Stealth penetration testing is a vital method for allowing organizations to determine how exposed their networks are to real world threats by showing how well corporate security processes, procedures and technologies hold up against authorized but unannounced attacks by veteran security specialists using advanced hacking techniques.

Progent’s security experts can perform extensive in-depth penetration testing without the knowledge of internal IT resources. Such testing uncovers whether existing security monitoring tools such as intrusion detection alerts and event log monitoring are correctly set up and actively monitored.

Penetration testing can encompass any or all of the following areas:

  • Running a series of port scanning tools to identify open network access vectors and to identify and characterize a customer's network environment and overall security level.
  • Running a series of exploit identification tools that test all open access vectors against a large database of known vulnerabilities resulting from servers that are not up to date on security patches, out of date firmware/software, poorly configured servers and devices, and default or common installation passwords.
  • Evaluation of wireless network security by attempting on-site access from publicly accessible locations including parking lots, hallways, bathrooms, and physically adjacent spaces or floors. Identification of security methods utilized by wireless infrastructure and running known exploit tools to gain access
  • Attempt to determine remote access capabilities of network and perform exploit and brute force attack methods to gain access through remote access infrastructure.
  • Perform remote office security evaluation and testing, and determine whether remote sites can be used as a vector into the corporate network through VPNs or other private network infrastructure.
  • Performing brute force account and password attacks using a database of over 40 million possible passwords
  • For devices and servers that are successfully penetrated, Progent security experts will manually use assorted hacker techniques to extend such exploit vectors to gain an understanding of the full network environment and see how many internal systems can be accessed and compromised. This type of security testing can expose the full scope of the vulnerability of a network environment.
  • Determination of internal and external network addressing configuration through email beaconing techniques
  • Performing various Denial of Service attacks, coordinated with internal senior management to determine whether it is possible to stop or hinder network productivity. Once proof of impact is reported, such testing can be immediately ceased to avoid impact to actual business productivity.
  • Perform PBX remote access and voice mail security testing
For larger companies, Progent can perform anonymous physical security penetration testing, including attempts to gain unauthorized/unchecked access to physical premises by pretending to be authorized personnel, with proof of success from copying of confidential information and accessing internal network resources behind all perimeter firewalls.

Progent experts can use social engineering techniques and public information to attempt customized password penetration testing utilizing information such as employees’ family member names, birthdates, home addresses, and phone numbers. Progent team members can often quickly uncover this information through Internet online search and public records. Progent can uncover employee names/email addresses through publicly accessible information on the Internet, from PBX voice mail directories, public records filings, marketing materials and press releases, web sites, and receptionist.

Progent will provide a complete report of methods used and vulnerabilities uncovered during stealth penetration testing, along with a detailed list of recommended remediation steps. Progent can then work with internal IT staff to perform an audit and evaluation of the actual security protection, configuration, tools, and processes and help your company develop a comprehensive security plan.

ProSight Fixed-price Managed Services for Information Assurance
Progent's low-cost ProSight line of outsourced network management services is intended to provide small and mid-size businesses with enterprise-class support and state-of-the-art technology for all facets of information assurance and compliance. Managed services offered by Progent include:

  • ProSight Active Security Monitoring: Next Generation Endpoint Protection and Ransomware Defense
    ProSight Active Security Monitoring (ASM) is an endpoint protection (EPP) service that incorporates next generation behavior analysis tools to defend endpoints and servers and VMs against modern malware attacks such as ransomware and file-less exploits, which easily evade legacy signature-matching anti-virus tools. ProSight Active Security Monitoring safeguards on-premises and cloud resources and provides a unified platform to automate the complete threat lifecycle including filtering, identification, mitigation, cleanup, and post-attack forensics. Top features include one-click rollback with Windows Volume Shadow Copy Service and real-time system-wide immunization against newly discovered attacks. Learn more about Progent's ProSight Active Security Monitoring endpoint protection and ransomware defense.

  • ProSight Enhanced Security Protection: Unified Physical and Virtual Endpoint Security
    Progent's ProSight Enhanced Security Protection managed services deliver affordable multi-layer security for physical and virtual servers, workstations, smartphones, and Exchange Server. ProSight ESP utilizes contextual security and modern behavior analysis for continuously monitoring and responding to security assaults from all vectors. ProSight ESP delivers firewall protection, intrusion alerts, device management, and web filtering via cutting-edge tools packaged within a single agent accessible from a unified control. Progent's security and virtualization consultants can help your business to design and implement a ProSight ESP deployment that meets your organization's specific needs and that allows you achieve and demonstrate compliance with legal and industry information security standards. Progent will help you specify and configure policies that ProSight ESP will enforce, and Progent will monitor your network and react to alarms that require urgent action. Progent's consultants can also help your company to set up and verify a backup and restore solution such as ProSight Data Protection Services (DPS) so you can recover quickly from a destructive cyber attack like ransomware. Read more about Progent's ProSight Enhanced Security Protection unified endpoint protection and Exchange filtering.

  • ProSight DPS: Managed Backup and Recovery
    ProSight Data Protection Services from Progent provide small and mid-sized businesses an affordable and fully managed solution for reliable backup/disaster recovery. For a fixed monthly price, ProSight DPS automates your backup processes and allows rapid recovery of critical files, apps and VMs that have become unavailable or corrupted due to component failures, software bugs, natural disasters, human error, or malware attacks such as ransomware. ProSight Data Protection Services can help you back up, recover and restore files, folders, applications, system images, as well as Hyper-V and VMware virtual machine images. Critical data can be protected on the cloud, to an on-promises storage device, or mirrored to both. Progent's BDR specialists can deliver world-class expertise to set up ProSight Data Protection Services to be compliant with regulatory requirements like HIPPA, FIRPA, and PCI and, when necessary, can help you to recover your critical data. Read more about ProSight Data Protection Services Managed Backup.

