Stealth penetration testing (PEN testing) is a vital means of allowing organizations to learn how vulnerable their networks are to real world attacks by displaying how well their corporate security processes withstand intentional but unannounced attacks by seasoned security experts utilizing the latest hacking techniques. Progent can provide one-time penetration testing or continual penetration testing performed as a managed service.
Progent's network security consultants can safely implement extensive penetration testing without the knowledge of internal IT staff. Such testing reveals whether existing security management tools and processes such as intrusion detection alerts and event log monitoring are correctly configured and actively monitored.
Penetration testing can include any of these areas:
- Run a series of port scanning utilities to spot open network connection vectors and to identify and characterize a client's network environment and overall security posture.
- Run a series of threat identification tools that examine all open connection vectors against an extensive database of known security gaps resulting from servers that are not up to date on patches, outdated firmware/software, poorly configured servers and devices, and default or common installation passwords.
- Evaluate WiFi network security by trying to gain on-site access from publicly available places such as parking lots, hallways, restrooms, and physically attached spaces. Identification of security methods utilized by WiFi networks and running known exploit utilities to gain access to the network.
- Try to determine remote access capabilities of the network and use exploit and brute force techniques to get access through remote access infrastructure.
- Perform remote office security evaluation and testing, and determine whether remote sites can be used as a vector into the corporate network through VPNs or other private network infrastructure.
- Perform brute force identity and password attacks using a trove of more than 40 million possible passwords.
- For servers and devices penetrated, Progent cybersecurity experts will manually deploy assorted hacker tricks to broaden identified vectors to develop a picture of the full network environment and see how many internal systems can be accessed and exploited. This type of PEN testing can expose the real scope of the exposure of a network.
- Understand internal and external network addressing set up through email beaconing techniques.
- Perform a variety of DoS attacks, coordinated with senior network management to determineif it is possible to halt or hinder network productivity. After evidence of impact is reported, such testing can be instantly ceased to avoid seriously affecting business productivity.
- Perform PBX remote access and voice mail security assessment.
- Provide ongoing autonomous penetration testing to discover and fingerprint your internal/external attack surface and to determine ways that vulnerabilities, unsafe configurations, compromised credentials, uninstalled patches, and dangerous product defaults can be chained together by threat actors into the multi-front attacks common to the latest strains of ransomware.
Progent consultants can use social engineering methods and public information to attempt personalized password PEN testing using information such as the names of an employee's family members, date of birth, residential address, and phone number. Progent team members can commonly uncover this data through Internet search and readily available public records. Progent can uncover employee names/email addresses via publicly available information on the Internet, from PBX voice mail directories, public records filings, marketing collateral and press releases, web sites, and office receptionists.
Progent will generate a complete report of methods used and vulnerabilities uncovered during stealth penetration testing, along with a detailed list of suggested fixes. Progent can then cooperate with internal IT team members to carry out an audit and evaluation of your actual security defense, configuration, utilities, and processes and help your business to develop and deploy a comprehensive security solution.
ProSight Low-Cost Managed Services for Information Assurance
Progent's value-priced ProSight series of outsourced network management services is intended to provide small and mid-size organizations with enterprise-class support and state-of-the-art technology for all aspects of information assurance. ProSight managed services offered by Progent include:
- ProSight Active Security Monitoring (ASM): Endpoint Protection and Ransomware Defense
ProSight Active Security Monitoring (ASM) is an endpoint protection (EPP) service that utilizes SentinelOne's next generation behavior analysis tools to defend endpoint devices and servers and VMs against new malware attacks such as ransomware and email phishing, which easily evade legacy signature-matching AV products. ProSight Active Security Monitoring protects on-premises and cloud resources and provides a single platform to automate the complete threat progression including blocking, identification, containment, cleanup, and post-attack forensics. Top features include one-click rollback with Windows Volume Shadow Copy Service and automatic network-wide immunization against newly discovered threats. Progent is a SentinelOne Partner, dealer, and integrator. Learn more about Progent's ProSight Active Security Monitoring (ASM) next-generation endpoint protection and ransomware recovery with SentinelOne technology.
- ProSight Enhanced Security Protection (ESP): Unified Physical and Virtual Endpoint Protection
Progent's ProSight Enhanced Security Protection (ESP) managed services deliver affordable multi-layer protection for physical servers and virtual machines, workstations, mobile devices, and Exchange email. ProSight ESP uses contextual security and modern behavior analysis for continuously monitoring and reacting to cyber assaults from all attack vectors. ProSight ESP offers firewall protection, penetration alerts, endpoint management, and web filtering through cutting-edge tools incorporated within a single agent accessible from a unified console. Progent's security and virtualization experts can assist your business to plan and configure a ProSight ESP environment that addresses your organization's specific needs and that helps you demonstrate compliance with legal and industry data security standards. Progent will assist you define and implement policies that ProSight ESP will enforce, and Progent will monitor your IT environment and respond to alerts that require urgent attention. Progent can also assist your company to install and verify a backup and restore system like ProSight Data Protection Services so you can get back in business rapidly from a destructive cyber attack such as ransomware. Read more about Progent's ProSight Enhanced Security Protection (ESP) unified physical and virtual endpoint protection and Exchange email filtering.
- ProSight Data Protection Services: Managed Cloud Backup
Progent has worked with advanced backup/restore product vendors to produce ProSight Data Protection Services, a selection of management offerings that provide backup-as-a-service. All ProSight DPS products manage and monitor your data backup processes and enable transparent backup and fast recovery of critical files, apps, system images, and Hyper-V and VMware virtual machines. ProSight DPS lets you recover from data loss resulting from hardware breakdown, natural disasters, fire, cyber attacks like ransomware, user mistakes, malicious employees, or software glitches. Managed services in the ProSight DPS portfolio include ProSight DPS Altaro VM Backup, ProSight 365 Total Backup (formerly Altaro Office 365 Backup), ProSight ECHO Backup using Barracuda dedicated storage, and ProSight DPS MSP360 Hybrid Backup. Your Progent service representative can assist you to determine which of these fully managed services are most appropriate for your network.
- ProSight Email Guard: Spam Filtering, Data Leakage Protection and Email Encryption
ProSight Email Guard is Progent's email filtering and encryption solution that incorporates the technology of leading data security companies to provide centralized control and world-class protection for your email traffic. The powerful structure of Email Guard combines cloud-based filtering with an on-premises gateway appliance to provide advanced protection against spam, viruses, Denial of Service (DoS) Attacks, Directory Harvest Attacks, and other email-based malware. The cloud filter serves as a preliminary barricade and blocks most threats from making it to your network firewall. This decreases your vulnerability to inbound attacks and saves system bandwidth and storage space. Email Guard's on-premises security gateway device adds a further layer of analysis for inbound email. For outgoing email, the on-premises security gateway provides AV and anti-spam protection, policy-based Data Loss Prevention, and encryption. The local gateway can also help Microsoft Exchange Server to track and protect internal email that stays inside your corporate firewall. Find out more about Progent's ProSight Email Guard spam filtering, virus blocking, email content filtering and data leakage protection.
- ProSight WAN Watch: Network Infrastructure Remote Monitoring and Management
ProSight WAN Watch is a network infrastructure management service that makes it simple and affordable for smaller organizations to diagram, monitor, enhance and troubleshoot their connectivity appliances like switches, firewalls, and load balancers plus servers, printers, client computers and other devices. Using state-of-the-art Remote Monitoring and Management (RMM) technology, WAN Watch ensures that network maps are always updated, copies and displays the configuration of almost all devices on your network, monitors performance, and sends alerts when potential issues are discovered. By automating complex management and troubleshooting processes, ProSight WAN Watch can knock hours off ordinary chores such as network mapping, expanding your network, locating devices that require critical software patches, or isolating performance problems. Learn more details about ProSight WAN Watch infrastructure management consulting.
- ProSight LAN Watch: Server and Desktop Monitoring and Management
ProSight LAN Watch is Progent's server and desktop remote monitoring service that uses state-of-the-art remote monitoring and management (RMM) technology to keep your IT system operating efficiently by checking the state of vital assets that power your business network. When ProSight LAN Watch detects an issue, an alarm is transmitted immediately to your specified IT personnel and your assigned Progent engineering consultant so that all potential issues can be resolved before they have a chance to impact your network Find out more details about ProSight LAN Watch server and desktop remote monitoring services.
- ProSight Virtual Hosting: Hosted Virtual Machines at Progent's World-class Data Center
With ProSight Virtual Hosting service, a small or mid-size business can have its key servers and applications hosted in a secure Tier III data center on a fast virtual host configured and maintained by Progent's network support experts. Under Progent's ProSight Virtual Hosting model, the client retains ownership of the data, the operating system platforms, and the applications. Since the environment is virtualized, it can be moved immediately to an alternate hosting environment without requiring a time-consuming and difficult configuration process. With ProSight Virtual Hosting, you are not locked into a single hosting service. Learn more details about ProSight Virtual Hosting services.
- ProSight IT Asset Management: Network Documentation Management
Progent's ProSight IT Asset Management service is an IT infrastructure documentation management service that allows you to create, maintain, retrieve and protect information related to your IT infrastructure, procedures, business apps, and services. You can quickly find passwords or IP addresses and be alerted about upcoming expirations of SSL certificates ,domains or warranties. By updating and organizing your IT infrastructure documentation, you can save up to 50% of time wasted trying to find critical information about your network. ProSight IT Asset Management includes a common location for storing and collaborating on all documents required for managing your network infrastructure such as standard operating procedures (SOPs) and self-service instructions. ProSight IT Asset Management also supports a high level of automation for gathering and associating IT information. Whether you're making improvements, performing maintenance, or reacting to an emergency, ProSight IT Asset Management delivers the data you require when you need it. Learn more details about Progent's ProSight IT Asset Management service.
- Patch Management: Patch Management Services
Progent's support services for patch management provide organizations of all sizes a flexible and affordable solution for assessing, testing, scheduling, implementing, and tracking software and firmware updates to your dynamic IT system. Besides optimizing the security and reliability of your computer environment, Progent's patch management services permit your IT staff to concentrate on more strategic projects and activities that derive the highest business value from your network. Find out more about Progent's software/firmware update management services.
- ProSight Duo Multi-Factor Authentication: ID Confirmation, Endpoint Policy Enforcement, and Protected Single Sign-on
Progent's Duo authentication managed services utilize Cisco's Duo technology to protect against stolen passwords by using two-factor authentication. Duo supports single-tap identity confirmation with iOS, Android, and other out-of-band devices. Using 2FA, when you log into a secured online account and enter your password you are asked to confirm who you are on a device that only you possess and that uses a different ("out-of-band") network channel. A wide range of devices can be used for this added form of ID validation such as a smartphone or watch, a hardware token, a landline phone, etc. You may designate multiple verification devices. For details about Duo two-factor identity authentication services, refer to Duo MFA two-factor authentication (2FA) services.
ProSight Network Audits
Progent's ProSight Network Audits offer a fast and affordable way for small and medium-size businesses to obtain an objective assessment of the health of their information system. Based on some of the top remote monitoring and management (RMM) platforms in the industry, and supervised by Progent's world-class team of IT experts, ProSight Network Audits help you see how well the configuration of your essential network devices conform to leading practices. Both the Basic and Advanced options for ProSight Network Audit services are available at a low, one-time cost and deliver instant ROI like a more manageable Active Directory system. Both versions also come with a year of cutting-edge remote network monitoring and management. Benefits can include simpler network management, improved compliance with information security standards, higher utilization of network resources, quicker troubleshooting, more reliable backup and restore, and increased uptime. Learn more about Progent's ProSight Network Audits network infrastructure assessment.
Progent's ProSight Ransomware Preparedness Report Service
Progent's ProSight Ransomware Preparedness Report is a low-cost service based on a phone interview with a Progent backup/recovery expert. The interview is intended to evaluate your company's preparedness to block or recover quickly after an assault by a ransomware strain such as Ryuk, WannaCry, MongoLock, or Hermes. Progent will consult with you personally to collect information concerning your existing antivirus tools and backup system, and Progent will then produce a written Basic Security and Best Practices Report detailing how you can follow industry best practices to create an efficient security and backup/recovery system that meets your business requirements. For additional information, see The ProSight Ransomware Preparedness Report.
Contact Progent for Penetration Testing Consulting
For security expertise, call Progent at 800-993-9400 or visit Contact Progent.
Ransomware 24x7 Hot Line: Call 800-462-8800
Progent's Ransomware 24x7 Hot Line is intended to help organizations to take the time-critical first phase in mitigating a ransomware attack by putting out the fire. Progent's remote ransomware engineer can help businesses to locate and isolate infected devices and guard undamaged assets from being compromised. If your network has been penetrated by any version of ransomware, act fast. Get immediate help by calling Progent's Ransomware Hot Line at 800-462-8800. For details, see Progent's Ransomware 24x7 Hot Line.