iVOLUTION SECURITY TECHNOLOGIES - Discover. Determine. Defend - ips testing

By: Ivolution Security Technologies  09-12-2011
Keywords: Penetration Testing, Penetration Test

Network intrusion detection and prevention systems (IDPS) and their architectures are often deployed without performing systems or architectural testing. Testing is required to provide assurance that the systems work as advertised in addition to their tactical positioning within the infrastructure they are attempting to defend.  Depending on the deployment model, IDPS can be passive or active and can impact your organization and its business objectives. It is critical that systems, once deployed, should perform the functions required by the business. Any IDPS system should be part of the organizational security policy by clearly demonstrating its role in the protection of information assets.

If you are currently working with IDPS or are evaluating products, penetration testing can help you understand the strengths and limitations of your systems and their architecture.

Testing IPS and IDS effectiveness
Exploits are developed on a constant basis to circumvent, target and defeat intrusion detection and prevention systems. It is critical for your organization to understand the various techniques attackers will utilize to achieve their goals. Penetration testing provides the information required to understand the attack vectors, tools, techniques and technologies that can make the difference in any attack.  It allows you to perform controlled, systematic attempts to bypass and identify weaknesses in your IDPS technology and deployment.  This permits you to efficiently and effectively understand how your system can be circumvented before attackers do.

Effectively Architect Your IPS Environment
To be deployed successfully any IDPS must be tailored to your specific needs and operational environment. This can only be achieved through direct and active testing.

Utilizing iVOLUTION Security for this portion of testing provides you with the skills to efficiently architect and design your IDPS infrastructure. iVOLUTION Security empowers you with a professionally developed framework that leverages our skills and exploit techniques to demonstrable IDPS effectiveness as well as potentially critical weaknesses and vulnerabilities.

Bypassing an IDPS can be effortless (as simple as leveraging encryption technologies) or complex (manually writing exploit code with advanced technical knowledge and skills). A penetration test against your IDS or IPS infrastructure using these techniques enables you to deploy real-world exploits and advanced traffic shaping and modification techniques, such as fragmentation, overlap and encryption to expose the weaknesses in your IDPS.

An effective IDPS solution may require considerable investments and resources. Organizations should be prepared to technically evaluate a chosen solution, both prior to purchase and after deployment. Any deployed system must be sure to deliver value. Penetration testing safely allows you to create real-world intrusion events to effectively measure the systems deployed and the return on security investment.

Your Security Investments
iVOLUTION Security and our team of professionals can help you verify your organization's security posture. We can provide a security baseline and detailed information about definite, tangible, real-world threats to your information assets. This allows any organization to make effective budget decisions to leverage the time, effort and financial resources that must be addressed in any security investment.
The real world is always on.

Keywords: Penetration Test, Penetration Testing

Contact Ivolution Security Technologies


Print this page

Other products and services from Ivolution Security Technologies


iVOLUTION SECURITY TECHNOLOGIES - Discover. Determine. Defend - pci dss scanning

Section 11.3 specifically points to requirement for security testing11.3 Perform penetration testing at least once a year and after any significant infrastructure or application upgrade or modification (such as an operating system upgrade, a sub-network added to the environment, or a web server added to the environment).


iVOLUTION SECURITY TECHNOLOGIES - Discover. Determine. Defend - vul assessment

Using a combination of experience and technologies the vulnerability assessment pinpoints specific vulnerabilities and identifies underlying problems. To gain the maximum advantage organizations should promote vulnerability assessments that work hand in hand with penetration testing. IVOLUTION Security audit services provide insights into as many application or operating system weaknesses as possible.



We leverage the skills of our staff as well as public, custom, and professional tools and technologies to provide complete security auditing and testing services that add value, depth, and scope to your network and application testing initiatives. Deep Security Expertise All iVOLUTION consultants are seasoned practitioners of penetration testing, vulnerability assessment, and security auditing services and have accumulated years of experience.


iVOLUTION SECURITY TECHNOLOGIES - Discover. Determine. Defend - pen testing

Our team of specialists targets your network infrastructure, information assets and associated applications to identify and evaluate possible weaknesses. IVOLUTION’s penetration testing service mimics an attacker that has targeted your organization and it’s information assets and mission critical systems. An organization’s security posture is analyzed for vulnerabilities in technologies, applications and security design though active testing.