  • ProSight Email Guard: Spam Filtering, Data Leakage Protection and Content Filtering
    ProSight Email Guard is Progent's email filtering and encryption platform that incorporates the technology of top information security companies to provide centralized management and comprehensive security for all your inbound and outbound email. The powerful structure of Email Guard managed service integrates a Cloud Protection Layer with a local gateway appliance to provide complete defense against spam, viruses, Denial of Service Attacks, DHAs, and other email-borne threats. The Cloud Protection Layer acts as a first line of defense and keeps the vast majority of threats from reaching your security perimeter. This reduces your vulnerability to external threats and conserves network bandwidth and storage space. Email Guard's onsite gateway device provides a deeper level of inspection for incoming email. For outbound email, the local gateway offers anti-virus and anti-spam protection, protection against data leaks, and encryption. The onsite security gateway can also assist Microsoft Exchange Server to monitor and safeguard internal email traffic that originates and ends within your corporate firewall. Learn more about Progent's ProSight Email Guard spam filtering, virus blocking, content filtering and data loss prevention.

  • ProSight WAN Watch: Network Infrastructure Management
    ProSight WAN Watch is an infrastructure management service that makes it simple and inexpensive for small and mid-sized businesses to map, monitor, reconfigure and debug their networking appliances like routers, firewalls, and wireless controllers plus servers, printers, client computers and other networked devices. Incorporating state-of-the-art Remote Monitoring and Management (RMM) technology, WAN Watch makes sure that network diagrams are kept current, captures and displays the configuration of almost all devices connected to your network, tracks performance, and sends alerts when potential issues are detected. By automating time-consuming management and troubleshooting processes, ProSight WAN Watch can knock hours off ordinary chores like network mapping, reconfiguring your network, finding appliances that need important software patches, or identifying the cause of performance issues. Find out more details about ProSight WAN Watch infrastructure monitoring and management services.

  • ProSight LAN Watch: Server and Desktop Remote Monitoring
    ProSight LAN Watch is Progent’s server and desktop monitoring managed service that incorporates advanced remote monitoring and management (RMM) technology to keep your network running efficiently by checking the health of critical computers that power your business network. When ProSight LAN Watch detects an issue, an alarm is transmitted immediately to your designated IT management staff and your Progent consultant so any looming problems can be resolved before they have a chance to disrupt your network Find out more details about ProSight LAN Watch server and desktop remote monitoring consulting.

  • ProSight Virtual Hosting: Hosted VMs at Progent's Tier III Data Center
    With Progent's ProSight Virtual Hosting service, a small organization can have its key servers and applications hosted in a secure fault tolerant data center on a fast virtual machine host set up and maintained by Progent's network support experts. Under Progent's ProSight Virtual Hosting model, the client retains ownership of the data, the operating system software, and the apps. Because the environment is virtualized, it can be moved easily to a different hardware solution without requiring a time-consuming and difficult reinstallation process. With ProSight Virtual Hosting, your business is not locked into a single hosting provider. Find out more details about ProSight Virtual Hosting services.

  • ProSight IT Asset Management: Network Infrastructure Documentation Management
    ProSight IT Asset Management service is an IT infrastructure documentation management service that allows you to capture, maintain, find and safeguard data about your IT infrastructure, processes, applications, and services. You can quickly locate passwords or IP addresses and be alerted about upcoming expirations of SSLs or domains. By cleaning up and organizing your network documentation, you can save as much as half of time wasted searching for vital information about your network. ProSight IT Asset Management features a common repository for holding and collaborating on all documents required for managing your network infrastructure such as standard operating procedures (SOPs) and How-To's. ProSight IT Asset Management also offers advanced automation for gathering and associating IT data. Whether you’re planning enhancements, performing regular maintenance, or responding to an emergency, ProSight IT Asset Management delivers the data you need as soon as you need it. Learn more about Progent's ProSight IT Asset Management service.
ProSight Network Audits
Progent's ProSight Network Audits offer a fast and affordable alternative for small and mid-size businesses to obtain an objective evaluation of the health of their information system. Powered by some of the top remote monitoring and management platforms available, and supervised by Progent's certified team of IT professionals, ProSight Network Audits show you how closely the configuration of your essential infrastructure assets conform to leading practices. Both the Basic and Advanced options for ProSight Network Audit services are available at a budget-friendly, one-time cost and provide immediate benefits like a cleaner Active Directory system. Both also come with one year of state-of-the-art remote network monitoring and management. Advantages can include simpler network management, better compliance with information security standards, higher utilization of network assets, quicker problem resolution, more reliable backup and restore, and increased uptime. Learn more about ProSight Network Audits IT infrastructure review.

The ProSight Ransomware Preparedness Report
The ProSight Ransomware Preparedness Report service is a low-cost service built around a brief phone interview with a Progent information assurance expert. The interview is designed to help evaluate your company's ability either to stop or recover quickly from a ransomware attack. Progent will consult with you personally to gather information about your current security profile and backup system, and Progent will then produce a written Basic Security and Best Practices Report detailing how you can apply industry best practices to create a cost-effective security and backup/recovery environment that aligns with your company's requirements. For details, visit The ProSight Ransomware Preparedness Report.

Contact Progent for Penetration Testing Consulting
If you're trying to find computer security help, telephone Progent at 800-993-9400 or see Contact Progent.
















© 2002- 2018 Progent Corporation. All rights reserved.


More topics of interest: