 

Traffic Analysis

Network traffic is analysed to understand the IP address, network scheming, services and protocols in use. From broadcast addresses, responses and proprietary protocols, it's possible to find out the size of network, network devices in use, their software versions, services in use and the related networks in communication.

Reconnaissance and Intelligence Gathering

The first step of reconnaissance activity includes passively identifying the hosts and services visible on the Internet. This includes limited Open Source Intelligence phase. During red teaming or related offensive security projects, this exercise involves extensive information gathering about a customer's people, processes and technology in use. Research based threat intelligence is an integral part of any offensive exercise.

Overall, the aim of this phase aims to harvest as much information as possible about your organisation that would be used for later phases.

Lets talk about your security requirements 
Call Us Now

Why Defendza ?

Our No Nonsense Approach

Client service underpins everything we do.

Our advisory services follow a 'no surprises' approach offered with clear and concise communication. All the proposals are customised centering on project-based requirements as captured during the scoping discussions. 

Focus on Customer Business

Cyber security is a business enabler. We make sure we understand your business and its needs so that we can help you grow your business in the certain knowledge that it’s protected.

In-house experts

Our teams are led by veteran security consultants accredited by CREST standards for the last several years. Our experience shows that our clients are best served by giving them the right advice for their cyber security needs. We do not believe in spreading fear, uncertainty and doubt to generate more business.

Key Benefits

Our network security team is waiting
Call Us Now


"My experience to date with Defendza has been very positive, I look for a flexible, knowledable security "partner" when I engage a PT firm. Pentest means many things to many people and there are many different use cases for both the testing activity and the report generated and I need someone to work with me to get the absolute best value out of my security budget."

Information Security Officer
Insurance Group

Excellent people to work with. Very good knowledge of requirement and give us correct findings with excellent remedy to improve our security for our B2B portal site."

Head of Technical & Business Improvement
Leading Pharmaceutical Manufacturer

"I thought it was a highly professional and thorough exercise and I would have no hesitation recommending Defendza to any of my connections."

Director, Software Engineering
Global Information and Analytics Company

"Good personal service. We are delighted with the work Defendza did for us. Highly recommended."

Manchester headquartered Global Fashion Brand

"Extremely satisfied with approach, speed and end results. Thanks."

International fashion label and store

"My experience of the Defendza team was 5 star.  They were so helpful, and their technical delivery and client communication were excellent."

Director, Software Development
Corporate Services Company

"Harman was great, really knowledgeable, helpful and on hand to answer any questions. The final report was very clear providing the technical information in an easy to read format which could be understood by the leaders of the business. Really enjoyed working with Defendza and look forward to working with them again in the future. Thank you!

IT manager
Housing Trust


Manufacturers Can’t Afford the Cyber Risks


Much of the manufacturing industry has failed to take proactive steps to defend against cyber attacks—which is a notable problem considering the growing threats the industry faces