ProSight Duo Access Security
Progent's ProSight Duo suite of services incorporates advanced access security technology from Duo, a Cisco company, to deliver two-factor authentication solutions. Two-factor authentication (2FA) is one of the pillars of zero-trust cybersecurity design. 2FA utilizes out-of-band identity verification to build an additional layer of security beyond traditional passwords. This blocks the most frequent causes of security breaches such as phishing, brute-force password attacks, and stolen credentials.
Duo's single-touch Mobile Push application simplifies access security
Duo's Push App saves time and distraction by allowing users to confirm their identity simply by pressing "Approve" on the validation box on their personal smartphone or wearable. This one-tap process eliminates the necessity to retrieve an email or text message and transcribe a passcode by hand.
Progent's ProSight Duo catalog includes three subscription services that build on one another. ProSight Duo MFA permits you to deploy Duo's two-factor authentication service to guard all users while offering essential policy controls, centralized management, and fast endpoint provisioning. ProSight Duo Access supports all the features of ProSight Duo MFA plus adaptive ID validation controls and endpoint health checking. ProSight Duo Beyond brings the ability to differentiate corporate as distinct from personal endpoints, deny access to suspect devices, and give users safe and seamless access to internal apps. Progent is a certified Duo Managed Service Provider and can assist your company to design, implement and manage a modern identity validation solution that delivers the highest level of security without bogging down your users.
Two-factor Authentication
Most security breaches involve compromised passwords. Each service plan in Progent's ProSight Duo family of identity validation solutions can eliminate your dangerous reliance on password protection by supporting two-factor authentication. With 2FA implemented, when you sign into a protected online account and enter your correct password you are requested to confirm who you are by means of a device that you have sole ownership of and that uses a separate ("out-of-band") channel. A broad range of devices can be utilized as your second form of ID validation such as an iOS or Android smartphone or wearable, a token, a landline phone, etc. You can enroll several different authentication devices.
ProSight Duo two-factor authentication adds an extra level of security
Once you confirm your identity using your validation device, you are permitted to use your app or utilize your VPN or remote desktop connection. With the Duo Mobile app's push notification service enabled, you can simply touch "Approve" on your supported phone or watch. This improves the sign-on experience by making the verification procedure virtually immediate. For other secondary units, such as a token, you can copy a temporary passcode.
Products Offered with ProSight Duo Services
Progent's ProSight Duo family of subscription-based service offerings include ProSight Duo MFA, ProSight Duo Access, and ProSight Duo Beyond. Progent's cybersecurity consultants can assist you to determine which plan for ProSight Duo is appropriate for your environment.
ProSight Duo MFA Features:
- Two-factor authentication
- Duo Mobile to push one-touch identity verification for iOS or Android smartphones and watches
- Authentication with a U2F USB device or biometrics
- Traditional two-factor authentication via a passcode on a token, mobile device, or issued by an IT administrator
- Self-enrollment and self-management
- Dashboard displaying all devices connected to protected applications
- Security policy enforcement driven by app, group
- Cloud-based single sign-on for all applications through an MFA-secured dashboard
ProSight Duo Access Features:
- All the features of ProSight Duo
- Unified Endpoint Visibility shows each networked device, not simply managed endpoints
- Highlight and track unhealthy devices
- Duo Device Health application for notebooks and PCs
- Cybersecurity health visibility for mobile computers
- Access policy enforcement based on location
- Blocking capability for anonymous networks such as The Onion Router (Tor)
- Detection of high-risk or unhealthy networks
- Health-based policy enforcement for laptops, PCs and computers
- Advise users at sigh-on to bring up to date their software and cybersecurity settings
ProSight Duo Beyond Features:
- All of the features included with ProSight Duo Access
- Detection of corporate-owned vs. personally owned notebooks, desktops and mobile devices
- Identification of 3rd-party software agents such as anti-virus operating on devices
- Protected access to on-premises websites/applications and SSH (Secure Shell) servers without requiring VPN credential management
- Verification of both user and endpoint trust
- Limit device access to applications determined by membership in endpoint management systems
- Control mobile access to applications based on membership in mobile device management systems
Read ProSight Duo Two-factor Authentication Services Datasheet
To download a datasheet about the key features and benefits of ProSight Duo Access Security Service Plans, select:
ProSight Duo access security service plans datasheet. (PDF - 335 KB)
Download Importance of Deploying Modern Password Management Technology White Paper
To view or download a white paper describing the importance of utilizing up-to-date password management tools, click:
Reasons for Deploying Modern Password Management Technology White Paper. (PDF - 2.3 MB)
How Progent Can Assist You to Create an MFA Solution with ProSight Duo
Progent can assist your business to plan, implement, maintain and debug a two-factor authentication solution based on ProSight Duo managed services. Progent can also assist your business to integrate ProSight Duo 2FA services into a cohesive, comprehensive security system by providing expertise in all aspects of modern security technology for any mix of cloud, on-premises, at-home, and mobile resources and users.
Progent's Cisco-certified CCIE network experts can assist you to set up and debug your Cisco ASA firewalls, switches, VPN connections, and other network infrastructure to support Cisco Duo's identity authentication technology. Progent's certified Azure experts, Amazon AWS support consultants and Google Cloud Platform consulting experts can help your business to bring the protection of ProSight Duo 2FA services to your cloud-hosted apps. Progent's teleworker integration specialists can assist you to set up safe and reliable remote connectivity for your teleworkers.
Progent also offers fast access to Microsoft 365 Exchange experts, SQL Server consultants, and Microsoft 365 consultants help your company to prepare and implement Duo secure access technology with your key workloads. Progent's CISSP-certified network security experts and CISM-certified network security specialists can help your organization to assess and elevate your overall security profile. Progent also offers ProSight Active Security Monitoring managed services for machine-learning based endpoint protection powered by SentinelOne.
Additional Managed Services Available from Progent
In addition to ProSight Duo identity authentication services, Progent can provide other affordably-priced managed service plans that cover critical aspects of your information network like security, backup/recovery, and network infrastructure monitoring and management. By partnering with top-tier technology innovators, Progent can offer small and middle-size organizations the benefits of the identical advanced technology used by the world's largest enterprises. Managed service plans available from Progent include:
- ProSight LAN Watch: Server and Desktop Remote Monitoring
ProSight LAN Watch is Progent's server and desktop monitoring service that uses advanced remote monitoring and management (RMM) techniques to help keep your IT system running at peak levels by tracking the state of critical assets that power your information system. When ProSight LAN Watch uncovers an issue, an alert is sent automatically to your specified IT personnel and your Progent consultant so that any potential issues can be resolved before they can impact your network. Find out more about ProSight LAN Watch server and desktop remote monitoring consulting.
- ProSight LAN Watch with NinjaOne RMM: Unified RMM Solution for Networks, Servers, and Desktops
ProSight LAN Watch with NinjaOne RMM software offers a centralized, cloud-based solution for managing your network, server, and desktop devices by providing tools for streamlining common tedious tasks. These can include health monitoring, update management, automated repairs, endpoint deployment, backup and restore, A/V protection, remote access, standard and custom scripts, resource inventory, endpoint profile reports, and debugging support. If ProSight LAN Watch with NinjaOne RMM spots a serious incident, it sends an alarm to your specified IT staff and your assigned Progent consultant so that emerging issues can be fixed before they impact your network. Learn more about ProSight LAN Watch with NinjaOne RMM server and desktop remote monitoring consulting.
- ProSight WAN Watch: Network Infrastructure Management
Progent's ProSight WAN Watch is a network infrastructure monitoring and management service that makes it simple and inexpensive for small and mid-sized businesses to map, monitor, optimize and debug their networking hardware like routers, firewalls, and wireless controllers plus servers, endpoints and other devices. Using cutting-edge RMM technology, WAN Watch ensures that network diagrams are kept current, captures and manages the configuration of almost all devices on your network, monitors performance, and sends alerts when potential issues are discovered. By automating tedious network management activities, ProSight WAN Watch can knock hours off ordinary tasks such as making network diagrams, reconfiguring your network, locating appliances that require critical software patches, or resolving performance issues. Learn more details about ProSight WAN Watch infrastructure management consulting.
- ProSight Reporting: In-depth Reporting for Ticketing and Network Monitoring Applications
ProSight Reporting is a growing family of in-depth management reporting utilities designed to work with the industry's top ticketing and remote network monitoring platforms such as ConnectWise Manage, ConnectWise Automate, Customer Thermometer, Auvik, and SentinelOne. ProSight Reporting uses Microsoft Graph and utilizes color coding to highlight and contextualize key issues such as spotty support follow-up or machines with out-of-date AVs. By identifying ticketing or network health problems clearly and in near-real time, ProSight Reporting improves network value, reduces management overhead, and saves money. For more information, visit ProSight Reporting for ticketing and network monitoring platforms.
- ProSight Data Protection Services (DPS): Managed Backup and Disaster Recovery Services
Progent has partnered with leading backup/restore technology companies to create ProSight Data Protection Services, a family of subscription-based offerings that deliver backup-as-a-service. ProSight DPS products manage and track your data backup processes and allow non-disruptive backup and fast restoration of critical files, apps, system images, and virtual machines. ProSight DPS helps your business recover from data loss resulting from hardware failures, natural disasters, fire, cyber attacks such as ransomware, user mistakes, malicious insiders, or application bugs. Managed backup services in the ProSight DPS product family include ProSight DPS Altaro VM Backup, ProSight 365 Total Backup (formerly Altaro 365 Backup), ProSight ECHO Backup based on Barracuda dedicated storage, and ProSight MSP360 Cloud and On-prem Backup. Your Progent expert can assist you to identify which of these managed backup services are best suited for your IT environment.
- ProSight Email Guard: Inbound and Outbound Spam Filtering and Data Leakage Protection
ProSight Email Guard is Progent's spam filtering and email encryption service that uses the technology of leading data security companies to deliver centralized control and comprehensive protection for all your inbound and outbound email. The hybrid structure of Email Guard managed service combines a Cloud Protection Layer with an on-premises gateway appliance to provide advanced protection against spam, viruses, Denial of Service (DoS) Attacks, Directory Harvest Attacks (DHAs), and other email-based threats. Email Guard's cloud filter serves as a first line of defense and blocks most threats from reaching your network firewall. This reduces your exposure to inbound attacks and saves system bandwidth and storage space. Email Guard's onsite gateway device provides a deeper level of inspection for incoming email. For outbound email, the on-premises security gateway offers AV and anti-spam protection, DLP, and email encryption. The on-premises security gateway can also help Microsoft Exchange Server to track and safeguard internal email that originates and ends inside your security perimeter. For more information, visit Email Guard spam filtering and data leakage protection.
- Outsourced/Co-managed Help Desk: Help Desk Managed Services
Progent's Support Center services permit your IT team to offload Help Desk services to Progent or divide responsibilities for support services seamlessly between your internal support group and Progent's nationwide roster of certified IT support engineers and subject matter experts. Progent's Co-managed Help Desk Service offers a smooth supplement to your core IT support resources. End user interaction with the Help Desk, delivery of support, problem escalation, ticket generation and tracking, efficiency metrics, and maintenance of the service database are consistent whether issues are taken care of by your internal network support resources, by Progent's team, or both. Learn more about Progent's outsourced/co-managed Call Desk services.
- Progent Active Protection Against Ransomware: Machine Learning-based Ransomware Identification and Cleanup
Progent's Active Protection Against Ransomware is an endpoint protection solution that utilizes cutting edge behavior-based machine learning tools to defend endpoint devices as well as physical and virtual servers against new malware assaults such as ransomware and email phishing, which easily escape legacy signature-based anti-virus products. Progent Active Security Monitoring services safeguard local and cloud resources and provides a single platform to automate the entire threat progression including blocking, detection, containment, cleanup, and forensics. Top features include one-click rollback with Windows Volume Shadow Copy Service and automatic network-wide immunization against newly discovered threats. Read more about Progent's ransomware protection and recovery services.
- ProSight IT Asset Management: Network Documentation Management
ProSight IT Asset Management service is a cloud-based IT documentation management service that makes it easy to capture, update, retrieve and safeguard information about your network infrastructure, processes, business apps, and services. You can quickly locate passwords or serial numbers and be alerted automatically about upcoming expirations of SSLs or warranties. By updating and managing your IT infrastructure documentation, you can save as much as half of time wasted trying to find critical information about your IT network. ProSight IT Asset Management includes a common location for storing and sharing all documents required for managing your network infrastructure like standard operating procedures (SOPs) and How-To's. ProSight IT Asset Management also offers advanced automation for collecting and associating IT information. Whether you're planning improvements, performing maintenance, or reacting to an emergency, ProSight IT Asset Management gets you the knowledge you require when you need it. Find out more about ProSight IT Asset Management service.
- Patch Management: Software/Firmware Update Management Services
Progent's managed services for software and firmware patch management provide businesses of any size a flexible and cost-effective solution for assessing, testing, scheduling, implementing, and tracking software and firmware updates to your ever-evolving information network. In addition to optimizing the protection and functionality of your IT environment, Progent's software/firmware update management services free up time for your IT team to focus on more strategic projects and tasks that derive the highest business value from your network. Learn more about Progent's software/firmware update management support services.
- ProSight Virtual Hosting: Hosted VMs at Progent's Tier III Data Center
With Progent's ProSight Virtual Hosting service, a small organization can have its critical servers and applications hosted in a protected Tier III data center on a high-performance virtual machine host configured and managed by Progent's network support experts. Under Progent's ProSight Virtual Hosting service model, the customer retains ownership of the data, the operating system platforms, and the apps. Since the system is virtualized, it can be moved immediately to an alternate hardware environment without requiring a time-consuming and technically risky reinstallation procedure. With ProSight Virtual Hosting, you are not locked into one hosting service. Learn more details about ProSight Virtual Hosting services.
- ProSight Active Security Monitoring: Endpoint Protection and Ransomware Defense
Progent's ProSight Active Security Monitoring (ASM) is an endpoint protection (EPP) solution that incorporates SentinelOne's cutting edge behavior machine learning tools to defend physical and virtual endpoint devices against modern malware attacks such as ransomware and email phishing, which easily escape legacy signature-matching anti-virus tools. ProSight ASM protects on-premises and cloud-based resources and provides a single platform to automate the entire threat lifecycle including blocking, infiltration detection, containment, cleanup, and post-attack forensics. Key features include single-click rollback using Windows Volume Shadow Copy Service (VSS) and real-time system-wide immunization against new threats. Progent is a SentinelOne Partner, dealer, and integrator. Learn more about Progent's ProSight Active Security Monitoring next-generation endpoint protection and ransomware defense.
- ProSight Enhanced Security Protection (ESP): Physical and Virtual Endpoint Protection and Exchange Filtering
Progent's ProSight Enhanced Security Protection managed services offer ultra-affordable in-depth security for physical servers and VMs, workstations, smartphones, and Exchange email. ProSight ESP utilizes adaptive security and modern behavior analysis for round-the-clock monitoring and responding to security threats from all attack vectors. ProSight ESP provides two-way firewall protection, intrusion alarms, endpoint management, and web filtering via leading-edge technologies packaged within a single agent accessible from a single control. Progent's data protection and virtualization experts can help you to plan and implement a ProSight ESP environment that meets your company's unique requirements and that allows you prove compliance with government and industry information security regulations. Progent will help you specify and configure security policies that ProSight ESP will enforce, and Progent will monitor your IT environment and react to alarms that require urgent attention. Progent can also help you to install and verify a backup and restore solution such as ProSight Data Protection Services so you can get back in business rapidly from a destructive security attack like ransomware. Read more about Progent's ProSight Enhanced Security Protection (ESP) unified endpoint protection and Exchange email filtering.
Contact Progent for Cybersecurity Expertise
If you need help with MFA access security or any other facet of network security, contact Progent at 800-993-9400 or visit Contact Progent.