ProSight Duo Identity Verification
Duo MFA ConsultantsProgent's ProSight Duo suite of managed services integrates advanced access security technology from Duo, a Cisco Systems company, to deliver two-factor authentication solutions. Two-factor authentication (2FA) is one of the pillars of modern zero-trust network security design. 2FA utilizes separate channel ID confirmation to provide a second layer of protection beyond traditional passwords. This guards against the most common causes of security breaches like phishing, social engineering, and credential theft.

Duo Multi Identity Validation Consultants

Duo's single-tap Mobile Push application simplifies authentication

Duo's push technology saves time and distraction by permitting users to confirm their identity just by touching "Approve" on the validation box on their own iOS or Android smartphone or wearable. This single-tap process eliminates the need to open an email or text and copy a passcode by hand.

Duo Managed Service PartnersProgent's ProSight Duo family consists of three subscription services that progressively add features. ProSight Duo MFA allows organizations to deploy Duo's two-factor authentication platform to guard all users while providing essential policy tools, centralized management, and rapid provisioning. ProSight Duo Access includes all the capabilities of ProSight Duo MFA plus adaptive ID validation policies and extensive endpoint health monitoring. ProSight Duo Beyond brings the ability to identify corporate as opposed to personal endpoints, deny access to untrusted endpoints, and give users safe and transparent access to your inside applications. Progent is a Duo Managed Service Provider and can help your company to design, deploy and maintain an advanced identity validation system that provides the highest level of security without disrupting your users.

Two-factor Authentication
Most security breaches involve compromised passwords. Each service offering in Progent's ProSight Duo family of identity validation products can eliminate your risky dependence on passwords by allowing two-factor authentication. With 2FA implemented, when you log into a protected online application and provide your correct password you are asked to verify your identity via a device that you have exclusive ownership of and that runs on a separate ("out-of-band") channel. A wide selection of devices can be utilized as your second means of authentication including a smartphone or wearable, a token, a landline phone, etc. You can enroll multiple authentication devices.

Duo Two-factor Authentication Experts

ProSight Duo 2FA provides an extra level of security

After you confirm who you are using your out-of-band device, you are allowed to use your app or utilize your VPN or remote desktop service. With the Duo Mobile app's push notification service activated, you can simply touch "Approve" on your supported smartphone or smart watch. This improves the sign-on experience by making the verification procedure nearly instantaneous. For other authentication devices, such as a hardware token, you can transcribe a temporary passcode.

Plans Offered with ProSight Duo Services
Progent's ProSight Duo family of subscription-based service offerings consist of ProSight Duo MFA, ProSight Duo Access, and ProSight Duo Beyond. Progent's security consultants can assist your company to determine which version of ProSight Duo is best suited for your environment.

ProSight Duo MFA Features:

  • Two-factor authentication
  • Duo Mobile to push single-touch ID validation for smartphones and watches
  • Authentication via a Universal 2nd Factor USB device or biometrics
  • Traditional 2FA via a passcode displayed on a token, mobile computer, or issued by a network admin
  • Self-enrollment and management
  • Dashboard of all managed devices accessing secured applications
  • Policy enforcement based on network, user group
  • Cloud-based SSO for all applications via an MFA-secured dashboard
ProSight Duo Access Features:
  • All of the capabilities of ProSight Duo
  • Unified Endpoint Visibility displays every networked device, not simply managed endpoints
  • Flag and track unhealthy endpoints
  • Duo Device Health application for notebooks and PCs
  • Cybersecurity health visibility for mobile devices
  • Access policy enforcement based on geo-location
  • Blocking capability for anonymous communication networks such as The Onion Router (Tor)
  • Detection of high-risk or problem networks
  • Health-based policy enforcement for laptops, desktops and devices
  • Advise users at login to bring up to date their software and cybersecurity settings
ProSight Duo Beyond Features:
  • All the capabilities included with ProSight Duo Access
  • Detection of company-owned as opposed to personally owned notebooks, desktops and mobile devices
  • Identification of 3rd-party agents like AV operating on endpoints
  • Secure access to on-premises websites/applications and SSH servers without requiring VPN credential management
  • Confirmation of both user and device trust
  • Limit device access to applications determined by enrollment in endpoint management systems
  • Limit mobile access to apps determined by enrollment in mobile device management systems
Read ProSight Duo Access Security Services Datasheet
To download a datasheet describing the key features of ProSight Duo Access Security Services, select:
ProSight Duo access security services datasheet. (PDF - 335 KB)

Download Importance of Deploying Modern Password Management Tools White Paper
To read or download a white paper describing the reasons for deploying up-to-date password management tools, click:
Reasons for Deploying Advanced Password Management Tools White Paper. (PDF - 2.3 MB)

How Progent Can Help You to Build an 2FA Solution with ProSight Duo
Progent can help your organization to plan, deploy, manage and debug a two-factor ID verification solution based on ProSight Duo technology. Progent can also help your organization to incorporate ProSight Duo 2FA services into a cohesive, end-to-end security strategy by providing expert support for all facets of modern cybersecurity technology for any mix of cloud, on-premises, at-home, and mobile resources and users.

Progent's Cisco-certified CCIE network engineers can assist you to set up and troubleshoot your Cisco ASA firewalls, Catalyst switches, VPN devices, and other infrastructure to support Cisco Duo's identity authentication services. Progent's authorized Azure integration experts, AWS support experts and Google Cloud Platform consultants can help your organization to add the protection of ProSight Duo 2FA services to your cloud-hosted apps. Progent's work-from-home solution specialists can help you to plan and configure protected and resilient remote access for your at-home workers.

Progent can also provide rapid access to Microsoft 365 Exchange experts, SQL Server consultants, and Microsoft 365 consultants assist your business to prepare and deploy Duo secure access technology with your key workloads. Progent's CISSP-certified cybersecurity experts and CISM-certified IT security experts can help your organization to assess and strengthen your corporate-wide security profile. Progent also offers ProSight Active Security Monitoring (ASM) managed services for machine-learning based endpoint protection powered by SentinelOne.

Other Managed Services Offered by Progent
Besides ProSight Duo 2FA services, Progent offers other value-priced managed service plans that cover vital components of your information system like security, backup/recovery, and infrastructure management. By partnering with leading technology providers, Progent can provide small and mid-size companies the advantages of the identical cutting-edge tools and services used by the world's largest enterprises. Managed service plans available from Progent include:

  • ProSight Active Security Monitoring: Endpoint Protection and Ransomware Defense
    ProSight Active Security Monitoring (ASM) is an endpoint protection service that incorporates SentinelOne's cutting edge behavior analysis technology to guard physical and virtual endpoints against new malware assaults like ransomware and email phishing, which routinely get by legacy signature-matching AV products. ProSight ASM safeguards on-premises and cloud resources and offers a single platform to address the entire malware attack lifecycle including blocking, identification, containment, cleanup, and forensics. Top features include single-click rollback using Windows Volume Shadow Copy Service (VSS) and automatic system-wide immunization against new threats. Progent is a SentinelOne Partner, reseller, and integrator. Read more about Progent's ProSight Active Security Monitoring (ASM) endpoint protection and ransomware defense.

  • ProSight Enhanced Security Protection: Physical and Virtual Endpoint Security and Microsoft Exchange Filtering
    ProSight Enhanced Security Protection (ESP) services deliver economical multi-layer protection for physical servers and VMs, desktops, mobile devices, and Exchange Server. ProSight ESP uses contextual security and modern behavior analysis for round-the-clock monitoring and responding to cyber assaults from all attack vectors. ProSight ESP offers two-way firewall protection, penetration alarms, endpoint management, and web filtering through leading-edge technologies incorporated within one agent accessible from a unified control. Progent's data protection and virtualization consultants can help you to plan and configure a ProSight ESP deployment that addresses your organization's specific requirements and that helps you demonstrate compliance with government and industry data security standards. Progent will assist you define and configure security policies that ProSight ESP will enforce, and Progent will monitor your IT environment and react to alarms that require urgent action. Progent's consultants can also help your company to set up and test a backup and disaster recovery solution like ProSight Data Protection Services so you can get back in business quickly from a destructive cyber attack such as ransomware. Learn more about Progent's ProSight Enhanced Security Protection unified endpoint security and Microsoft Exchange email filtering.

  • ProSight Data Protection Services (DPS): Managed Backup and Recovery Services
    Progent has worked with leading backup/restore software companies to create ProSight Data Protection Services, a selection of offerings that deliver backup-as-a-service (BaaS). ProSight DPS services manage and monitor your backup processes and enable non-disruptive backup and fast recovery of vital files, applications, system images, and Hyper-V and VMware virtual machines. ProSight DPS lets your business avoid data loss caused by equipment breakdown, natural disasters, fire, malware such as ransomware, human mistakes, malicious insiders, or application glitches. Managed backup services in the ProSight Data Protection Services product family include ProSight DPS Altaro VM Backup, ProSight 365 Total Backup (formerly Altaro 365 Backup), ProSight ECHO Backup using Barracuda purpose-built hardware, and ProSight DPS MSP360 Cloud and On-prem Backup. Your Progent consultant can assist you to determine which of these managed backup services are best suited for your network.

  • ProSight WAN Watch: Infrastructure Management
    ProSight WAN Watch is a network infrastructure monitoring and management service that makes it easy and inexpensive for smaller businesses to diagram, monitor, enhance and troubleshoot their connectivity hardware like routers and switches, firewalls, and load balancers as well as servers, printers, client computers and other devices. Incorporating cutting-edge Remote Monitoring and Management technology, ProSight WAN Watch ensures that infrastructure topology maps are always updated, copies and displays the configuration of almost all devices on your network, tracks performance, and generates alerts when problems are discovered. By automating tedious management and troubleshooting processes, WAN Watch can cut hours off common chores like network mapping, expanding your network, locating appliances that require important software patches, or identifying the cause of performance issues. Learn more details about ProSight WAN Watch network infrastructure management consulting.

  • ProSight LAN Watch: Server and Desktop Monitoring
    ProSight LAN Watch is Progent's server and desktop remote monitoring service that uses state-of-the-art remote monitoring and management (RMM) technology to help keep your network running at peak levels by tracking the health of vital computers that power your information system. When ProSight LAN Watch uncovers an issue, an alarm is sent immediately to your specified IT personnel and your Progent consultant so that any looming issues can be resolved before they have a chance to disrupt productivity. Find out more about ProSight LAN Watch server and desktop monitoring consulting.

  • ProSight IT Asset Management: Network Documentation Management
    ProSight IT Asset Management service is an IT infrastructure documentation management service that allows you to create, update, find and protect data related to your network infrastructure, processes, business apps, and services. You can quickly locate passwords or serial numbers and be alerted automatically about upcoming expirations of SSL certificates or domains. By cleaning up and managing your IT documentation, you can eliminate up to 50% of time thrown away looking for vital information about your IT network. ProSight IT Asset Management includes a common location for holding and collaborating on all documents related to managing your network infrastructure like standard operating procedures (SOPs) and How-To's. ProSight IT Asset Management also supports advanced automation for gathering and associating IT data. Whether you're making improvements, doing regular maintenance, or responding to an emergency, ProSight IT Asset Management delivers the information you need as soon as you need it. Read more about ProSight IT Asset Management service.

  • Active Protection Against Ransomware: Machine Learning-based Ransomware Detection and Remediation
    Progent's Active Protection Against Ransomware is an endpoint protection (EPP) solution that incorporates next generation behavior-based machine learning technology to defend endpoint devices as well as servers and VMs against new malware attacks such as ransomware and file-less exploits, which easily get by legacy signature-matching AV products. Progent Active Security Monitoring services safeguard local and cloud-based resources and offers a single platform to address the entire malware attack progression including filtering, infiltration detection, mitigation, remediation, and post-attack forensics. Key features include single-click rollback using Windows Volume Shadow Copy Service and real-time system-wide immunization against newly discovered threats. Read more about Progent's ransomware protection and recovery services.

  • Progent's Outsourced/Shared Call Desk: Help Desk Managed Services
    Progent's Help Center services permit your IT team to outsource Help Desk services to Progent or divide activity for support services seamlessly between your in-house support team and Progent's extensive roster of IT service engineers and subject matter experts (SMEs). Progent's Shared Service Desk offers a seamless extension of your internal network support team. Client interaction with the Help Desk, provision of support, escalation, ticket generation and tracking, performance metrics, and management of the support database are cohesive whether issues are resolved by your in-house network support resources, by Progent's team, or by a combination. Learn more about Progent's outsourced/co-managed Call Desk services.

  • Progent's Patch Management: Patch Management Services
    Progent's support services for patch management provide businesses of any size a flexible and affordable alternative for assessing, validating, scheduling, applying, and tracking software and firmware updates to your ever-evolving IT network. Besides optimizing the security and functionality of your computer network, Progent's patch management services allow your IT staff to focus on line-of-business initiatives and tasks that deliver the highest business value from your network. Learn more about Progent's software/firmware update management services.
Contact Progent for Network Security Expertise
If you need assistance with multi-factor authentication or any other aspect of cybersecurity, contact Progent at 800-993-9400 or visit Contact Progent.

An index of content::

  • 24 Hour Exchange 2000 Migration Consultant Largest Upgrade Consulting Exchange 2000
  • Addison At Home Workforce Cloud Integration Solutions Consulting Experts Addison-Lewisville, Texas Remote Workers Consulting and Support Services near Addison - Cloud Integration Systems Expertise Addison
  • Addison Cisco Design Consultant Computer Installation Cisco Addison-Farmers Branch, TX
  • Alabama Network Specialist Birmingham, Montgomery, Mobile, AL Security Consulting
  • At Home Workers Wilmington Assistance - Solutions Expertise 24x7x365 Telecommuters Consulting Experts - Wilmington - Connectivity Consulting Services Wilmington Delaware, United States
  • Austin 24/7 Crypto Repair Ransomware Repair Help Austin, TX
  • Bristol Locky Ransomware Recovery Bristol Bristol Crypto-Ransomware Blocking Bristol

  • 24-Hour System Center 2012 Virtual Machine Manager IT Consulting
    Professional SCVMM 2012 Virtual Switch

    Progent's Microsoft-certified consultants can assist organizations of all sizes to follow best practices to set up SCVMM 2012 hosts and host groups, networking, storage systems, and library resources; plan, deploy, and manage private clouds, virtual machines, and VMM services in SCVMM 2012; and integrate SCVMM with SCOM 2012 for comprehensive monitoring. Progent can help your business to migrate from a legacy version of SCVMM or from another management platform, and Progent can help you to optimize and repair your existing SCVMM environment so you get maximum return on investment.

  • Cisco Computer Consulting Firm Long Island City, Queens Cisco Guru Long Island City-Sunnyside
  • Cisco IT Outsourcing Group Manchester, Hillsborough County, New Hampshire, America Cisco Small Business IT Consultant New Hampshire
  • Cisco SIP Integration Outsourcing Cisco CUBE and SIP Support and Help
  • Dallas At Home Workforce Network Security Solutions Consulting Dallas Teleworkers Dallas Consulting Services - Cybersecurity Solutions Consultants Dallas, TX
  • Denver Snatch Ransomware Forensics Investigation Denver International Airport Denver Dharma Ransomware Forensics

  • Remote Workforce Data Protection Support and Integration
    Award Winning Specialists Teleworker Data Protection

    Progent can assist small and medium-size companies to design, install, verify and troubleshoot backup/recovery systems to support at-home workers.

  • Detroit Michigan, America 24-Hour SQL Server 2014 Information Technology Consulting Companies SQL Server 2012 Computer Network Support Company Wayne County Michigan, United States
  • Exchange 2010 Upgrade Engineer Exchange 2003 to Exchange 2010 Upgrade Professional
  • Grand Rapids, MI 24/7/365 Microsoft Exchange 2010 Consulting Company Computer Consultation Microsoft Exchange 2010
  • Harrisburg Telecommuters Video Conferencing Systems Assistance Harrisburg-Hazelton, PA 24x7x365 At Home Workforce Harrisburg Consulting - Conferencing Solutions Guidance

  • 2500 Wireless Controller Computer Consultant
    Wireless Consulting Services

    Progent's Cisco-certified wireless integration experts can assist you to deploy, administer, and debug Cisco wireless devices such as Cisco's Aironet and Meraki 802.11ac wireless access points (APs) plus Cisco's Wireless Network Controllers.

  • Multi-factor Authentication Online Consulting
  • Madison Crypto Removal Help Madison Wisconsin Ransomware Repair Consultants Madison Baraboo
  • Melbourne Telecommuters Melbourne Consulting Experts - Conferencing Technology Consulting Experts Melbourne Work from Home Employees Voice/Video Conferencing Solutions Assistance Melbourne, Victoria
  • Microsoft Exchange Server 2013 Small Business Computer Consultants Clearwater Florida Microsoft Exchange Server 2007 Upgrading Pinellas County Florida
  • Microsoft Windows Server 2019 Network Outsource Baton Rouge Louisiana Baton Rouge, United States Windows Server 2012 Consultant Services
  • Midtown Manhattan Work from Home Employees Setup Expertise New York City-Upper East Side Top Offsite Workforce Assistance nearby Midtown Manhattan - Setup Assistance New York City, NY, United States

  • CCIE Certified Cisco CUBE Integration Remote Consulting
    Urgent IP PBX Computer Consultant

    Progent's Cisco CCIE-certified SIP integration consultants can help you to design, deploy, maintain, debug and upgrade Cisco's SIP (Session Initiation Protocol) infrastructure technology and Cisco's CUBE-connected SIP trunks and can provide affordable remote or on-premises expertise to assist companies to move smoothly to a modern unified communications network that offers accelerated return on investment. Progent's certified Microsoft collaboration consultants can assist you to configure interfaces between Cisco's CUBE SBC and Microsoft's VoIP and IP video applications like Skype for Business or Lync for access to a SIP-based IP PSTN trunk.

  • Monterey, CA, U.S.A. Windows Server 2016 IT Consultants Microsoft Windows Server 2016 Computer Network Support Company Monterey, US
  • Monterrey Spora Crypto-Ransomware Negotiation Guidance Saltillo Top Quality Monterrey Ryuk Crypto-Ransomware Settlement Negotiation Consultants Monterrey
  • Oxford-Swindon Small Business IT Outsourcing Firms Oxford, England Technical Support Outsource
  • Remote Support Services Wireless Site Survey Wireless Site Survey Computer Engineer
  • Remote Workforce Consulting in Chatsworth - Call Desk Augmentation Guidance Chatsworth-Simi Valley, California Work at Home Employees Chatsworth Consulting and Support Services - Help Desk Solutions Assistance Chatsworth-Canoga Park, CA
  • Remote Workforce Honolulu Consultants - Connectivity Consulting Services Honolulu Hawaii Offsite Workforce Consulting Experts nearby Honolulu - Integration Solutions Assistance
  • Remote Workforce Sandy Springs Consulting - Security Systems Consulting Services Sandy Springs-Cobb County, GA Award Winning Work at Home Employees Sandy Springs Consulting Experts - Security Systems Consulting Sandy Springs-Cumberland, Georgia
  • Riverside California Riverside Work from Home Employees Solutions Consultants Telecommuters Expertise nearby Riverside - Solutions Guidance Riverside
  • Santa Cruz California Microsoft Dynamics GP-Software Santa Cruz Gold Partner - Upgrades Support Services Dynamics GP Santa Cruz Vender - Implementation Expert
  • Small Business Computer Consulting Firms Small Business Network Software Security Consultant Urgent Network Chandler, Maricopa County, United States
  • Small Business Network Consulting Company SQL Omaha, Douglas County, Nebraska Emergency Computer Network Consulting company SQL Omaha, NE, Lincoln, NE, Bellevue, NE, Grand Island, NE
  • Supplemetary IT Staffing for Computer Support Organizations Lynnwood, Washington Immediate Temporary Network Support Staffing Support Services Consulting Lynnwood-Edmonds, Washington
  • Support Outsourcing Microsoft Exchange 2003 Upgrade Best Exchange 2003 Server Upgrade Help
  • System Center Operations Manager Specialists System Center MOM Consulting Services
  • Teleworkers Bellevue Assistance - Help Desk Call Center Augmentation Consulting King County Washington At Home Workers Bellevue Consulting Services - Help Desk Augmentation Consultants Bellevue, King County, United States

  • Technology Professional Network Security Expert Darrin Johnson
    Progent Media Relations Engineers

    Progent in the News is managed by cybersecurity expert Darrin Johnson.

  • Toledo Ohio, US BlackBerry Exchange Computer Network Consultants Toledo, OH, U.S.A. BlackBerry Professional Software Network Support Service

  • SharePoint Server 2007 Information Technology Consulting
    Support Outsourcing SharePoint Server 2007

    Progent's Microsoft-certified experts can help you evaluate the business case for deploying SharePoint Server 2007, advise you on the most sensible version of SharePoint Server for your application, offer setup and deployment services, help you to set up MS SQL Server as a back-end database manager, improve your network integrity, integrate your off-the-shelf and customized application programs to operate with Microsoft SharePoint Server 2007, develop a comprehensive security plan that encompasses portal solutions, and deliver troubleshooting and Help Desk services.

  • Top Security Inventory Services Security Inventory Consultants
  • Vacaville Work at Home Employees Endpoint Management Systems Consulting Fairfield Vacaville At Home Workers Management Tools Expertise Vacaville

  • © 2002-2023 Progent Corporation. All rights reserved.