ProSight Duo Multi-Factor Authentication
Duo Two-factor Authentication ConsultantsProgent's ProSight Duo suite of managed services incorporates advanced access security technology from Duo, a Cisco company, to offer multi-factor ID validation services. Two-factor authentication is one of the pillars of zero-trust cybersecurity design. 2FA utilizes out-of-band identity confirmation to provide a second layer of security beyond traditional passwords. 2FA protects against the most common causes of cybersecurity break-ins including phishing, brute-force password attacks, and stolen credentials.

Duo Two-factor Identity Validation Experts

Duo's single-touch Mobile Push app streamlines access security

Duo's push technology minimizes time and distraction by allowing users to verify who they are just by pressing "Approve" on the validation box on their own smartphone or wearable. This one-tap process does away with the necessity to open an email or text and transcribe a passcode by hand.

Duo Certified Managed Service PartnersProgent's ProSight Duo family includes three subscription-based services that progressively add features. ProSight Duo MFA permits you to deploy Duo's 2FA platform to guard all users while providing basic policy tools, unified management, and rapid provisioning. ProSight Duo Access provides all the capabilities of ProSight Duo MFA plus adaptive authentication controls and endpoint health monitoring. ProSight Duo Beyond brings the ability to differentiate corporate as distinct from personal devices, block suspect devices, and give users secure and transparent access to your inside apps. Progent is a certified Duo Managed Service Provider and can assist your company to plan, deploy and maintain an advanced identity validation system that delivers top-level access security without bogging down your users.

Two-factor Authentication
The overwhelming majority of cybersecurity break-ins involve compromised passwords. Every managed service offering in Progent's ProSight Duo catalog of identity validation products can reduce your dangerous reliance on password protection by allowing two-factor authentication. With 2FA implemented, when you sign into a secured online application and enter your correct password you are requested to confirm your identity by means of a device which you have exclusive possession of and that runs on a different ("out-of-band") channel. A broad selection of devices can be used as your second means of authentication including a smartphone or watch, a hardware token, a landline phone, etc. You can enroll several different verification devices.

Duo Two-factor Authentication Consultants

ProSight Duo two-factor authentication provides an extra layer of security

After you confirm your identity using your validation device, you are allowed to use your application or utilize your VPN or remote desktop connection. With the Duo Mobile app's push notification feature enabled, you can simply tap "Approve" on your supported smartphone or smart watch. This streamlines the sign-on experience by making the authentication process nearly instantaneous. For other authentication units, such as a token, you can copy a short-term password.

Products Offered with ProSight Duo Managed Services
Progent's ProSight Duo line of subscription service offerings include ProSight Duo MFA, ProSight Duo Access, and ProSight Duo Beyond. Progent's security consultants can assist your organization to determine which plan for ProSight Duo is best suited for your requirements.

ProSight Duo MFA Features:

  • Two-factor authentication
  • Duo Mobile to push one-touch ID validation for smartphones and wearables
  • Authentication through a Universal 2nd Factor USB device or biometrics
  • Conventional 2FA with a passcode on a token, mobile device, or provided by a network admin
  • Self-enrollment and self-management
  • Dashboard of all devices accessing protected apps
  • Access policy enforcement driven by network, group
  • Cloud-based SSO for any applications via an MFA-secured dashboard
ProSight Duo Access Features:
  • All the features included with ProSight Duo
  • Unified Endpoint Visibility shows each networked device, not simply managed endpoints
  • Highlight and track high-risk devices
  • Duo Device Health apps for notebooks and PCs
  • Cybersecurity health visibility for mobile computers
  • Access policy enforcement driven by geo-location
  • Blocking capability for anonymous communication networks like The Onion Router (Tor)
  • Detection of suspicious or problem networks
  • Health-based policy enforcement for notebooks, PCs and devices
  • Advise users at login to bring up to date their software and security configurations
ProSight Duo Beyond Features:
  • All the features included with ProSight Duo Access
  • Identification of corporate-owned vs. BYOD notebooks, PCs and mobile devices
  • Identification of 3rd-party software agents such as anti-virus operating on devices
  • Protected access to on-prem websites/apps and SSH (Secure Shell) servers without requiring VPN credential management
  • Validation of both user and endpoint trust
  • Control device access to apps determined by enrollment in endpoint management systems
  • Control mobile access to applications determined by enrollment in mobile device management systems (MDMs)
Read ProSight Duo Two-factor Authentication Service Plans Datasheet
For a datasheet describing the major features of ProSight Duo Two-factor Authentication Services, select:
ProSight Duo access security services datasheet. (PDF - 335 KB)

Download Importance of Using Advanced Password Management Tools White Paper
To read or download a white paper describing the importance of deploying modern password management tools, click:
Reasons for Deploying Advanced Password Management Tools White Paper. (PDF - 2.3 MB)

How Progent Can Help You to Create an MFA Solution with ProSight Duo
Progent can help your company to plan, deploy, maintain and debug a two-factor ID verification solution based on ProSight Duo managed services. Progent can also help your organization to incorporate ProSight Duo 2FA services into a cohesive, company-wide cybersecurity system by providing expert support for all facets of advanced cybersecurity tools and services for any mix of cloud, on-premises, at-home, and mobile resources and users.

Progent's Cisco-certified CCIE network engineers can help you to configure and debug your Cisco Firepower firewalls, Catalyst switches, VPN devices, and other infrastructure to work with Cisco Duo's ID verification services. Progent's authorized Azure integration experts, Amazon AWS configuration experts and Google Cloud Platform consulting experts can help your organization to bring the security of ProSight Duo 2FA services to your cloud-hosted apps. Progent's telecommuter integration specialists can help you to plan and configure protected and resilient remote connectivity for your at-home workers.

Progent can also provide fast access to Exchange Online consultants, SQL Server consultants, and Microsoft 365 integration consultants assist your organization to prepare and deploy Duo 2FA with your critical applications. Progent's CISSP-certified network security experts and CISM-certified network security experts can help you to review and fortify your overall cybersecurity profile. Progent also offers ProSight Active Security Monitoring (ASM) managed services for machine-learning based endpoint protection powered by SentinelOne.

Additional Managed Services Available from Progent
Besides ProSight Duo access security services, Progent offers other affordably-priced managed service packages that address key components of your information network like cybersecurity, backup/restore, and infrastructure monitoring and management. By working with top-tier technology providers, Progent can provide small and mid-size organizations the benefits of the identical cutting-edge technology utilized by the world's largest enterprises. Popular managed services offered by Progent include:

  • ProSight Active Security Monitoring: Endpoint Protection and Ransomware Defense
    ProSight Active Security Monitoring (ASM) is an endpoint protection (EPP) service that utilizes SentinelOne's next generation behavior-based machine learning tools to defend physical and virtual endpoint devices against new malware assaults like ransomware and file-less exploits, which routinely evade traditional signature-based AV tools. ProSight ASM safeguards local and cloud resources and offers a unified platform to manage the entire threat progression including filtering, identification, mitigation, remediation, and post-attack forensics. Key features include single-click rollback using Windows Volume Shadow Copy Service (VSS) and automatic system-wide immunization against new attacks. Progent is a SentinelOne Partner, reseller, and integrator. Read more about Progent's ProSight Active Security Monitoring endpoint protection and ransomware recovery.

  • ProSight Enhanced Security Protection: Physical and Virtual Endpoint Security and Exchange Filtering
    ProSight Enhanced Security Protection managed services deliver economical in-depth protection for physical and virtual servers, desktops, smartphones, and Exchange Server. ProSight ESP utilizes adaptive security and advanced machine learning for round-the-clock monitoring and reacting to security assaults from all attack vectors. ProSight ESP provides two-way firewall protection, penetration alerts, endpoint control, and web filtering via cutting-edge technologies packaged within one agent accessible from a unified control. Progent's security and virtualization experts can help you to plan and configure a ProSight ESP environment that addresses your company's unique requirements and that helps you demonstrate compliance with government and industry data protection regulations. Progent will help you specify and implement policies that ProSight ESP will enforce, and Progent will monitor your IT environment and respond to alerts that call for immediate action. Progent can also assist you to install and verify a backup and disaster recovery system like ProSight Data Protection Services (DPS) so you can get back in business rapidly from a potentially disastrous security attack such as ransomware. Read more about Progent's ProSight Enhanced Security Protection (ESP) unified endpoint protection and Exchange filtering.

  • ProSight Data Protection Services: Managed Backup and Recovery Services
    Progent has worked with advanced backup software companies to create ProSight Data Protection Services (DPS), a family of subscription-based management offerings that deliver backup-as-a-service (BaaS). ProSight DPS services manage and track your backup operations and enable non-disruptive backup and rapid recovery of vital files/folders, applications, system images, and virtual machines. ProSight DPS helps your business recover from data loss caused by hardware failures, natural calamities, fire, malware such as ransomware, human error, ill-intentioned insiders, or application bugs. Managed services available in the ProSight DPS product family include ProSight DPS Altaro VM Backup, ProSight 365 Total Backup (formerly Altaro 365 Backup), ProSight ECHO Backup using Barracuda purpose-built hardware, and ProSight MSP360 Cloud and On-prem Backup. Your Progent service representative can help you to determine which of these fully managed services are most appropriate for your network.

  • ProSight WAN Watch: Network Infrastructure Remote Monitoring and Management
    Progent's ProSight WAN Watch is an infrastructure management service that makes it easy and inexpensive for small and mid-sized organizations to map, monitor, optimize and troubleshoot their networking appliances like routers and switches, firewalls, and wireless controllers plus servers, endpoints and other networked devices. Incorporating cutting-edge Remote Monitoring and Management (RMM) technology, WAN Watch makes sure that network diagrams are always current, captures and manages the configuration of virtually all devices connected to your network, monitors performance, and generates notices when issues are discovered. By automating tedious management and troubleshooting processes, WAN Watch can knock hours off ordinary chores such as making network diagrams, reconfiguring your network, finding devices that need critical software patches, or resolving performance issues. Find out more details about ProSight WAN Watch network infrastructure monitoring and management services.

  • ProSight LAN Watch: Server and Desktop Monitoring and Management
    ProSight LAN Watch is Progent's server and desktop remote monitoring managed service that uses state-of-the-art remote monitoring and management (RMM) techniques to keep your IT system operating efficiently by checking the health of vital computers that power your information system. When ProSight LAN Watch detects an issue, an alert is sent immediately to your designated IT management staff and your Progent engineering consultant so all potential problems can be resolved before they have a chance to impact your network. Learn more details about ProSight LAN Watch server and desktop remote monitoring consulting.

  • ProSight IT Asset Management: Network Documentation Management
    Progent's ProSight IT Asset Management service is a cloud-based IT documentation management service that allows you to create, maintain, find and safeguard data related to your IT infrastructure, processes, applications, and services. You can quickly locate passwords or serial numbers and be alerted automatically about impending expirations of SSLs ,domains or warranties. By updating and managing your IT documentation, you can save as much as half of time wasted searching for critical information about your network. ProSight IT Asset Management features a common location for holding and collaborating on all documents required for managing your network infrastructure such as recommended procedures and How-To's. ProSight IT Asset Management also offers a high level of automation for collecting and associating IT information. Whether you're making improvements, doing maintenance, or reacting to an emergency, ProSight IT Asset Management delivers the knowledge you need when you need it. Find out more about Progent's ProSight IT Asset Management service.

  • Progent Active Defense Against Ransomware: Machine Learning-based Ransomware Detection and Remediation
    Progent's Active Protection Against Ransomware is an endpoint protection managed service that incorporates next generation behavior analysis tools to defend endpoint devices as well as servers and VMs against new malware assaults such as ransomware and email phishing, which routinely get by legacy signature-matching anti-virus tools. Progent Active Security Monitoring services safeguard local and cloud-based resources and provides a unified platform to manage the complete threat progression including blocking, detection, containment, cleanup, and forensics. Top capabilities include one-click rollback using Windows Volume Shadow Copy Service (VSS) and automatic system-wide immunization against new threats. Find out more about Progent's ransomware protection and cleanup services.

  • Progent's Outsourced/Shared Service Center: Support Desk Managed Services
    Progent's Help Desk services allow your information technology staff to offload Help Desk services to Progent or divide responsibilities for Help Desk services transparently between your in-house network support team and Progent's nationwide roster of certified IT service technicians, engineers and subject matter experts (SMEs). Progent's Shared Service Desk offers a smooth extension of your corporate network support staff. End user access to the Service Desk, provision of support services, escalation, ticket generation and tracking, efficiency measurement, and maintenance of the support database are cohesive regardless of whether issues are resolved by your internal IT support staff, by Progent's team, or by a combination. Find out more about Progent's outsourced/shared Service Desk services.

  • Progent's Patch Management: Patch Management Services
    Progent's managed services for patch management offer businesses of all sizes a versatile and affordable alternative for evaluating, testing, scheduling, implementing, and documenting updates to your dynamic IT network. In addition to optimizing the security and reliability of your computer environment, Progent's patch management services permit your IT team to concentrate on line-of-business projects and activities that deliver the highest business value from your network. Learn more about Progent's patch management services.
Contact Progent for Cybersecurity Expertise
If you need expertise for multi-factor authentication or any other aspect of cybersecurity, contact Progent at 800-993-9400 or visit Contact Progent.



An index of content::

  • 24/7 Edmonton-Lloydminster Outsourced IT Management Services After Hours Technical Consultant Edmonton
  • 24x7 scom 2016 agents Remote Troubleshooting scom 2016 high availability On-site Technical Support
  • ASA Consulting Best Cisco GTP/GPRS Network Consulting
  • After Hours Microsoft and Cisco Certified Expert Boston IT Outsourcing Company Boston-Cambridge Setup Consultancy Services
  • After Hours Phoenix Hermes Crypto-Ransomware Removal Maricopa County Arizona Phoenix Phoenix Phobos Crypto-Ransomware System-Rebuild
  • Open Now MFA and Single Sign-on (SSO) Setup and Support
  • Arizona Setup After Hours Computer Services Maine
  • At Home Workforce Wichita Assistance - Management Solutions Consulting Experts Wichita Airport ICT At Home Workers Consulting nearby Wichita - Endpoint Management Systems Consulting Experts Wichita, Sedgwick County
  • Award Winning Manchester, Hillsborough County, New Hampshire Networking Firm Cisco and Microsoft Certified New Hampshire Network Companies

  • ransomware removal and file restore Specialists
    Egregor ransomware recovery Consultant Services

    Progent's ransomware consultants can help you to assess your ransomware vulnerability, remotely monitor and guard your network, assist with settlement negotiations with a hacker, and reconstruct a network victimized by a ransomware cryptoworm such as Ryuk, Maze, Sodinokibi, Netwalker, Snatch or Egregor.

  • IT Consulting Duo MFA and Single Sign-on (SSO)
  • Baltimore Spora Crypto-Ransomware Repair Baltimore Downtown Baltimore Ransomware Recovery Baltimore

  • Exchange 2013 Configuration Technical Consultant
    Biggest Integration Exchange 2013 Upgrade

    Microsoft Exchange Server 2013 incorporates significant enhancements to the capabilities of its predecessor Exchange Server 2010 and introduces important innovations plus a redesigned architecture. These enhancements affect vital facets of IT such as manageability, availability, security and compliance, operational costs, teamwork, scalability, throughput, cross-version interoperability, and the user experience. Progent's Microsoft-certified Exchange 2013 consulting professionals can help you evaluate the potential advantages of upgrading to Microsoft Exchange Server 2013, create a cost-effective validation and deployment plan, and train your IT staff to maintain your Microsoft Exchange 2013 solution. Progent also offers ongoing remote consulting and support and management for Microsoft Exchange Server 2013.

  • California - Los Angeles, CA, San Diego, CA, Long Beach, CA, Fresno, CA SQL Small Office Server Support 24/7/365 SQL Consulting Team California
  • California - Los Angeles, CA, San Diego, CA, Long Beach, CA, Fresno, CA Windows Server Troubleshoot Expert Windows Information Technology Outsourcing Companies California

  • Clustered Windows Server 2012 R2 Support
    Clustered Windows Server 2012 Network Consultant

    Progent's Microsoft-certified failover clustering consultants can assist companies of all sizes to evaluate the advantages of utilizing Microsoft Windows Server 2012 clustering to create a powerful fault-tolerant/disaster recovery strategy, help your organization to plan and install a Windows Server 2012 system, provide online and on-premises consulting services and engineering support for clusters that include physical servers or virtual machines, and show you how to automate the management of clustered servers.

  • Chatsworth Work at Home Employees Call Desk Solutions Assistance Chatsworth-Simi Valley Teleworkers Consulting near Chatsworth - Call Desk Solutions Consulting Services Chatsworth-Simi Valley, California
  • Cheyenne Hermes Crypto-Ransomware Forensics Analysis Cheyenne WY Cheyenne Ryuk Crypto-Ransomware Incident Reporting Cheyenne Wyoming
  • Cisco Migrations New York City, New York Open Now Cisco Computer Support For Small Offices New York City, Buffalo, Rochester, NY
  • Citrix Server Management Consultancy Consultant Services Citrix XenServer
  • Curitiba At Home Workforce Endpoint Management Solutions Consulting Curitiba, PR At Home Workforce Consultants near me in Curitiba - Endpoint Management Solutions Consulting Experts Curitiba
  • Desktop Consultant Contractor Ceres, CA Help Desk Support Telecommuting Job
  • El Paso Hermes Crypto-Ransomware Cleanup El Paso Greater Ciudad Juarez, USA El Paso Dharma Ransomware Remediation El Paso, TX
  • Immediate Lakeland Teleworkers Setup Consulting Lakeland-Plant City, FL Biggest Work from Home Employees Expertise in Lakeland - Integration Assistance Lakeland

  • Microsoft Desktop Apps Instruction Small Office Computer Consultant
    24-7 Online Office PowerPoint Learning

    Progent provides customized remote training for popular desktop apps and environments including Office and Microsoft 365 Excel, Word, Access and Visio plus Acrobat Writer, Adobe Photoshop, Crystal Reports, and Windows 10. Remote instruction offers the benefits of traditional in-person seminars, including instant communication between students and trainers, but eliminates the expenses of travel and the challenge of attempting to synchronize the schedules of many workers. Available to individuals or classes of all sizes, Progent's live online instruction allows the instructor to run the seminar from a remote office and the clients can be dispersed throughout an office or all over the the U.S. Virtual instruction deploys powerful teaching aids like broadcast white boards, real-time questions, and shared applications. Sessions can be short and personalized to specialized subjects or extended in duration and wider in coverage.

  • Immediate SharePoint Specialists Barra Remote Troubleshooting Microsoft SharePoint 2010
  • Lawrence Teleworkers Integration Consulting Experts Lawrence Massachusetts Remote Workforce Lawrence Guidance - Setup Guidance Lawrence, Massachusetts
  • Lexington-Fayette Ryuk Ransomware Business Recovery Lexington, KY Lexington-Fayette Snatch Ransomware Recovery Fayette County Kentucky, United States
  • Lima MongoLock Ransomware Rollback Lima Phobos Ransomware Operational Recovery Lima, Santiago de Surco

  • Skills Transfer Windows
    Skills Transfer Server

    Progent practices information transfer from Progent's consultants to customers. By teaching clients to handle problems that are within their comfort zone, Progent can focus on providing hard-to-find services where Progent has little competition. Mid-size companies who work with trusted independent consultants or who maintain in-house IT personnel benefit when Progent transfers knowledge about new technology and tested processes to make their networks more reliable, secure, and productive.

  • Manchester-Wigan Network Consulting Company Manchester-Oldham Information Technology Support
  • Microsoft SharePoint Consulting Sacramento SharePoint Server 2019 Remote Consulting Sacramento - Citrus Heights
  • Milwaukee, Wisconsin, U.S.A. Cisco Small Business Computer Consulting Firms Cisco Computer Consulting Firm Wisconsin, America

  • Computer Consultants Meraki Access Point Security
    Meraki MR52 Access Point Remote Technical Support

    Progent's Cisco-Meraki Wi-Fi access point consultants can help you to plan, configure, manage and debug Cisco's Meraki-based Wi-Fi networks for environments ranging from a branch office to a campus or a multi-site enterprise. Progent can also assist clients to integrate other Cisco devices for streamlined management.

  • Netwalker Ransomware Hot Line Detroit, MI Conti Ransomware Hot Line Detroit, MI
  • Online Help Offsite Workers Collaboration Software Telecommuter Collaboration Specialists
  • Philadelphia Philadelphia At Home Workers Support Consulting Services Offsite Workforce Philadelphia Consultants - Connectivity Guidance Philadelphia, PA, US
  • Remote Workers San Diego Consulting Services - Video Conferencing Systems Consulting and Support Services San Diego Remote Workforce Voice/Video Conferencing Systems Assistance San Diego
  • Santa Rosa Remote Workforce Collaboration Technology Assistance Santa Rosa California Cotati, Windsor CA Santa Rosa Teleworkers Collaboration Systems Assistance

  • Microsoft Certified Expert .NET IoT Programming Firm
    Microsoft Certified Expert Xamarin Designer

    Progent's application developers have worked for 20 years with .NET tools and the Visual Studio development environment and are able to build or enhance .NET applications rapidly and at low cost.

  • Security Organization Firewall Roseville-Granite Bay, CA Roseville-Rocklin, California Cybersecurity Tech Services Security
  • 24-7 Identity Authentication Online Troubleshooting
  • Slackware Linux, Sun Solaris, UNIX Support and Help CentOS Linux, Solaris, UNIX Computer Consulting Kansas City
  • Specialists for Network Service Companies near Eugene - Seamless Temporary Support Staff Expansion Eugene Oregon Consulting for IT Support Organizations near Eugene - Seamless Short-Term Staff Assistance Eugene, America
  • Technical Support Services Windows Server 2012R2 Hyper-V Support Windows Server 2012R2 Private Cloud
  • Top Teleworkers Guidance nearby Providence - Video Conferencing Technology Consulting and Support Services Providence Cranston Woonsocket Remote Workers Guidance near Providence - Video Conferencing Technology Consultants Providence
  • Virginia Beach Ransomware Attack Business Recovery Virginia Beach South Hampton Roads Virginia Beach Sodinokibi Ransomware Recovery Virginia Beach, Southside
  • Windows Server 2012 R2 Hyper-V Online Technical Support Windows Server 2012 R2 Server Manager Network Consulting

  • © 2002-2023 Progent Corporation. All rights reserved.