Stealth penetration testing is a vital method for allowing organizations to determine how exposed their networks are to real world threats by showing how well corporate security processes, procedures and technologies hold up against authorized but unannounced attacks by veteran security specialists using advanced hacking techniques.

Progent’s security experts can perform extensive in-depth penetration testing without the knowledge of internal IT resources. Such testing uncovers whether existing security monitoring tools such as intrusion detection alerts and event log monitoring are correctly set up and actively monitored.

Penetration testing can encompass any or all of the following areas:

  • Running a series of port scanning tools to identify open network access vectors and to identify and characterize a customer's network environment and overall security level.
  • Running a series of exploit identification tools that test all open access vectors against a large database of known vulnerabilities resulting from servers that are not up to date on security patches, out of date firmware/software, poorly configured servers and devices, and default or common installation passwords.
  • Evaluation of wireless network security by attempting on-site access from publicly accessible locations including parking lots, hallways, bathrooms, and physically adjacent spaces or floors. Identification of security methods utilized by wireless infrastructure and running known exploit tools to gain access
  • Attempt to determine remote access capabilities of network and perform exploit and brute force attack methods to gain access through remote access infrastructure.
  • Perform remote office security evaluation and testing, and determine whether remote sites can be used as a vector into the corporate network through VPNs or other private network infrastructure.
  • Performing brute force account and password attacks using a database of over 40 million possible passwords
  • For devices and servers that are successfully penetrated, Progent security experts will manually use assorted hacker techniques to extend such exploit vectors to gain an understanding of the full network environment and see how many internal systems can be accessed and compromised. This type of security testing can expose the full scope of the vulnerability of a network environment.
  • Determination of internal and external network addressing configuration through email beaconing techniques
  • Performing various Denial of Service attacks, coordinated with internal senior management to determine whether it is possible to stop or hinder network productivity. Once proof of impact is reported, such testing can be immediately ceased to avoid impact to actual business productivity.
  • Perform PBX remote access and voice mail security testing
For larger companies, Progent can perform anonymous physical security penetration testing, including attempts to gain unauthorized/unchecked access to physical premises by pretending to be authorized personnel, with proof of success from copying of confidential information and accessing internal network resources behind all perimeter firewalls.

Progent experts can use social engineering techniques and public information to attempt customized password penetration testing utilizing information such as employees’ family member names, birthdates, home addresses, and phone numbers. Progent team members can often quickly uncover this information through Internet online search and public records. Progent can uncover employee names/email addresses through publicly accessible information on the Internet, from PBX voice mail directories, public records filings, marketing materials and press releases, web sites, and receptionist.

Progent will provide a complete report of methods used and vulnerabilities uncovered during stealth penetration testing, along with a detailed list of recommended remediation steps. Progent can then work with internal IT staff to perform an audit and evaluation of the actual security protection, configuration, tools, and processes and help your company develop a comprehensive security plan.

ProSight Fixed-price Managed Services for Information Assurance
Progent's value-priced ProSight portfolio of network management outsourcing services is intended to provide small and mid-size organizations with enterprise-class support and cutting-edge technology for all facets of information assurance and compliance. ProSight managed services available from Progent include:

  • ProSight Email Guard: Inbound and Outbound Spam Filtering, Data Leakage Protection and Content Filtering
    ProSight Email Guard is Progent's email security solution that uses the services and infrastructure of top data security companies to deliver web-based management and world-class protection for all your email traffic. The hybrid structure of Email Guard managed service integrates a Cloud Protection Layer with an on-premises security gateway appliance to offer advanced defense against spam, viruses, Denial of Service Attacks, Directory Harvest Attacks, and other email-based threats. Email Guard's Cloud Protection Layer acts as a preliminary barricade and blocks the vast majority of threats from reaching your security perimeter. This decreases your vulnerability to inbound attacks and saves network bandwidth and storage space. Email Guard's onsite security gateway appliance provides a deeper level of analysis for incoming email. For outgoing email, the onsite gateway offers AV and anti-spam filtering, policy-based Data Loss Prevention, and email encryption. The local security gateway can also help Microsoft Exchange Server to monitor and safeguard internal email that stays inside your security perimeter. Find out more about Progent's ProSight Email Guard spam filtering, virus blocking, content filtering and data leakage protection.

  • ProSight Active Security Monitoring: Endpoint Protection and Ransomware Recovery
    ProSight Active Security Monitoring is an endpoint protection (EPP) solution that incorporates next generation behavior machine learning technology to defend endpoints as well as physical and virtual servers against modern malware assaults like ransomware and email phishing, which routinely evade legacy signature-based anti-virus products. ProSight Active Security Monitoring protects local and cloud resources and provides a single platform to automate the entire threat lifecycle including blocking, detection, containment, cleanup, and forensics. Top features include one-click rollback using Windows VSS and automatic network-wide immunization against new attacks. Find out more about Progent's ProSight Active Security Monitoring endpoint protection and ransomware defense.

  • ProSight Data Protection Services: Managed Cloud Backup
    ProSight Data Protection Services from Progent provide small and medium-sized organizations an affordable end-to-end service for secure backup/disaster recovery. Available at a fixed monthly price, ProSight DPS automates and monitors your backup processes and allows fast restoration of vital data, apps and VMs that have become lost or damaged due to hardware breakdowns, software glitches, natural disasters, human error, or malicious attacks such as ransomware. ProSight Data Protection Services can help you protect, recover and restore files, folders, applications, system images, as well as Microsoft Hyper-V and VMware virtual machine images. Important data can be protected on the cloud, to a local device, or to both. Progent's backup and recovery specialists can provide world-class support to set up ProSight Data Protection Services to be compliant with regulatory standards such as HIPPA, FINRA, PCI and Safe Harbor and, when necessary, can assist you to restore your business-critical information. Find out more about ProSight Data Protection Services Managed Cloud Backup and Recovery.

  • ProSight WAN Watch: Infrastructure Management
    ProSight WAN Watch is an infrastructure management service that makes it simple and inexpensive for smaller organizations to diagram, track, reconfigure and troubleshoot their networking hardware like switches, firewalls, and access points plus servers, endpoints and other networked devices. Using cutting-edge Remote Monitoring and Management technology, ProSight WAN Watch makes sure that infrastructure topology maps are always current, copies and manages the configuration of virtually all devices connected to your network, monitors performance, and generates notices when issues are detected. By automating time-consuming management processes, WAN Watch can knock hours off ordinary chores such as making network diagrams, reconfiguring your network, finding appliances that need critical software patches, or isolating performance bottlenecks. Find out more details about ProSight WAN Watch network infrastructure management consulting.

  • ProSight LAN Watch: Server and Desktop Monitoring and Management
    ProSight LAN Watch is Progent’s server and desktop remote monitoring managed service that incorporates state-of-the-art remote monitoring and management techniques to help keep your network running at peak levels by tracking the health of vital computers that power your business network. When ProSight LAN Watch uncovers a problem, an alert is transmitted immediately to your specified IT personnel and your Progent engineering consultant so that any looming issues can be addressed before they have a chance to impact your network Learn more details about ProSight LAN Watch server and desktop monitoring consulting.

  • ProSight Virtual Hosting: Hosted VMs at Progent's World-class Data Center
    With ProSight Virtual Hosting service, a small organization can have its critical servers and applications hosted in a secure fault tolerant data center on a high-performance virtual machine host configured and managed by Progent's network support experts. With Progent's ProSight Virtual Hosting model, the client owns the data, the operating system software, and the applications. Because the system is virtualized, it can be moved immediately to a different hosting environment without requiring a lengthy and difficult reinstallation process. With ProSight Virtual Hosting, your business is not locked into one hosting service. Learn more about ProSight Virtual Hosting services.

  • ProSight IT Asset Management: Network Infrastructure Documentation Management
    ProSight IT Asset Management service is a cloud-based IT documentation management service that allows you to create, update, find and protect information related to your network infrastructure, processes, business apps, and services. You can instantly locate passwords or IP addresses and be warned automatically about impending expirations of SSLs ,domains or warranties. By updating and managing your IT infrastructure documentation, you can save as much as 50% of time thrown away looking for vital information about your IT network. ProSight IT Asset Management features a centralized location for storing and sharing all documents related to managing your network infrastructure like recommended procedures and How-To's. ProSight IT Asset Management also offers a high level of automation for gathering and relating IT data. Whether you’re making enhancements, doing maintenance, or responding to an emergency, ProSight IT Asset Management gets you the knowledge you need the instant you need it. Learn more about Progent's ProSight IT Asset Management service.
ProSight Network Audits
Progent's ProSight Network Audits offer a fast and affordable alternative for small and mid-size businesses to obtain an objective evaluation of the health of their information system. Based on a selection of the top remote monitoring and management (RMM) tools in the industry, and overseen by Progent's world-class group of IT experts, ProSight Network Audits help you see how well the configuration of your core infrastructure devices adhere to industry leading practices. Both the Basic and Advanced options for ProSight Network Audit services are offered at a budget-friendly, one-time cost and provide instant benefits such as a more manageable Active Directory (AD) system. Both also include a year of cutting-edge remote network monitoring and management. Advantages can include simpler management, improved compliance with government and industry security regulations, more efficient utilization of IT resources, quicker troubleshooting, more reliable backup and restore, and higher availability. Learn more about ProSight Network Audits network infrastructure assessment.

Contact Progent for Penetration Testing Consulting
If you're looking for network security help, telephone Progent at 800-993-9400 or refer to Contact Progent.
















© 2002- 2018 Progent Corporation. All rights reserved.


More topics of interest: