ProSight Duo Identity Verification
Progent's ProSight Duo catalog of services incorporates advanced access security technology from Duo, a Cisco Systems company, to deliver two-factor authentication solutions. Two-factor authentication (2FA) is one of the pillars of modern zero-trust network security design. 2FA utilizes out-of-band identity confirmation to provide an additional level of protection on top of just passwords. 2FA blocks the most common sources of cybersecurity breaches including phishing, brute-force password attacks, and credential theft.
Duo's single-tap Mobile Push application simplifies identity validation
Duo's Push App minimizes time and distraction by permitting users to confirm who they are just by pressing "Approve" on the validation box on their own iOS or Android smartphone or watch. This single-tap procedure eliminates the necessity to retrieve an email or text and copy a passcode by hand.
Progent's ProSight Duo family consists of three subscription-based services that build on one another. ProSight Duo MFA allows you to deploy Duo's two-factor authentication service to guard all users while offering essential policy controls, centralized management, and fast endpoint provisioning. ProSight Duo Access supports all the capabilities of ProSight Duo MFA and adds adaptive authentication controls and endpoint health monitoring. ProSight Duo Beyond adds the ability to identify company as distinct from personal endpoints, block untrusted devices, and give users safe and transparent access to inside apps. Progent is a Duo Managed Service Provider and can help your business to plan, implement and maintain an advanced ID authentication system that provides top-level security without disrupting your users.
Two-factor Authentication
The overwhelming majority of security breaches exploit compromised passwords. Every service plan in Progent's ProSight Duo catalog of access security solutions can reduce your risky dependence on passwords by allowing two-factor authentication. With 2FA implemented, when you log into a registered online account and enter your correct password you are asked to confirm your identity by means of a device that you have sole ownership of and that uses a separate ("out-of-band") network channel. A broad range of devices can be used as this second means of ID validation such as an iOS or Android smartphone or watch, a hardware token, a landline phone, etc. You can register multiple verification devices.
ProSight Duo two-factor authentication provides an additional level of security
After you confirm your identity using your validation device, you are allowed to run your application or utilize your VPN or remote desktop service. With the Duo Mobile app's push notification feature activated, you can simply press "Approve" on your supported smartphone or smart watch. This streamlines the sign-on experience by making the verification process nearly immediate. For other authentication devices, such as a token, you can copy a temporary passcode.
Products Offered with ProSight Duo Services
Progent's ProSight Duo line of subscription managed service plans consist of ProSight Duo MFA, ProSight Duo Access, and ProSight Duo Beyond. Progent's cybersecurity experts can assist your company to decide which plan for ProSight Duo is best suited for your environment.
ProSight Duo MFA Features:
- Two-factor authentication
- Duo Mobile to push one-touch identity verification for iOS or Android smartphones and watches
- ID verification through a Universal 2nd Factor USB device or biometrics
- Conventional two-factor authentication via a passcode on a token, mobile computer, or issued by an IT admin
- User self-enrollment and management
- Dashboard of all endpoints accessing protected applications
- Security policy enforcement based on network, group
- Cloud-based single sign-on for all apps via an MFA-protected dashboard
ProSight Duo Access Features:
- All the features of ProSight Duo
- Unified Endpoint Visibility shows every networked device, not simply managed endpoints
- Highlight and track unhealthy endpoints
- Duo Device Health application for notebooks and desktops
- Security health monitoring for mobile devices
- Security policy enforcement driven by geo-location
- Blocking options for anonymous communication networks like Tor
- Detection of high-risk or problem networks
- Health-based policy enforcement for notebooks, PCs and computers
- Prompt users at sigh-on to update their software and security configurations
ProSight Duo Beyond Features:
- All of the features of ProSight Duo Access
- Identification of corporate-owned vs. BYOD notebooks, PCs and mobile devices
- Detection of third-party agents such as AV operating on endpoints
- Protected access to on-prem websites/apps and SSH servers without needing VPN credential management
- Validation of both user and device trust
- Limit device access to applications determined by enrollment in endpoint management systems
- Limit mobile access to apps determined by membership in mobile device management systems
Read ProSight Duo Two-factor Authentication Services Datasheet
To download a datasheet describing the major capabilities of ProSight Duo Two-factor Authentication Service Plans, select:
ProSight Duo access security services datasheet. (PDF - 335 KB)
Download Importance of Using Advanced Password Management Technology White Paper
To view or download a white paper describing the reasons for deploying modern password management tools, click:
Reasons for Deploying Advanced Password Management Technology White Paper. (PDF - 2.3 MB)
How Progent Can Assist You to Create an 2FA Solution with ProSight Duo
Progent can assist your business to design, implement, manage and troubleshoot a two-factor ID verification system based on ProSight Duo managed services. Progent can also help you to integrate ProSight Duo 2FA services into a cohesive, company-wide cybersecurity strategy by providing expertise in all facets of advanced cybersecurity technology for any combination of cloud-based, on-premises, at-home, and mobile environments.
Progent's Cisco-certified CCIE network engineers can help you to configure and debug your Cisco ASA firewalls, Catalyst switches, VPN connections, and other infrastructure to work with Cisco Duo's identity authentication technology. Progent's authorized Azure integration experts, AWS support consultants and Google Cloud Platform consultants can assist you to add the protection of ProSight Duo two-factor authentication to your cloud-hosted applications. Progent's telecommuter solution specialists can help your business to set up protected and resilient remote access for your at-home workers.
Progent also offers rapid guidance from Exchange Online consultants, SQL Server experts, and Microsoft 365 integration consultants assist your business to plan and implement Duo secure access technology with your critical applications. Progent's CISSP-certified network security experts and CISM-certified IT security experts can help your business to evaluate and elevate your overall security profile. Progent can also provide ProSight Active Security Monitoring services for AI based endpoint protection powered by SentinelOne.
Other Managed Services Available from Progent
Besides ProSight Duo access security services, Progent offers other value-priced managed service packages that address key components of your information network such as security, backup/restore, and network infrastructure monitoring and management. By working with top-tier technology innovators, Progent can offer small and middle-size companies the advantages of the identical advanced technology utilized by worldwide enterprises. Popular managed service packages offered by Progent include:
- ProSight LAN Watch: Server and Desktop Monitoring
ProSight LAN Watch is Progent's server and desktop remote monitoring service that incorporates advanced remote monitoring and management technology to help keep your IT system running efficiently by tracking the health of critical assets that drive your business network. When ProSight LAN Watch uncovers an issue, an alarm is transmitted immediately to your specified IT management personnel and your Progent consultant so any looming issues can be addressed before they have a chance to impact your network. Learn more about ProSight LAN Watch server and desktop monitoring consulting.
- ProSight LAN Watch with NinjaOne RMM: Unified RMM for Networks, Servers, and Desktops
ProSight LAN Watch with NinjaOne RMM software offers a unified, cloud-based solution for managing your network, server, and desktop devices by offering an environment for performing common time-consuming tasks. These can include health checking, patch management, automated remediation, endpoint configuration, backup and restore, A/V defense, remote access, built-in and custom scripts, asset inventory, endpoint profile reports, and troubleshooting help. When ProSight LAN Watch with NinjaOne RMM uncovers a serious issue, it sends an alert to your specified IT personnel and your assigned Progent consultant so potential issues can be fixed before they impact productivity. Find out more details about ProSight LAN Watch with NinjaOne RMM server and desktop monitoring services.
- ProSight WAN Watch: Network Infrastructure Remote Monitoring and Management
Progent's ProSight WAN Watch is an infrastructure management service that makes it simple and inexpensive for small and mid-sized businesses to map, monitor, enhance and debug their networking hardware such as routers and switches, firewalls, and load balancers as well as servers, client computers and other devices. Incorporating cutting-edge Remote Monitoring and Management technology, WAN Watch ensures that infrastructure topology diagrams are kept updated, captures and manages the configuration of virtually all devices connected to your network, tracks performance, and generates notices when potential issues are detected. By automating time-consuming network management activities, ProSight WAN Watch can cut hours off common chores such as making network diagrams, expanding your network, locating appliances that need critical updates, or isolating performance issues. Find out more details about ProSight WAN Watch infrastructure management services.
- ProSight Reporting: Real-time Reporting for Ticketing and Network Monitoring Platforms
ProSight Reporting is an expanding family of real-time and in-depth management reporting plug-ins created to work with the industry's leading ticketing and remote network monitoring platforms including ConnectWise Manage, ConnectWise Automate, Customer Thermometer, Auvik, and SentinelOne. ProSight Reporting incorporates Microsoft Graph and features color coding to highlight and contextualize key issues like inconsistent support follow-up or endpoints with missing patches. By exposing ticketing or network health concerns clearly and in near-real time, ProSight Reporting improves productivity, lowers management hassle, and saves money. For more information, see ProSight Reporting for ticketing and network monitoring platforms.
- ProSight Data Protection Services (DPS): Backup and Disaster Recovery Services
Progent has partnered with leading backup technology companies to create ProSight Data Protection Services, a selection of subscription-based offerings that provide backup-as-a-service. ProSight DPS products automate and monitor your data backup processes and enable non-disruptive backup and rapid recovery of critical files/folders, applications, images, plus virtual machines. ProSight DPS lets you avoid data loss caused by hardware failures, natural disasters, fire, cyber attacks like ransomware, user mistakes, malicious employees, or software bugs. Managed backup services available in the ProSight Data Protection Services product line include ProSight DPS Altaro VM Backup, ProSight 365 Total Backup (formerly Altaro 365 Backup), ProSight DPS ECHO Backup based on Barracuda purpose-built hardware, and ProSight DPS MSP360 Hybrid Backup. Your Progent consultant can help you to determine which of these fully managed backup services are best suited for your IT environment.
- ProSight Email Guard: Inbound and Outbound Spam Filtering and Data Leakage Protection
ProSight Email Guard is Progent's spam filtering and email encryption service that incorporates the infrastructure of leading information security vendors to deliver centralized control and comprehensive protection for your inbound and outbound email. The hybrid structure of Email Guard managed service combines cloud-based filtering with an on-premises gateway appliance to provide complete defense against spam, viruses, Denial of Service Attacks, Directory Harvest Attacks, and other email-borne threats. The cloud filter serves as a first line of defense and keeps the vast majority of threats from reaching your network firewall. This reduces your vulnerability to inbound attacks and conserves network bandwidth and storage. Email Guard's on-premises gateway device adds a further level of analysis for inbound email. For outbound email, the on-premises gateway offers AV and anti-spam protection, protection against data leaks, and email encryption. The on-premises security gateway can also assist Exchange Server to track and protect internal email traffic that stays inside your security perimeter. For more information, see Email Guard spam filtering and data leakage protection.
- Progent's Outsourced/Shared Help Desk: Support Desk Managed Services
Progent's Support Desk managed services enable your IT staff to offload Help Desk services to Progent or divide responsibilities for Service Desk support transparently between your internal network support group and Progent's nationwide roster of IT service technicians, engineers and subject matter experts. Progent's Co-managed Service Desk offers a smooth extension of your core network support team. User interaction with the Help Desk, provision of technical assistance, problem escalation, trouble ticket creation and updates, efficiency measurement, and maintenance of the service database are cohesive whether issues are resolved by your core network support resources, by Progent, or a mix of the two. Learn more about Progent's outsourced/shared Help Desk services.
- Active Defense Against Ransomware: AI-based Ransomware Identification and Cleanup
Progent's Active Defense Against Ransomware is an endpoint protection (EPP) managed service that utilizes next generation behavior analysis technology to defend endpoints and physical and virtual servers against modern malware assaults such as ransomware and email phishing, which easily evade traditional signature-matching AV products. Progent Active Security Monitoring services safeguard on-premises and cloud-based resources and provides a unified platform to automate the complete malware attack lifecycle including protection, identification, containment, remediation, and post-attack forensics. Key capabilities include one-click rollback with Windows Volume Shadow Copy Service and automatic system-wide immunization against newly discovered threats. Find out more about Progent's ransomware defense and recovery services.
- ProSight IT Asset Management: Network Documentation Management
Progent's ProSight IT Asset Management service is an IT infrastructure documentation management service that makes it easy to create, maintain, retrieve and safeguard information related to your network infrastructure, procedures, business apps, and services. You can instantly locate passwords or serial numbers and be warned automatically about impending expirations of SSL certificates or warranties. By cleaning up and managing your network documentation, you can eliminate as much as half of time wasted trying to find vital information about your IT network. ProSight IT Asset Management features a common location for holding and sharing all documents required for managing your business network such as standard operating procedures (SOPs) and How-To's. ProSight IT Asset Management also supports a high level of automation for collecting and associating IT data. Whether you're planning enhancements, performing maintenance, or responding to a crisis, ProSight IT Asset Management gets you the information you need when you need it. Learn more about Progent's ProSight IT Asset Management service.
- Progent's Patch Management: Patch Management Services
Progent's managed services for software and firmware patch management offer businesses of all sizes a flexible and affordable solution for assessing, validating, scheduling, implementing, and documenting updates to your dynamic information network. Besides maximizing the protection and functionality of your computer environment, Progent's patch management services allow your IT team to focus on more strategic initiatives and tasks that deliver maximum business value from your network. Learn more about Progent's patch management services.
- ProSight Virtual Hosting: Hosted Virtual Machines at Progent's World-class Data Center
With ProSight Virtual Hosting service, a small organization can have its critical servers and apps hosted in a secure Tier III data center on a high-performance virtual machine host configured and maintained by Progent's IT support professionals. Under the ProSight Virtual Hosting service model, the customer retains ownership of the data, the operating system platforms, and the applications. Because the system is virtualized, it can be moved easily to a different hosting solution without requiring a time-consuming and technically risky reinstallation procedure. With ProSight Virtual Hosting, you are not tied a single hosting provider. Learn more about ProSight Virtual Hosting services.
- ProSight Active Security Monitoring: Endpoint Protection and Ransomware Defense
ProSight Active Security Monitoring is an endpoint protection solution that incorporates SentinelOne's cutting edge behavior-based machine learning technology to defend physical and virtual endpoints against modern malware assaults like ransomware and file-less exploits, which routinely escape traditional signature-matching AV tools. ProSight ASM safeguards local and cloud-based resources and offers a single platform to automate the complete malware attack lifecycle including blocking, detection, containment, cleanup, and post-attack forensics. Key features include single-click rollback with Windows Volume Shadow Copy Service (VSS) and real-time network-wide immunization against newly discovered threats. Progent is a SentinelOne Partner, dealer, and integrator. Learn more about Progent's ProSight Active Security Monitoring (ASM) endpoint protection and ransomware recovery.
- ProSight Enhanced Security Protection (ESP): Endpoint Protection and Exchange Filtering
Progent's ProSight Enhanced Security Protection (ESP) services offer ultra-affordable in-depth protection for physical servers and virtual machines, workstations, mobile devices, and Exchange email. ProSight ESP utilizes adaptive security and advanced machine learning for continuously monitoring and reacting to cyber assaults from all vectors. ProSight ESP offers two-way firewall protection, intrusion alerts, device management, and web filtering through cutting-edge technologies incorporated within one agent managed from a single console. Progent's data protection and virtualization consultants can assist your business to plan and configure a ProSight ESP deployment that meets your organization's unique requirements and that allows you prove compliance with government and industry information security regulations. Progent will help you specify and implement policies that ProSight ESP will manage, and Progent will monitor your IT environment and react to alarms that call for immediate action. Progent can also assist you to install and verify a backup and disaster recovery system like ProSight Data Protection Services (DPS) so you can recover rapidly from a destructive cyber attack like ransomware. Learn more about Progent's ProSight Enhanced Security Protection (ESP) unified endpoint protection and Exchange email filtering.
Contact Progent for Cybersecurity Expertise
If you need expertise for multi-factor authentication or any other aspect of network security, call Progent at 800-993-9400 or visit Contact Progent.