ProSight Duo Multi-Factor Authentication
Duo Two-factor Authentication ExpertsProgent's ProSight Duo family of services incorporates advanced technology from Duo, a Cisco company, to deliver two-factor ID validation solutions. Two-factor authentication (2FA) is one of the foundations of zero-trust network security design. 2FA uses different-band identity verification to provide a second layer of protection beyond just passwords. This blocks the most common causes of security breaches such as phishing, brute-force password attacks, and credential theft.

Duo Two-factor Authentication Consultants

Duo's single-tap Mobile Push app simplifies authentication

Duo's Push App minimizes time and distraction by allowing users to confirm who they are simply by touching "Approve" on the authentication box on their personal iOS or Android smartphone or watch. This single-touch process eliminates the need to retrieve an email or text and copy a security code by hand.

Duo Managed Service PartnersProgent's ProSight Duo family consists of three subscription services that progressively add features. ProSight Duo MFA permits organizations to deploy Duo's two-factor authentication technology to protect all apps while offering basic access controls, centralized management, and rapid provisioning. ProSight Duo Access provides all the features of ProSight Duo MFA and adds adaptive ID validation controls and extensive endpoint health checking. ProSight Duo Beyond adds the ability to differentiate company as opposed to personal endpoints, block untrusted devices, and give users secure and seamless access to your inside applications. Progent is a Duo Managed Service Provider and can assist your organization to design, implement and maintain an advanced identity validation system that provides the highest level of access security without disrupting your users.

Two-factor Authentication
The vast majority of security breaches involve compromised passwords. Each service plan in Progent's ProSight Duo catalog of identity validation solutions can reduce your risky dependence on passwords by supporting two-factor authentication. With 2FA activated, when you log into a secured online account and enter your password you are requested to confirm your identity via a device which you have sole ownership of and that utilizes a different ("out-of-band") channel. A wide range of devices can be utilized as this additional means of ID validation including an iOS or Android smartphone or watch, a token, a landline phone, etc. You can enroll multiple verification devices.

Cisco Duo 2FA Experts

ProSight Duo two-factor authentication adds an extra layer of security

Once you confirm who you are using your out-of-band device, you are allowed to run your app or access your VPN or remote desktop service. With the Duo Mobile app's push notification service activated, you can simply press "Approve" on your iOS or Android phone or watch. This improves the login experience by making the verification process virtually instantaneous. For traditional secondary devices, such as a token, you can copy a short-term password.

Plans Offered with ProSight Duo Managed Services
Progent's ProSight Duo line of subscription-based service offerings include ProSight Duo MFA, ProSight Duo Access, and ProSight Duo Beyond. Progent's cybersecurity experts can help your company to decide which version of ProSight Duo makes the most sense for your environment.

ProSight Duo MFA Features:

  • 2FA authentication
  • Duo Mobile to push single-touch authentication for iOS or Android smartphones and watches
  • Authentication via a Universal 2nd Factor USB device or biometrics
  • Conventional two-factor authentication via a passcode on a token, mobile device, or issued by an IT administrator
  • User self-enrollment and management
  • Dashboard of all endpoints accessing protected apps
  • Access policy enforcement driven by application, group
  • Cloud-based SSO for all apps through an MFA-protected dashboard
ProSight Duo Access Features:
  • All of the capabilities of ProSight Duo
  • Unified Endpoint Visibility shows each networked device, not simply managed devices
  • Flag and track high-risk endpoints
  • Duo Device Health apps for laptops and desktops
  • Security health monitoring for mobile endpoints
  • Access policy enforcement driven by geo-location
  • Blocking capability for anonymous networks such as Tor
  • Detection of high-risk or unhealthy networks
  • Health-based policy enforcement for notebooks, desktops and endpoints
  • Advise users during sigh-on to update their software and security settings
ProSight Duo Beyond Features:
  • All the capabilities of ProSight Duo Access
  • Detection of company-owned as opposed to BYOD notebooks, PCs and mobile devices
  • Identification of 3rd-party software agents like anti-virus operating on devices
  • Secure access to on-prem websites/apps and SSH (Secure Shell) servers without requiring VPN credential management
  • Validation of both user and device trust
  • Limit device access to apps based on membership in endpoint management systems
  • Limit mobile access to apps based on membership in mobile device management systems (MDMs)
Download ProSight Duo Access Security Services Datasheet
For a datasheet describing the key capabilities and benefits of ProSight Duo Two-factor Authentication Services, select:
ProSight Duo access security services datasheet. (PDF - 335 KB)

Download Importance of Using Modern Password Management Tools White Paper
To read or download a white paper about the reasons for utilizing modern password management technology, click:
Reasons for Using Advanced Password Management Tools White Paper. (PDF - 2.3 MB)

How Progent Can Assist You to Create an MFA Solution with ProSight Duo
Progent can help you to plan, implement, manage and troubleshoot a two-factor authentication system based on ProSight Duo managed services. Progent can also help your business to integrate ProSight Duo 2FA services into a unified, company-wide security strategy by providing expert support for all aspects of advanced security technology for any mix of cloud-based, on-premises, work-from-home, and mobile environments.

Progent's Cisco CCIE network experts can help you to set up and debug your Cisco Firepower firewalls, switches, VPN connections, and other network infrastructure to work with Cisco Duo's identity authentication technology. Progent's authorized Azure experts, AWS support experts and Google Cloud Platform consultants can help your organization to bring the protection of ProSight Duo 2FA services to your cloud-hosted apps. Progent's telecommuter integration experts can help your organization to set up protected and reliable remote connectivity for your teleworkers.

Progent also offers fast guidance from Exchange Online consultants, SQL Server consultants, and Microsoft 365 integration consultants help your company to prepare and implement Duo secure access technology with your critical workloads. Progent's CISSP-certified cybersecurity consultants and CISM-certified network security specialists can help you to review and elevate your corporate-wide cybersecurity posture. Progent also offers ProSight Active Security Monitoring services for AI based endpoint protection powered by SentinelOne.

Additional Managed Services Offered by Progent
In addition to ProSight Duo identity authentication services, Progent can provide other low-cost managed service packages that address vital aspects of your information network like security, backup/recovery, and network infrastructure monitoring and management. By working with leading technology providers, Progent can offer small and middle-size companies the advantages of the identical advanced technology utilized by global enterprises. Popular managed service plans offered by Progent include:

  • ProSight Active Security Monitoring: Endpoint Protection and Ransomware Defense
    ProSight Active Security Monitoring (ASM) is an endpoint protection solution that incorporates SentinelOne's next generation behavior machine learning technology to guard physical and virtual endpoints against modern malware assaults such as ransomware and file-less exploits, which easily evade legacy signature-matching anti-virus tools. ProSight ASM safeguards local and cloud-based resources and provides a single platform to automate the entire threat progression including protection, detection, mitigation, remediation, and forensics. Top features include one-click rollback with Windows VSS and automatic network-wide immunization against new attacks. Progent is a SentinelOne Partner, dealer, and integrator. Read more about Progent's ProSight Active Security Monitoring (ASM) next-generation endpoint protection and ransomware defense.

  • ProSight Enhanced Security Protection: Endpoint Security and Exchange Email Filtering
    Progent's ProSight Enhanced Security Protection managed services deliver ultra-affordable multi-layer protection for physical servers and VMs, desktops, mobile devices, and Microsoft Exchange. ProSight ESP utilizes adaptive security and advanced machine learning for round-the-clock monitoring and responding to security threats from all vectors. ProSight ESP provides firewall protection, intrusion alarms, device management, and web filtering through cutting-edge technologies incorporated within a single agent accessible from a unified console. Progent's data protection and virtualization consultants can help your business to plan and configure a ProSight ESP environment that meets your organization's unique requirements and that allows you prove compliance with legal and industry information security regulations. Progent will help you specify and configure security policies that ProSight ESP will manage, and Progent will monitor your IT environment and respond to alerts that require immediate attention. Progent's consultants can also assist your company to set up and test a backup and disaster recovery system like ProSight Data Protection Services (DPS) so you can recover quickly from a destructive security attack such as ransomware. Read more about Progent's ProSight Enhanced Security Protection unified physical and virtual endpoint security and Exchange filtering.

  • ProSight Data Protection Services: Managed Backup and Disaster Recovery Services
    Progent has partnered with leading backup/restore technology providers to create ProSight Data Protection Services, a portfolio of management offerings that provide backup-as-a-service. ProSight DPS services automate and track your data backup operations and enable transparent backup and rapid restoration of vital files/folders, applications, system images, and virtual machines. ProSight DPS helps your business recover from data loss caused by hardware breakdown, natural calamities, fire, malware such as ransomware, user mistakes, malicious employees, or application glitches. Managed backup services available in the ProSight Data Protection Services product line include ProSight DPS Altaro VM Backup, ProSight 365 Total Backup (formerly Altaro 365 Backup), ProSight DPS ECHO Backup based on Barracuda dedicated hardware, and ProSight DPS MSP360 Cloud and On-prem Backup. Your Progent consultant can assist you to identify which of these fully managed services are most appropriate for your network.

  • ProSight WAN Watch: Infrastructure Remote Monitoring and Management
    Progent's ProSight WAN Watch is a network infrastructure management service that makes it simple and inexpensive for smaller businesses to diagram, monitor, reconfigure and troubleshoot their networking hardware like routers, firewalls, and access points plus servers, printers, endpoints and other devices. Using cutting-edge RMM technology, ProSight WAN Watch ensures that infrastructure topology maps are kept current, captures and displays the configuration of almost all devices connected to your network, tracks performance, and sends alerts when issues are discovered. By automating time-consuming management activities, ProSight WAN Watch can knock hours off ordinary tasks like network mapping, expanding your network, finding appliances that require critical software patches, or identifying the cause of performance bottlenecks. Find out more about ProSight WAN Watch network infrastructure management services.

  • ProSight LAN Watch: Server and Desktop Monitoring and Management
    ProSight LAN Watch is Progent's server and desktop remote monitoring managed service that uses state-of-the-art remote monitoring and management (RMM) technology to keep your IT system operating efficiently by tracking the health of critical assets that power your business network. When ProSight LAN Watch uncovers a problem, an alert is sent automatically to your specified IT personnel and your Progent consultant so all potential issues can be resolved before they have a chance to impact your network. Learn more about ProSight LAN Watch server and desktop monitoring services.

  • ProSight IT Asset Management: Network Documentation Management
    Progent's ProSight IT Asset Management service is a cloud-based IT documentation management service that makes it easy to capture, maintain, retrieve and safeguard data about your IT infrastructure, processes, business apps, and services. You can quickly find passwords or serial numbers and be warned automatically about upcoming expirations of SSL certificates or domains. By cleaning up and managing your IT infrastructure documentation, you can save up to 50% of time thrown away searching for vital information about your IT network. ProSight IT Asset Management includes a common location for holding and collaborating on all documents related to managing your network infrastructure such as standard operating procedures and self-service instructions. ProSight IT Asset Management also offers advanced automation for gathering and relating IT information. Whether you're planning improvements, performing maintenance, or reacting to an emergency, ProSight IT Asset Management gets you the information you need as soon as you need it. Learn more about Progent's ProSight IT Asset Management service.

  • Active Protection Against Ransomware: Machine Learning-based Ransomware Detection and Remediation
    Progent's Active Protection Against Ransomware is an endpoint protection service that incorporates next generation behavior machine learning tools to guard endpoint devices and physical and virtual servers against modern malware attacks such as ransomware and file-less exploits, which easily evade legacy signature-based AV tools. Progent ASM services safeguard on-premises and cloud-based resources and offers a single platform to automate the complete malware attack lifecycle including protection, detection, containment, remediation, and post-attack forensics. Top features include one-click rollback with Windows Volume Shadow Copy Service (VSS) and automatic network-wide immunization against newly discovered attacks. Find out more about Progent's ransomware protection and recovery services.

  • Outsourced/Co-managed Service Center: Support Desk Managed Services
    Progent's Support Desk services permit your information technology team to offload Call Center services to Progent or split responsibilities for support services seamlessly between your internal network support resources and Progent's nationwide roster of IT service technicians, engineers and subject matter experts (SMEs). Progent's Co-managed Service Desk provides a transparent extension of your core network support staff. User access to the Help Desk, provision of support services, issue escalation, ticket generation and tracking, performance metrics, and maintenance of the support database are cohesive whether issues are taken care of by your corporate IT support staff, by Progent's team, or by a combination. Find out more about Progent's outsourced/co-managed Service Desk services.

  • Patch Management: Patch Management Services
    Progent's support services for patch management provide organizations of any size a versatile and affordable alternative for assessing, testing, scheduling, implementing, and tracking software and firmware updates to your dynamic information network. Besides maximizing the protection and reliability of your computer network, Progent's software/firmware update management services free up time for your IT team to focus on line-of-business projects and activities that deliver the highest business value from your network. Learn more about Progent's software/firmware update management support services.
Contact Progent for Cybersecurity Solutions
If you need expertise for multi-factor authentication or any other facet of cybersecurity, contact Progent at 800-993-9400 or visit Contact Progent.



An index of content::

  • 24-7 Fremont Work at Home Employees Collaboration Technology Expertise Fremont Alameda County Remote Workforce Fremont Consulting Services - Collaboration Solutions Guidance Fremont Alameda County
  • 24-Hour Computer Consulting Company Cisco Hawaii - Honolulu, Oahu, Maui, Kauai, HI Cisco Network Consultation Hawaii
  • BlackBerry Smartphone Remote Support Ribeirao Preto BlackBerry Professional Software Migrations
  • Broomfield Short Term IT Staffing Support Services Broomfield-Thornton Top Short Term IT Staffing for IT Service Groups
  • Cisco Information Technology Consulting Firms New York City, Buffalo, Rochester, Syracuse, Yonkers, Albany New York Cisco Network Integration

  • Help and Support Cisco Firepower Configuration
    Cisco Firepower AVC Online Help

    The latest generation of Cisco ASA 5500-X Family of firewalls with Firepower Services offer significantly more performance than Cisco's previous PIX and ASA 5500 firewalls and have superseded the ASA 5500 and PIX 500 security appliances for all new installations. Progent's Cisco-certified CCIE network experts can assist your company to maintain your legacy PIX or ASA 5500 firewalls or migrate efficiently to ASA 5500-X firewalls with Firepower Services. Progent can also help your business to design, deploy, tune, manage and troubleshoot firewall solutions built around ASA 5500-X firewalls with Firepower Services.

  • Dayton, OH Top Quality Microsoft Exchange Server 2013 Data Recovery Exchange 2019 Small Office Network Consulting Dayton Ohio

  • SharePoint Server and Mac Technical Support
    Microsoft VBA for Mac Network Engineer

    Microsoft Mac Office allows Mac users to run the industry's most familiar business applications. Progent's Apple-certified Macintosh consultants can show you how to configure Microsoft Office for Macintosh on a multi-vendor network that incorporates Apple OS X and Windows-powered platforms so that Mac users can access the latest capabilities of Word, Excel, PowerPoint and Entourage for Mac in order to share data and network resources with co-workers who use Microsoft Windows. Progent's consultants have expertise with both Apple Macintosh and Windows technology and can support networks that mix Mac with Windows systems with complete resource sharing, or environments which carefully limit collaboration between Mac and Windows users.

  • Fairfield County Connecticut Stamford Work at Home Employees Cloud Technology Consulting Services Stamford Norwalk Shelton Stamford At Home Workers Cloud Integration Solutions Consulting
  • Greensboro Winston-Salem High Point, United States Winston-Salem Dynamics GP Customization Consultant MS Dynamics GP Winston-Salem Premier Partner - SQL Server Development Winston-Salem Piedmont Triad, United States
  • Lakeland-Plant City IT Outsourcing Firms Information Technology Consulting Group Lakeland, FL
  • Network Consultants Duo Zero Trust Security
  • Microsoft SharePoint 2010 Help and Support Lower Manhattan, Financial District, NYC Top Ranked Microsoft SharePoint Remote Support Services West Village, New York, NYC
  • Morgan Hill Offsite Workforce Conferencing Systems Guidance Morgan Hill, CA Teleworkers Morgan Hill Consulting Experts - Conferencing Solutions Consulting Morgan Hill California

  • Open Now Windows Server 2022 Kubernetes Containers Online Support Services
    Windows Server 2022 PowerShell Network Consultant

    Progent's Microsoft Gold-certified Windows Server 2022 consultants can assist your company to design and implement a cost-effective upgrade to Windows Server 2022 using an on-premises deployment architecture or a hybrid model that combines cloud-based Windows Server on Azure with a datacenter-based implementation of Windows Server 2022.

  • Network Security Auditor Firewall Fargo-Williston, North Dakota Security Security Organizations Fargo-Bismarck, ND
  • Online Consulting Microsoft SharePoint Server 2007 Schaumburg Schaumburg-Deerfield SharePoint Server 2013 Integration Services
  • Palm Bay Melbourne Titusville Microsoft Exchange Migration Companies Palm Bay, Brevard County Remote Help Desk Repairing
  • Recife Work at Home Employees Backup/Restore Solutions Consulting Services Recife, Pernambuco Recife, PE Recife At Home Workers Backup Solutions Consulting and Support Services

  • MSP360 VM Backup Specialists
    MSP360 GSuite Backup Consultant Services

    Progent's data protection experts can assist you to create, deploy and troubleshoot a backup plan built around MSP360 technology. MSP360 enables file or image-based backup/restore for virtual machines and physical computers, works with all leading public clouds, and permits businesses to create a data protection ecosystem with a low Recovery Time Objective and a defined RPO. With ProSight DPS 360 Backup, Progent offers end-to-end monitoring and management of your backup system to prevent data loss resulting from user mistakes, system glitches, malicious insiders, and external assaults like ransomware. To learn more, go to ProSight Data Protection Services 360 Backup solutions.

  • Remote Support Altaro VM Backup Testing Integration Hornetsecurity Altaro VM Backup
  • Remote Workforce Consulting Experts in San Bernardino - Endpoint Security Systems Consulting San Bernardino San Bernardino County Work at Home Employees Expertise near San Bernardino - Security Systems Consulting
  • Duo Multi-factor Authentication Remote Troubleshooting
  • Remote Workforce Consulting Services nearby Irving - VoIP Systems Expertise Irving Telecommuters Consulting Services near Irving - IP Voice Systems Expertise Irving Texas
  • San Antonio Dharma Crypto-Ransomware Assessment and Remediation San Antonio Airport SAT San Antonio Ryuk Crypto-Ransomware Repair San Antonio, TX

  • SCCM Planning Support Outsourcing
    SCCM and Windows 10 Information Technology Consulting

    System Center Configuration Manager automates application and device provisioning across multiple sites, simplifies compliance settings management, keeps track of network resources, protects against company data leakage, provides network health reporting, enables secure end-user self service, and offers a single control mechanism for managing mixed-operating system networks running on-premises, cloud-centric, or hybrid deployment architectures. Progent's Microsoft-certified Configuration Manager consulting team and Microsoft Azure cloud integration experts can help you with any facet of planning, implementing, using and troubleshooting a System Center Configuration Manager deployment for on-premises, cloud-based, or hybrid networks.

  • Duo MFA and Single Sign-on Remote Technical Support
  • San Bernardino County Remote Workforce San Bernardino Consulting and Support Services - IP Voice Systems Consulting Services San Bernardino At Home Workers VoIP Systems Expertise San Bernardino Redlands
  • Sandy Springs-Norcross Network Integration Urgent Sandy Springs, GA Small Office Computer Consultant
  • Security Organization Security Valencia-Sylmar, CA Valencia-Santa Clarita, California Security Audits CISSP
  • Security Penetration Testing Security Firms Penetration Testing Security Contractors
  • Server Consultant Cisco Cisco Online Help
  • Specialist Microsoft SharePoint Server 2007 Harrisburg SharePoint Server 2013 Remote Troubleshooting Harrisburg, Pennsylvania, US

  • 24/7 Engineers ransomware preparedness
    ransomware vulnerability review Consultancy

    The ProSight Ransomware Preparedness Report service is an affordable service built around a phone interview with a Progent backup/recovery consultant. The interview is designed to assess your company's preparedness to defend against ransomware or recover rapidly from a ransomware incident. Progent will consult with you directly to collect information concerning your existing antivirus tools and backup/recovery procedures, and Progent will then produce a custom Basic Security and Best Practices Report document describing how you can follow best practices to build an efficient AV and backup/recovery environment that reduces your vulnerability to a ransomware attack and meets your company's needs.

  • Telecommuters Arlington Guidance - Network Security Solutions Guidance Arlington Texas Remote Workers Arlington Assistance - Cybersecurity Systems Guidance Arlington, Dallas, Fort Worth
  • Temporary Staffing Help Consultants Tukwila-Federal Way Tukwila IT Staffing Support Services Tukwila-Kent, Washington
  • MFA and Single Sign-on (SSO) Technical Support Services
  • Tlaquepaque, Jal. At Home Workforce Guadalajara Consultants - Management Solutions Assistance Work at Home Employees Consulting Experts near me in Guadalajara - Management Tools Consulting Experts Guadalajara

  • MSP360 Backup Outsourcing
    MSP360 VM Backup Professionals

    Progent's data protection experts can assist you to create, deploy and debug a backup plan built around MSP360 software. MSP360 offers file or image-based backup/restore for VMs and physical computers, works with all leading public clouds, and allows you to create a data protection ecosystem with a low RTO and a defined Recovery Point Objective (RPO). With ProSight DPS 360 Backup, Progent can provide end-to-end monitoring and remote management of your backup environment to prevent data loss resulting from human mistakes, system errors, ill-intentioned users, and malware assaults such as ransomware.

  • Duo Two-factor Authentication IT Services
  • Toronto Netwalker Ransomware Repair Toronto Toronto Maze Ransomware Remediation Toronto
  • Toronto-Mississauga Intrusion Detection Check Point Firewall Configure Security Protection Toronto

  • Outsourcing Chief Information Officer
    Best Cisco Certified CIO Online Consulting

    Progent can provide small businesses with an information management expert who can act as a part-time Chief Information Officer. This part-time CIO can provide long-term direction to help you deploy sensible technology to enhance business operations so they align better with your corporate objectives. Your company can create and install a well thought out information technology plan without absorbing the expense of a full-time senior IT executive.

  • Train Mac OS X 24-Hour Office Excel for Mac Education
  • Urgent Chesapeake Work from Home Employees Help Desk Call Center Outsourcing Guidance At Home Workforce Chesapeake Consulting Experts - Help Desk Outsourcing Consulting Services South Hampton Roads
  • MFA and Single Sign-on (SSO) Support and Integration
  • West Yorkshire, U.K. Offsite Workforce Leeds Assistance - Collaboration Technology Consulting Experts Leeds Remote Workforce Collaboration Systems Consultants Leeds
  • Windows Small Business Network Consulting Services Jackson, MS, Gulfport, MS, Biloxi, MS, Hattiesburg, MS Jackson, Gulfport, Biloxi, MS Windows Software Recovery
  • Winston-Salem North Carolina, United States Work at Home Employees Assistance near me in Winston-Salem - Cloud Integration Technology Assistance Greensboro Winston-Salem High Point Remote Workers Consulting near Winston-Salem - Cloud Integration Solutions Consulting Experts
  • Work from Home Employees Consulting Experts near Chesapeake - Integration Consulting Services Chesapeake, VA Chesapeake Teleworkers Setup Guidance Chesapeake
  • Work from Home Employees Consulting Services in Sioux Falls - VoIP Technology Consulting Experts Sioux Falls, SD, America Largest Sioux Falls Offsite Workforce VoIP Technology Consulting and Support Services Minnehaha County South Dakota

  • Conti ransomware recovery Professionals
    Ryuk ransomware cleanup Consult

    Progent's seasoned ransomware recovery experts can help your business to restore a network victimized by a ransomware crypto-worm such as Ryuk, Maze, Sodinokibi, Netwalker, Snatch or Egregor.


    © 2002-2024 Progent Corporation. All rights reserved.