Fast and Affordable Security Checkups for Small Businesses
Network Security Inventory ScanningIs your small business network keeping pace with today's security environment? Are you protecting your network assets? How difficult would it be for a hacker to break into your information system, and what steps can you take to prevent it? Progent has developed a fast and affordable way for small businesses to answer these questions without disrupting their network operations.

Progent's Network Security Inventory packages are fixed-price service bundles that rely on advanced network scanning technology and the certified expertise of Progent's security engineers to evaluate the vulnerability of your network and provide recommendations for simple ways you can mitigate your security risk. Progent offers two packages, the External Network Security Inventory and the Internal Network Security Inventory, which assess different aspects of network security exposure and which you can use separately or together. Both packages offer features designed for the needs of small businesses who want to take a more proactive role in making their networks safe from malicious assaults but who donít have the time or the budget to manage an exhaustive enterprise-class network security audit.

Top Features and Benefits of Progent's Security Inventory Packages for Small Business Networks
Progent's Security Inventory packages offer an array of features and benefits especially designed to address today's increasingly hostile security environment in which all business networks operate but also to take into account the financial and operational realties of small companies. Implemented together or separately, Progent's External and Internal security scanning packages help small businesses achieve a high level of network protection at little cost or hassle.

  • Low-cost:
    Progent's Network Security Inventory packages are inexpensive and are offered at a set-price, so you know in advance what it will cost to understand the state of your network security. Potential attack vectors detected by Progent's security scans are typically easy to fix and involve configuration issues with network operating systems, applications, and devices. If you have not regularly utilized security scans in the past, you get a lot of bang for your buck. Generally, a great deal of security risk associated with small business networks can be substantially reduced at very little expense.
  • Fast:
    The scanning, analysis, and reporting processes involved in Progent's Network Security Inventory packages can usually be completed in one business day. This fast turnaround can reduce the window during which your network is exposed to attack by allowing you to move quickly into remediation mode. This also reduces the stressful suspense management may feel not knowing whether information assets are safe, and minimizes the time that your network manager is diverted from other responsibilities. A combination of advanced scanning technology and experienced engineers allow Progent's security team to deliver results quickly and at low cost to the customer.
  • Remote Scanning:
    The scanning phase of Progent's Network Security Inventory packages are managed remotely from a secure Progent site. In the case of the Internal Network Security Inventory package, the scan is itself run from an onsite machine made available by the customer. The setup procedure for external or internal scans can accomplished in minutes, and the collected data is analyzed offsite by Progent's certified security professionals. By utilizing remote tools to conduct the Network Security Inventory packages, Progent saves significant time and money, which in turn allows Progent to offer these packages at prices that small businesses can afford.
  • Proactive:
    Progent's Network Security Inventory packages are not intended to detect and remove viruses or other malware resulting from a successful attack on your network, but to uncover common security gaps before they are exploited by malicious sources. Although larger enterprises routinely utilize third-party consulting firms like Progent to conduct vulnerability scans in order to benefit from an objective risk assessment, small businesses with limited IT budgets and technical expertise often wait until their networks are hacked before getting serious about security. By offering vulnerability scanning packages that are fast, affordable, and effective, Progent makes it a no brainer for small businesses to take the lead in protecting their network assets.
  • Certified Security Engineers:
    Progent's security engineers have been certified by some of the industry's most prestigious standards institutions including the Information Systems Audit and Control Association (ISACA), the International Information Systems Security Certification Consortium (ISC), and the SANS Institute. Progent's security team has worked with major enterprises to assess and enhance network security. With Progent's Network Security Inventory packages, small businesses get the benefit of vulnerability assessments from world-class security professionals without requiring an enterprise-class IT budget.
  • Effective:
    Progent's security engineers are familiar with the sophisticated tools and techniques hackers employ to break into information networks to steal and control resources and data. The majority of these intrusion attempts are based on exploiting security gaps that are surprisingly easy to block. Both of Progent's Network Security Inventory packages address a separate range of potential security vulnerabilities often found in small business IT networks. Either package will provide information to help you enhance your network protection. Using the external and the internal scan packages together will allow you to secure your network even more.
  • Actionable Reporting:
    The data collected from Progent's Network Security Inventory scans are analyzed by a certified engineer on Progent's security team. As part of the package, Progent's security engineer will prepare and send a report that summarizes the results of the vulnerability scan and suggests mitigation procedures that can be performed by Progent, by your in-house IT support staff, or by a competent third-party security consulting firm. Any remedial work requested from Progent will be performed as a separate project for which Progent can provide a time estimate and for which Progent will bill at standard consulting rates.
External Security Inventory Scan
Progent's External Network Security Inventory package tests for the threat levels of the open ports and services on your network that are exposed outside your firewall. These ports and services can include email, web sites, eCommerce applications, remote access tools, or any service that requires or is granted communication with the world beyond your firewall. This is a favorite hunting ground of hackers and, in many small businesses, a rich source of attack vectors.

Progent's security team will examine the scanned data, produce a report that summarizes and interprets the results, and make suggestions on efficient ways to reduce your exposure to attack. The external scan will not disrupt your ongoing network operations or noticeably impact your system performance. Progent offers this service package at a low set price that covers setup, scanning, analysis, reporting, and recommendations. The set price does not include remediation services which may be suggested. These follow-on services can be performed by any qualified security engineer and are available from Progent at standard consulting rates.

Internal Security Inventory Scan
Many security attacks originate from inside your company firewall and can be the result of careless employees who attach compromised laptops to your network, workers who try to access restricted information or gain unauthorized administration rights, or lurkers in close physical proximity to your wireless access points. Progent's Internal Network Security Inventory package tests for vulnerabilities within your firewall by looking for open ports and services that are not exposed to the outside world but that could be a source of trouble if improperly configured. The internal scan can be executed from any computer inside your security perimeter that you make temporarily available to Progent's security engineer. Progent will remotely download a virtual machine and the required scanning tools to the internal computer you have assigned, launch the scan, and transfer the collected data to a secure Progent site. Progent does not need to make an expensive onsite service call and the time required to install and subsequently remove the scanning software is negligible.

Progent's security engineer managing the Internal Security Inventory Scan will examine the scanned data and create a report that summarizes the results and suggests any mitigation measures that may be required. Progent offers this service package at a low set price that covers setup, scanning, analysis, reporting, and recommendations. The set price does not include remediation services which may be suggested. These follow-on services can be performed by any qualified security engineer and are available from Progent at standard consulting rates.

Download the Security Inventory Scan Datasheet
To download a single-page printable datasheet describing Progent's two set-price Security Inventory Scan service packages for small businesses, click:
Security Inventory Scanning Packages (PDF - 104 KB).

Additional Network Security Auditing Services Available from Progent
Progent offers a variety of additional services designed to check your network for vulnerabilities, verify your compliance with governmental or industry security standards, and mitigate critical gaps in your network's defenses:

  • Enterprise Vulnerability Assessment Service Packages
    Progent can provide a range of set-price enterprise security assessment service packages created for corporations who need to comply with security standards required by state agencies or by customers. Progent's security assessment packages offer larger businesses an opportunity to get an objective opinion about the strength of their network security. For each security inventory or evaluation bundle, Progent engineers with high-level security credentials analyze and report on collected data and provide suggestions for effective improvements. An added-cost option for on-premises security engineers is available throughout United States.
  • Stealth Penetration Testing
    Progent can manage extensive penetration exercises without the knowledge of internal IT managers. Stealth Penetration Testing uncovers whether existing network security monitoring tools like penetration detection alarms and event log monitoring are properly set up and consistently managed. Progent security experts can utilize various hacker tools to expand attack vectors to acquire knowledge of the entire network environment and detect how many internal devices can be accessed and compromised. This type of security checking can expose the full scope of the security flaws of an IT environment.
  • Network Security Assessment Consulting
    Progent's expert security audit and compliance testing services can help your company to validate your operations and governance policies and check your network environment to allow your company to design the maximum degree of security into your information system. Progent's certified security consultants can also test your web business applications for security weaknesses and can perform corporate-wide security audits to verify your company's adherence to key security specifications such as HIPAA, FISMA, NIST, PCI, and ISO.
ProSight Low-Cost Managed Services for Information Assurance
Progent's affordable ProSight portfolio of network monitoring and management services is intended to provide small and mid-size businesses with enterprise-class support and state-of-the-art technology for all facets of information assurance. Managed services available from Progent include:
  • ProSight Active Security Monitoring (ASM): Next Generation Endpoint Protection and Ransomware Defense
    ProSight Active Security Monitoring is an endpoint protection service that incorporates next generation behavior analysis technology to defend endpoints as well as servers and VMs against modern malware attacks like ransomware and file-less exploits, which routinely escape legacy signature-matching anti-virus tools. ProSight ASM protects local and cloud resources and provides a unified platform to address the entire malware attack lifecycle including filtering, detection, containment, cleanup, and post-attack forensics. Top capabilities include single-click rollback with Windows Volume Shadow Copy Service (VSS) and real-time system-wide immunization against newly discovered attacks. Read more about Progent's ProSight Active Security Monitoring (ASM) next-generation endpoint protection and ransomware defense.

  • ProSight Enhanced Security Protection (ESP): Unified Endpoint Security
    ProSight Enhanced Security Protection services offer economical in-depth security for physical servers and VMs, desktops, smartphones, and Exchange Server. ProSight ESP utilizes adaptive security and modern behavior analysis for continuously monitoring and responding to cyber threats from all vectors. ProSight ESP provides firewall protection, intrusion alerts, endpoint management, and web filtering via cutting-edge technologies incorporated within one agent accessible from a single console. Progent's security and virtualization consultants can assist your business to plan and configure a ProSight ESP environment that addresses your organization's unique needs and that allows you prove compliance with legal and industry information security regulations. Progent will help you define and configure policies that ProSight ESP will manage, and Progent will monitor your network and react to alarms that call for immediate attention. Progent can also assist your company to install and verify a backup and disaster recovery system such as ProSight Data Protection Services (DPS) so you can recover rapidly from a potentially disastrous cyber attack such as ransomware. Read more about Progent's ProSight Enhanced Security Protection (ESP) unified endpoint protection and Microsoft Exchange email filtering.

  • ProSight DPS: Managed Cloud Backup
    ProSight Data Protection Services from Progent provide small and mid-sized businesses a low cost end-to-end solution for reliable backup/disaster recovery. For a fixed monthly rate, ProSight DPS automates and monitors your backup activities and allows rapid restoration of critical files, applications and VMs that have become unavailable or damaged as a result of hardware breakdowns, software bugs, disasters, human mistakes, or malware attacks such as ransomware. ProSight Data Protection Services can help you protect, recover and restore files, folders, apps, system images, as well as Hyper-V and VMware virtual machine images. Important data can be protected on the cloud, to an on-promises storage device, or to both. Progent's cloud backup consultants can provide advanced expertise to configure ProSight DPS to be compliant with government and industry regulatory standards such as HIPPA, FIRPA, PCI and Safe Harbor and, when needed, can help you to recover your business-critical data. Learn more about ProSight DPS Managed Backup and Recovery.

  • ProSight Email Guard: Inbound and Outbound Spam Filtering, Data Leakage Protection and Email Encryption
    ProSight Email Guard is Progent's email filtering and encryption platform that incorporates the technology of leading information security vendors to deliver web-based control and comprehensive protection for your inbound and outbound email. The hybrid architecture of Email Guard managed service integrates cloud-based filtering with a local security gateway appliance to provide advanced defense against spam, viruses, Denial of Service Attacks, Directory Harvest Attacks (DHAs), and other email-based malware. The Cloud Protection Layer serves as a first line of defense and blocks most threats from making it to your security perimeter. This decreases your exposure to external attacks and saves system bandwidth and storage space. Email Guard's onsite security gateway appliance adds a deeper layer of analysis for incoming email. For outbound email, the on-premises security gateway offers anti-virus and anti-spam filtering, DLP, and email encryption. The on-premises security gateway can also help Microsoft Exchange Server to track and protect internal email that originates and ends inside your corporate firewall. Learn more about Progent's ProSight Email Guard spam filtering, virus defense, content filtering and data leakage protection.

  • ProSight WAN Watch: Infrastructure Management
    ProSight WAN Watch is a network infrastructure management service that makes it simple and affordable for small and mid-sized organizations to map, track, reconfigure and debug their connectivity hardware such as switches, firewalls, and access points as well as servers, printers, client computers and other devices. Using state-of-the-art RMM technology, WAN Watch ensures that network diagrams are always current, captures and displays the configuration information of almost all devices connected to your network, tracks performance, and generates alerts when potential issues are detected. By automating complex network management activities, ProSight WAN Watch can cut hours off ordinary chores like network mapping, reconfiguring your network, finding devices that require important software patches, or isolating performance bottlenecks. Find out more details about ProSight WAN Watch network infrastructure monitoring and management consulting.

  • ProSight LAN Watch: Server and Desktop Monitoring
    ProSight LAN Watch is Progentís server and desktop monitoring managed service that incorporates state-of-the-art remote monitoring and management (RMM) technology to keep your IT system operating at peak levels by tracking the health of vital assets that drive your business network. When ProSight LAN Watch detects an issue, an alert is transmitted immediately to your designated IT management staff and your assigned Progent engineering consultant so all potential problems can be addressed before they have a chance to impact productivity Learn more about ProSight LAN Watch server and desktop monitoring services.

  • ProSight Virtual Hosting: Hosted Virtual Machines at Progent's World-class Data Center
    With Progent's ProSight Virtual Hosting service, a small business can have its critical servers and apps hosted in a secure Tier III data center on a high-performance virtual host configured and managed by Progent's IT support professionals. With Progent's ProSight Virtual Hosting model, the client owns the data, the OS software, and the apps. Because the system is virtualized, it can be ported easily to a different hardware solution without requiring a lengthy and difficult reinstallation procedure. With ProSight Virtual Hosting, your business is not tied one hosting service. Find out more details about ProSight Virtual Hosting services.

  • ProSight IT Asset Management: Network Infrastructure Documentation Management
    ProSight IT Asset Management service is a cloud-based IT documentation management service that makes it easy to create, update, find and safeguard information related to your network infrastructure, processes, applications, and services. You can instantly locate passwords or serial numbers and be alerted automatically about upcoming expirations of SSLs ,domains or warranties. By cleaning up and organizing your IT documentation, you can save up to 50% of time thrown away trying to find critical information about your IT network. ProSight IT Asset Management features a centralized repository for holding and collaborating on all documents related to managing your business network like recommended procedures and self-service instructions. ProSight IT Asset Management also supports a high level of automation for gathering and associating IT data. Whether youíre planning enhancements, doing maintenance, or reacting to an emergency, ProSight IT Asset Management gets you the data you require the instant you need it. Find out more about Progent's ProSight IT Asset Management service.
ProSight Network Audits
Progent's ProSight Network Audits offer a fast and affordable alternative for small and medium-size businesses to obtain an unbiased assessment of the health of their IT system. Powered by some of the leading remote monitoring and management (RMM) tools available, and supervised by Progent's world-class team of information technology professionals, ProSight Network Audits show you how closely the deployment of your essential network devices adhere to industry leading practices. The Basic and Advanced options for ProSight Network Audit services are offered at a budget-friendly, one-time cost and provide instant ROI such as a more manageable Active Directory environment. Both also come with a year of state-of-the-art remote network monitoring and management. Benefits can include easier network management, improved compliance with information security requirements, higher utilization of network resources, faster problem resolution, more dependable backup and restore, and higher availability. See more information about Progent's ProSight Network Audits network infrastructure assessment.

The ProSight Ransomware Preparedness Report Service
The ProSight Ransomware Preparedness Report is a low-cost service based on a brief discussion with a Progent information assurance consultant. The interview is designed to assess your organization's preparedness either to stop or recover quickly after a ransomware attack. Progent will consult with you directly to gather information about your current security profile and backup platform, and Progent will then produce a written Basic Security and Best Practices Report detailing how you can follow best practices to deploy a cost-effective security and backup/recovery environment that aligns with your company's requirements. For additional information, see Progent's ProSight Ransomware Preparedness Report.

Contact Progent for Network Security Auditing
For more information about Progent's security inventory scanning offerings, telephone Progent at 800-993-9400 or visit Contact Progent.
















© 2002- 2018 Progent Corporation. All rights reserved.


More topics of interest: