iVOLUTION SECURITY TECHNOLOGIES - Discover. Determine. Defend - vul assessment

By: Ivolution Security Technologies  09-12-2011
Keywords: Auditing Services, vulnerability assessment, Information Assets

iVOLUTION Security audit services provide insights into as many application or operating system weaknesses as possible.  To properly identify a threat you must first identify what the threat actually is. Vulnerability can be defined as: a weakness in a mechanism that threatens the confidentiality, integrity or availability of an asset. This definition provides the very core of many of the compliance regulations and mandates in existence today and into the future.

Using a combination of experience and technologies the vulnerability assessment pinpoints specific vulnerabilities and identifies underlying problems. The analysis integrates detailed vulnerability and countermeasure information for:

  • Session Security (Authentication and Authorization)
  • Session management
  • Data integrity and confidentiality
  • Privacy concerns
  • Information leakage
  • Fundamental Design Security
  • HTML Source Management
  • Input Validation
  • SQL Injection
  • Cross Site Scripting
  • Token Analysis (Cookies, Custom Session IDs, etc.)

Our vulnerability assessment process allows us to not only identify vulnerabilities but also discern the actual threats vulnerabilities pose, assess their potential impact and associated risk and assist in remediation efforts.

Leveraging our vulnerability assessment and auditing services provides assurance that your critical information assets and enterprise applications will be as secure as possible. Our systematic approach to vulnerability assessment ensures that security is always a core element, and can help by providing precise, actionable information to remediate vulnerabilities and remain compliant. Vulnerability assessment is only a portion of the process.

To gain the maximum advantage organizations should promote vulnerability assessments that work hand in hand with penetration testing.

Keywords: Auditing Services, Information Assets, vulnerability assessment

Contact Ivolution Security Technologies


Print this page

Other products and services from Ivolution Security Technologies


iVOLUTION SECURITY TECHNOLOGIES - Discover. Determine. Defend - pci dss scanning

Section 11.3 specifically points to requirement for security testing11.3 Perform penetration testing at least once a year and after any significant infrastructure or application upgrade or modification (such as an operating system upgrade, a sub-network added to the environment, or a web server added to the environment).



We leverage the skills of our staff as well as public, custom, and professional tools and technologies to provide complete security auditing and testing services that add value, depth, and scope to your network and application testing initiatives. Deep Security Expertise All iVOLUTION consultants are seasoned practitioners of penetration testing, vulnerability assessment, and security auditing services and have accumulated years of experience.


iVOLUTION SECURITY TECHNOLOGIES - Discover. Determine. Defend - pen testing

Our team of specialists targets your network infrastructure, information assets and associated applications to identify and evaluate possible weaknesses. IVOLUTION’s penetration testing service mimics an attacker that has targeted your organization and it’s information assets and mission critical systems. An organization’s security posture is analyzed for vulnerabilities in technologies, applications and security design though active testing.


iVOLUTION SECURITY TECHNOLOGIES - Discover. Determine. Defend - ips testing

If you are currently working with IDPS or are evaluating products, penetration testing can help you understand the strengths and limitations of your systems and their architecture. Testing is required to provide assurance that the systems work as advertised in addition to their tactical positioning within the infrastructure they are attempting to defend.