Stealth penetration testing is a vital method for allowing organizations to determine how exposed their networks are to real world threats by showing how well corporate security processes, procedures and technologies hold up against authorized but unannounced attacks by veteran security specialists using advanced hacking techniques.

Progent’s security experts can perform extensive in-depth penetration testing without the knowledge of internal IT resources. Such testing uncovers whether existing security monitoring tools such as intrusion detection alerts and event log monitoring are correctly set up and actively monitored.

Penetration testing can encompass any or all of the following areas:

  • Running a series of port scanning tools to identify open network access vectors and to identify and characterize a customer's network environment and overall security level.
  • Running a series of exploit identification tools that test all open access vectors against a large database of known vulnerabilities resulting from servers that are not up to date on security patches, out of date firmware/software, poorly configured servers and devices, and default or common installation passwords.
  • Evaluation of wireless network security by attempting on-site access from publicly accessible locations including parking lots, hallways, bathrooms, and physically adjacent spaces or floors. Identification of security methods utilized by wireless infrastructure and running known exploit tools to gain access
  • Attempt to determine remote access capabilities of network and perform exploit and brute force attack methods to gain access through remote access infrastructure.
  • Perform remote office security evaluation and testing, and determine whether remote sites can be used as a vector into the corporate network through VPNs or other private network infrastructure.
  • Performing brute force account and password attacks using a database of over 40 million possible passwords
  • For devices and servers that are successfully penetrated, Progent security experts will manually use assorted hacker techniques to extend such exploit vectors to gain an understanding of the full network environment and see how many internal systems can be accessed and compromised. This type of security testing can expose the full scope of the vulnerability of a network environment.
  • Determination of internal and external network addressing configuration through email beaconing techniques
  • Performing various Denial of Service attacks, coordinated with internal senior management to determine whether it is possible to stop or hinder network productivity. Once proof of impact is reported, such testing can be immediately ceased to avoid impact to actual business productivity.
  • Perform PBX remote access and voice mail security testing
For larger companies, Progent can perform anonymous physical security penetration testing, including attempts to gain unauthorized/unchecked access to physical premises by pretending to be authorized personnel, with proof of success from copying of confidential information and accessing internal network resources behind all perimeter firewalls.

Progent experts can use social engineering techniques and public information to attempt customized password penetration testing utilizing information such as employees’ family member names, birthdates, home addresses, and phone numbers. Progent team members can often quickly uncover this information through Internet online search and public records. Progent can uncover employee names/email addresses through publicly accessible information on the Internet, from PBX voice mail directories, public records filings, marketing materials and press releases, web sites, and receptionist.

Progent will provide a complete report of methods used and vulnerabilities uncovered during stealth penetration testing, along with a detailed list of recommended remediation steps. Progent can then work with internal IT staff to perform an audit and evaluation of the actual security protection, configuration, tools, and processes and help your company develop a comprehensive security plan.

ProSight Low-Cost Managed Services for Information Assurance
Progent's low-cost ProSight portfolio of network monitoring and management services is designed to provide small and mid-size businesses with enterprise-class support and cutting-edge technology for all facets of information assurance. ProSight managed services available from Progent include:

  • ProSight Active Security Monitoring: Next Generation Endpoint Protection and Ransomware Recovery
    ProSight Active Security Monitoring (ASM) is an endpoint protection (EPP) service that incorporates cutting edge behavior-based analysis tools to defend endpoints as well as physical and virtual servers against new malware assaults like ransomware and email phishing, which easily get by legacy signature-matching anti-virus tools. ProSight Active Security Monitoring protects local and cloud resources and provides a single platform to automate the entire threat progression including blocking, detection, containment, cleanup, and forensics. Top features include one-click rollback using Windows VSS and real-time network-wide immunization against new attacks. Learn more about Progent's ProSight Active Security Monitoring (ASM) next-generation endpoint protection and ransomware defense.

  • ProSight Enhanced Security Protection (ESP): Unified Endpoint Protection
    ProSight Enhanced Security Protection services offer affordable in-depth protection for physical servers and virtual machines, desktops, mobile devices, and Exchange Server. ProSight ESP uses contextual security and advanced heuristics for continuously monitoring and reacting to cyber threats from all vectors. ProSight ESP offers two-way firewall protection, intrusion alerts, endpoint management, and web filtering via cutting-edge technologies incorporated within a single agent accessible from a single control. Progent's security and virtualization experts can help your business to plan and implement a ProSight ESP environment that addresses your company's specific requirements and that allows you prove compliance with government and industry information protection standards. Progent will help you define and configure security policies that ProSight ESP will manage, and Progent will monitor your IT environment and respond to alerts that call for immediate attention. Progent's consultants can also help you to set up and test a backup and restore solution such as ProSight Data Protection Services (DPS) so you can recover quickly from a potentially disastrous security attack such as ransomware. Find out more about Progent's ProSight Enhanced Security Protection (ESP) unified endpoint security and Microsoft Exchange filtering.

  • ProSight DPS: Managed Cloud Backup
    ProSight Data Protection Services provide small and mid-sized businesses an affordable and fully managed service for reliable backup/disaster recovery. For a fixed monthly price, ProSight Data Protection Services automates and monitors your backup activities and allows fast recovery of critical data, applications and VMs that have become lost or damaged as a result of component breakdowns, software bugs, natural disasters, human mistakes, or malware attacks like ransomware. ProSight Data Protection Services can help you back up, recover and restore files, folders, apps, system images, plus Hyper-V and VMware virtual machine images. Important data can be protected on the cloud, to an on-promises storage device, or mirrored to both. Progent's backup and recovery consultants can deliver advanced expertise to set up ProSight DPS to be compliant with regulatory requirements like HIPPA, FINRA, PCI and Safe Harbor and, whenever necessary, can help you to restore your critical data. Read more about ProSight DPS Managed Cloud Backup and Recovery.

  • ProSight Email Guard: Inbound and Outbound Spam Filtering, Data Leakage Protection and Content Filtering
    ProSight Email Guard is Progent's email filtering and encryption platform that incorporates the services and infrastructure of top information security vendors to provide web-based management and world-class security for your inbound and outbound email. The powerful structure of Progent's Email Guard integrates a Cloud Protection Layer with an on-premises security gateway appliance to provide advanced protection against spam, viruses, Dos Attacks, DHAs, and other email-based threats. Email Guard's cloud filter serves as a preliminary barricade and keeps the vast majority of threats from reaching your network firewall. This reduces your exposure to inbound attacks and conserves system bandwidth and storage space. Email Guard's onsite security gateway appliance adds a deeper level of analysis for incoming email. For outgoing email, the local security gateway provides AV and anti-spam filtering, policy-based Data Loss Prevention, and encryption. The local security gateway can also assist Exchange Server to track and safeguard internal email traffic that originates and ends within your security perimeter. Find out more about Progent's ProSight Email Guard spam filtering, virus blocking, email content filtering and data leakage protection.

  • ProSight WAN Watch: Network Infrastructure Management
    ProSight WAN Watch is a network infrastructure management service that makes it simple and inexpensive for smaller organizations to diagram, track, enhance and troubleshoot their networking hardware such as switches, firewalls, and load balancers plus servers, printers, endpoints and other networked devices. Using cutting-edge Remote Monitoring and Management technology, ProSight WAN Watch makes sure that infrastructure topology maps are always updated, captures and displays the configuration of almost all devices on your network, tracks performance, and sends notices when problems are discovered. By automating time-consuming network management processes, WAN Watch can knock hours off common chores like network mapping, reconfiguring your network, locating appliances that require important software patches, or isolating performance issues. Learn more about ProSight WAN Watch infrastructure monitoring and management services.

  • ProSight LAN Watch: Server and Desktop Remote Monitoring
    ProSight LAN Watch is Progent’s server and desktop remote monitoring managed service that incorporates advanced remote monitoring and management (RMM) technology to keep your network running efficiently by tracking the health of vital assets that power your information system. When ProSight LAN Watch uncovers an issue, an alert is transmitted immediately to your designated IT personnel and your assigned Progent engineering consultant so all potential problems can be resolved before they have a chance to impact productivity Find out more about ProSight LAN Watch server and desktop monitoring consulting.

  • ProSight Virtual Hosting: Hosted VMs at Progent's Tier III Data Center
    With ProSight Virtual Hosting service, a small or mid-size business can have its critical servers and applications hosted in a protected fault tolerant data center on a fast virtual host configured and managed by Progent's IT support professionals. Under the ProSight Virtual Hosting service model, the customer retains ownership of the data, the OS platforms, and the apps. Because the environment is virtualized, it can be moved immediately to a different hardware environment without a lengthy and difficult reinstallation process. With ProSight Virtual Hosting, your business is not tied a single hosting service. Find out more about ProSight Virtual Hosting services.

  • ProSight IT Asset Management: Network Documentation Management
    ProSight IT Asset Management service is a cloud-based IT documentation management service that allows you to capture, maintain, find and safeguard data related to your network infrastructure, procedures, business apps, and services. You can quickly locate passwords or IP addresses and be warned about upcoming expirations of SSL certificates or warranties. By cleaning up and organizing your IT infrastructure documentation, you can save up to 50% of time spent searching for vital information about your IT network. ProSight IT Asset Management features a centralized location for holding and collaborating on all documents related to managing your business network such as standard operating procedures (SOPs) and How-To's. ProSight IT Asset Management also supports advanced automation for gathering and relating IT information. Whether you’re planning enhancements, doing regular maintenance, or responding to an emergency, ProSight IT Asset Management gets you the information you require the instant you need it. Learn more about Progent's ProSight IT Asset Management service.
ProSight Network Audits
Progent's ProSight Network Audits are a quick and low-cost alternative for small and medium-size businesses to get an unbiased evaluation of the health of their information system. Powered by a selection of the top remote monitoring and management tools in the industry, and supervised by Progent's certified team of information technology experts, ProSight Network Audits show you how closely the configuration of your core network devices conform to industry best practices. Both the Basic and Advanced options for ProSight Network Audit services are available at a low, one-time cost and deliver instant benefits like a cleaner Active Directory (AD) system. Both also include a year of state-of-the-art remote network monitoring and management. Advantages can include lower-cost network management, better compliance with data security requirements, more efficient utilization of network assets, faster troubleshooting, more dependable backup and recovery, and less downtime. Read more information about Progent's ProSight Network Audits IT infrastructure review.

Progent's ProSight Ransomware Preparedness Report
The ProSight Ransomware Preparedness Report service is a low-cost service based on a brief interview with a Progent information assurance expert. The interview is designed to help assess your organization's ability to block or recover rapidly from a ransomware attack. Progent will consult with you directly to collect information about your current security profile and backup platform, and Progent will then produce a custom Basic Security and Best Practices Report document describing how you can apply industry best practices to build an efficient AV and backup system that aligns with your company's needs. For details, visit The ProSight Ransomware Preparedness Report Service.

Contact Progent for Penetration Testing Consulting
To learn more about Progent's security consulting, call Progent at 800-993-9400 or go to Contact Progent.
















© 2002- 2019 Progent Corporation. All rights reserved.


More topics of interest: