Stealth penetration testing is a vital method for allowing organizations to determine how exposed their networks are to real world threats by showing how well corporate security processes, procedures and technologies hold up against authorized but unannounced attacks by veteran security specialists using advanced hacking techniques.

Progent’s security experts can perform extensive in-depth penetration testing without the knowledge of internal IT resources. Such testing uncovers whether existing security monitoring tools such as intrusion detection alerts and event log monitoring are correctly set up and actively monitored.

Penetration testing can encompass any or all of the following areas:

  • Running a series of port scanning tools to identify open network access vectors and to identify and characterize a customer's network environment and overall security level.
  • Running a series of exploit identification tools that test all open access vectors against a large database of known vulnerabilities resulting from servers that are not up to date on security patches, out of date firmware/software, poorly configured servers and devices, and default or common installation passwords.
  • Evaluation of wireless network security by attempting on-site access from publicly accessible locations including parking lots, hallways, bathrooms, and physically adjacent spaces or floors. Identification of security methods utilized by wireless infrastructure and running known exploit tools to gain access
  • Attempt to determine remote access capabilities of network and perform exploit and brute force attack methods to gain access through remote access infrastructure.
  • Perform remote office security evaluation and testing, and determine whether remote sites can be used as a vector into the corporate network through VPNs or other private network infrastructure.
  • Performing brute force account and password attacks using a database of over 40 million possible passwords
  • For devices and servers that are successfully penetrated, Progent security experts will manually use assorted hacker techniques to extend such exploit vectors to gain an understanding of the full network environment and see how many internal systems can be accessed and compromised. This type of security testing can expose the full scope of the vulnerability of a network environment.
  • Determination of internal and external network addressing configuration through email beaconing techniques
  • Performing various Denial of Service attacks, coordinated with internal senior management to determine whether it is possible to stop or hinder network productivity. Once proof of impact is reported, such testing can be immediately ceased to avoid impact to actual business productivity.
  • Perform PBX remote access and voice mail security testing
For larger companies, Progent can perform anonymous physical security penetration testing, including attempts to gain unauthorized/unchecked access to physical premises by pretending to be authorized personnel, with proof of success from copying of confidential information and accessing internal network resources behind all perimeter firewalls.

Progent experts can use social engineering techniques and public information to attempt customized password penetration testing utilizing information such as employees’ family member names, birthdates, home addresses, and phone numbers. Progent team members can often quickly uncover this information through Internet online search and public records. Progent can uncover employee names/email addresses through publicly accessible information on the Internet, from PBX voice mail directories, public records filings, marketing materials and press releases, web sites, and receptionist.

Progent will provide a complete report of methods used and vulnerabilities uncovered during stealth penetration testing, along with a detailed list of recommended remediation steps. Progent can then work with internal IT staff to perform an audit and evaluation of the actual security protection, configuration, tools, and processes and help your company develop a comprehensive security plan.

ProSight Low-Cost Managed Services for Information Assurance
Progent's affordable ProSight line of network management outsourcing services is intended to provide small and mid-size organizations with enterprise-class support and cutting-edge technology for all facets of information assurance. Managed services available from Progent include:

  • ProSight Active Security Monitoring (ASM): Next Generation Endpoint Protection and Ransomware Recovery
    ProSight Active Security Monitoring (ASM) is an endpoint protection (EPP) service that utilizes next generation behavior analysis technology to defend endpoints as well as physical and virtual servers against modern malware attacks like ransomware and file-less exploits, which easily get by traditional signature-matching AV products. ProSight ASM protects on-premises and cloud resources and provides a single platform to address the complete malware attack lifecycle including filtering, detection, containment, remediation, and post-attack forensics. Key features include single-click rollback using Windows Volume Shadow Copy Service and automatic network-wide immunization against newly discovered attacks. Learn more about Progent's ProSight Active Security Monitoring endpoint protection and ransomware defense.

  • ProSight Enhanced Security Protection (ESP): Unified Endpoint Protection
    Progent's ProSight Enhanced Security Protection (ESP) managed services deliver economical in-depth protection for physical and virtual servers, workstations, mobile devices, and Exchange email. ProSight ESP utilizes adaptive security and modern behavior analysis for continuously monitoring and reacting to cyber assaults from all attack vectors. ProSight ESP offers two-way firewall protection, intrusion alarms, endpoint control, and web filtering through leading-edge tools packaged within a single agent accessible from a single console. Progent's security and virtualization consultants can assist you to design and implement a ProSight ESP environment that addresses your company's unique needs and that allows you achieve and demonstrate compliance with legal and industry information security standards. Progent will help you specify and implement security policies that ProSight ESP will manage, and Progent will monitor your network and respond to alarms that require urgent action. Progent's consultants can also help your company to set up and test a backup and restore system like ProSight Data Protection Services so you can get back in business rapidly from a potentially disastrous security attack such as ransomware. Find out more about Progent's ProSight Enhanced Security Protection (ESP) unified physical and virtual endpoint protection and Microsoft Exchange email filtering.

  • ProSight Data Protection Services: Managed Backup and Recovery
    ProSight Data Protection Services from Progent provide small and medium-sized organizations a low cost end-to-end solution for reliable backup/disaster recovery. Available at a fixed monthly price, ProSight DPS automates your backup processes and enables rapid recovery of vital files, apps and virtual machines that have become unavailable or damaged as a result of hardware breakdowns, software glitches, disasters, human error, or malicious attacks such as ransomware. ProSight DPS can help you back up, retrieve and restore files, folders, applications, system images, plus Hyper-V and VMware virtual machine images. Critical data can be protected on the cloud, to an on-promises storage device, or to both. Progent's BDR specialists can deliver advanced support to configure ProSight DPS to be compliant with government and industry regulatory standards such as HIPPA, FIRPA, PCI and Safe Harbor and, whenever needed, can help you to restore your business-critical information. Read more about ProSight DPS Managed Backup and Recovery.

  • ProSight Email Guard: Inbound and Outbound Spam Filtering, Data Leakage Protection and Content Filtering
    ProSight Email Guard is Progent's email filtering and encryption platform that uses the services and infrastructure of leading information security companies to provide centralized management and world-class security for all your email traffic. The hybrid architecture of Email Guard integrates a Cloud Protection Layer with an on-premises gateway device to offer complete defense against spam, viruses, Denial of Service Attacks, Directory Harvest Attacks, and other email-borne threats. The Cloud Protection Layer serves as a first line of defense and blocks the vast majority of unwanted email from reaching your network firewall. This decreases your exposure to external attacks and conserves system bandwidth and storage space. Email Guard's onsite gateway appliance adds a further layer of analysis for incoming email. For outbound email, the local gateway provides AV and anti-spam protection, DLP, and encryption. The onsite security gateway can also assist Exchange Server to track and protect internal email that originates and ends inside your security perimeter. Find out more about Progent's ProSight Email Guard spam filtering, virus blocking, content filtering and data leakage prevention.

  • ProSight WAN Watch: Infrastructure Remote Monitoring and Management
    ProSight WAN Watch is a network infrastructure monitoring and management service that makes it easy and affordable for small and mid-sized businesses to map out, track, optimize and debug their connectivity appliances such as routers and switches, firewalls, and load balancers plus servers, client computers and other devices. Using state-of-the-art RMM technology, ProSight WAN Watch makes sure that infrastructure topology diagrams are kept updated, copies and manages the configuration of almost all devices on your network, tracks performance, and generates notices when potential issues are detected. By automating tedious network management processes, ProSight WAN Watch can knock hours off common tasks such as network mapping, expanding your network, locating devices that require important updates, or resolving performance bottlenecks. Find out more about ProSight WAN Watch network infrastructure management consulting.

  • ProSight LAN Watch: Server and Desktop Remote Monitoring and Management
    ProSight LAN Watch is Progent’s server and desktop monitoring managed service that incorporates advanced remote monitoring and management technology to keep your network running efficiently by checking the state of vital assets that drive your business network. When ProSight LAN Watch detects an issue, an alert is transmitted automatically to your specified IT management personnel and your assigned Progent consultant so that any looming problems can be resolved before they have a chance to impact your network Find out more about ProSight LAN Watch server and desktop remote monitoring consulting.

  • ProSight Virtual Hosting: Hosted Virtual Machines at Progent's World-class Data Center
    With Progent's ProSight Virtual Hosting service, a small or mid-size business can have its key servers and applications hosted in a secure Tier III data center on a fast virtual host set up and managed by Progent's IT support professionals. With Progent's ProSight Virtual Hosting model, the customer owns the data, the OS platforms, and the apps. Since the environment is virtualized, it can be moved immediately to an alternate hosting solution without requiring a lengthy and technically risky configuration procedure. With ProSight Virtual Hosting, you are not locked into a single hosting service. Learn more about ProSight Virtual Hosting services.

  • ProSight IT Asset Management: Network Documentation Management
    Progent's ProSight IT Asset Management service is an IT infrastructure documentation management service that allows you to create, maintain, find and safeguard data related to your IT infrastructure, processes, applications, and services. You can quickly locate passwords or serial numbers and be warned about upcoming expirations of SSL certificates or domains. By cleaning up and organizing your network documentation, you can eliminate up to 50% of time spent looking for vital information about your IT network. ProSight IT Asset Management includes a centralized repository for holding and sharing all documents related to managing your network infrastructure such as recommended procedures and self-service instructions. ProSight IT Asset Management also supports a high level of automation for collecting and relating IT information. Whether you’re planning improvements, doing maintenance, or responding to a crisis, ProSight IT Asset Management gets you the data you require as soon as you need it. Find out more about ProSight IT Asset Management service.
ProSight Network Audits
Progent's ProSight Network Audits are a fast and low-cost way for small and medium-size businesses to get an objective evaluation of the overall health of their IT system. Based on some of the leading remote monitoring and management (RMM) tools available, and supervised by Progent's world-class team of information technology experts, ProSight Network Audits help you see how well the configuration of your essential infrastructure assets adhere to industry best practices. The Basic and Advanced options for ProSight Network Audit services are available at a low, one-time cost and deliver instant ROI like a more manageable Active Directory environment. Both also include one year of state-of-the-art remote network monitoring and management (RMM). Benefits can include lower-cost network management, better compliance with information security requirements, higher utilization of network resources, quicker troubleshooting, more dependable backup and restore, and less downtime. See more about ProSight Network Audits network infrastructure review.

Progent's ProSight Ransomware Preparedness Report Service
Progent's ProSight Ransomware Preparedness Report service is a low-cost service based on a brief interview with a Progent backup/recovery expert. The fact-finding interview is intended to help assess your company's preparedness to stop or recover quickly after a ransomware attack. Progent will consult with you personally to gather information about your existing antivirus tools and backup platform, and Progent will then produce a custom Basic Security and Best Practices Report describing how you can follow industry best practices to create an efficient security and backup/recovery system that aligns with your company's requirements. For additional information, refer to Progent's ProSight Ransomware Preparedness Report.

Contact Progent for Penetration Testing Consulting
If you need security engineering help, call Progent at 800-993-9400 or go to Contact Progent.
















© 2002- 2018 Progent Corporation. All rights reserved.


More topics of interest:
  • Microsoft Lync Server 2010 Technology Professional
  • Stealth Penetration Testing On-site Technical Support Redwood City, California
  • Support Services for Stealth Penetration Testing Newark
  • Security Penetration Testing IT Consultant Mobile
  • Jersey City, NJ Microsoft, Cisco and Security Certified Experts Stealth Penetration Testing On-site Technical Support
  • Stealth Penetration Testing Integration Support Jackson, WY