Penetration testing (PEN testing) is a vital method for allowing organizations to determine how exposed their networks are to real world threats by showing how well corporate security processes, procedures and technologies hold up against announced or unannounced attacks by veteran security specialists using advanced hacking techniques. Progent can provide a one-time pentest or run scheduled or continual pentests delivered as a remotely managed service.

Progent's security experts can perform extensive in-depth penetration testing without the knowledge of internal IT staff. Such testing, known as stealth pentesting, uncovers whether existing security monitoring tools such as intrusion detection alerts and event log monitoring are correctly set up and actively monitored.

Penetration testing can encompass any or all of the following areas:

  • Running a series of port scanning tools to identify open network access vectors and to characterize a customer's network environment and overall security level.
  • Running a series of exploit identification tools that test all open access vectors against a large database of known vulnerabilities resulting from servers that are not up to date on security patches, out of date firmware/software, poorly configured servers and devices, and default or common installation passwords.
  • Evaluation of wireless network security by attempting on-site access from publicly accessible locations including parking lots, hallways, bathrooms, and physically adjacent spaces or floors. Identification of security methods utilized by wireless infrastructure and running known exploit tools to gain access.
  • Attempting to determine remote access capabilities of the network and perform exploit and brute force attack methods to gain access through remote access infrastructure.
  • Performing remote office security evaluation and testing, and determine whether remote sites can be used as a vector into the corporate network through VPNs or other private network infrastructure.
  • Performing brute force account and password attacks using a database of over 40 million possible passwords.
  • For devices and servers that are successfully penetrated, Progent security experts will manually use assorted hacker techniques to extend such exploit vectors to gain an understanding of the full network environment and see how many internal systems can be accessed and compromised. This type of security testing can expose the full scope of the vulnerability of a network environment.
  • Determining internal and external network addressing configuration through email beaconing techniques.
  • Performing various Denial of Service (DoS) attacks, coordinated with internal senior management to determine whether it is possible to stop or reduce network throughput. Once proof of impact is reported, such testing can be immediately terminated to avoid impacting business productivity.
  • Performing PBX remote access and voice mail security testing.
  • Continuous autonomous PEN testing to map your internal/external attack surface and to identify ways that vulnerabilities, improper configurations, stolen credentials, missing patches, and unsound product defaults can be chained together by threat actors into the multi-vector attacks common to modern strains of ransomware. The NodeZero product from Horizon3.ai is an example of a next-generation penetration testing platform powered by AI technology that can be run continuously to assess, tune, repair, and confirm the security posture of networks of any size in order to provide a high level of protection against modern cyberthreats like ransomware.
Progent experts can use social engineering techniques and public information to attempt customized password penetration testing utilizing information such as employees' family member names, birthdates, home addresses, and phone numbers. Progent team members can often quickly uncover this information through Internet online search and public records. Progent can uncover employee names/email addresses through publicly accessible information on the Internet, from PBX voice mail directories, public records filings, marketing materials and press releases, web sites, and receptionist.

Progent will provide a complete report of methods used and vulnerabilities uncovered during stealth penetration testing, along with a detailed list of recommended remediation steps. Progent can then work with internal IT staff to perform an audit and evaluation of the actual security protection, configuration, tools, and processes and help your company develop a comprehensive security plan.

Support for Horizon3.ai's NodeZero PEN Testing Platform
NodeZero from Horizon3.ai is a cutting-edge penetration test (pentest) platform that can deliver continuous, concurrent, automated assessment of your network so you can identify, prioritize, remediate, and confirm security weaknesses before threat actors can exploit them. Progent's pentest experts can assist you to deploy NodeZero to perform thorough pentests of your perimeter and your internal network so you can determine your current security posture. Progent's NodeZero experts can also assist you to strengthen your network security and can assist you to plan and implement a unified cybersecurity strategy that simplifies management and delivers optimum cyber defense for on-premises, multi-cloud, and perimeter IT assets. To find out more details about Progent's threat assessment solutions based on on NodeZero's pentest platform, see Consulting Support for NodeZero's Penetration Test Platform.

ProSight Low-Cost Managed Services for Information Assurance
Progent's low-cost ProSight line of network management outsourcing services is intended to provide small and mid-size organizations with enterprise-class support and state-of-the-art technology for all aspects of information assurance. ProSight managed services available from Progent include:

  • ProSight Active Security Monitoring: Endpoint Protection and Ransomware Defense
    ProSight Active Security Monitoring (ASM) is an endpoint protection solution that incorporates SentinelOne's next generation behavior-based machine learning tools to defend endpoint devices as well as servers and VMs against new malware attacks such as ransomware and file-less exploits, which easily evade legacy signature-matching AV products. ProSight Active Security Monitoring protects on-premises and cloud-based resources and offers a single platform to automate the complete malware attack progression including protection, identification, mitigation, cleanup, and forensics. Top capabilities include single-click rollback with Windows VSS and real-time network-wide immunization against new attacks. Progent is a SentinelOne Partner, dealer, and integrator. Learn more about Progent's ProSight Active Security Monitoring (ASM) endpoint protection and ransomware defense with SentinelOne technology.

  • ProSight Enhanced Security Protection (ESP): Unified Endpoint Security
    Progent's ProSight Enhanced Security Protection (ESP) managed services deliver ultra-affordable multi-layer security for physical servers and virtual machines, workstations, mobile devices, and Exchange email. ProSight ESP utilizes contextual security and advanced machine learning for round-the-clock monitoring and reacting to security threats from all vectors. ProSight ESP offers firewall protection, intrusion alarms, device management, and web filtering through cutting-edge technologies incorporated within one agent managed from a unified console. Progent's security and virtualization consultants can help your business to plan and configure a ProSight ESP environment that meets your organization's specific needs and that allows you achieve and demonstrate compliance with government and industry information security standards. Progent will help you specify and implement security policies that ProSight ESP will enforce, and Progent will monitor your IT environment and respond to alarms that call for urgent attention. Progent's consultants can also help your company to set up and test a backup and restore system such as ProSight Data Protection Services (DPS) so you can get back in business quickly from a potentially disastrous security attack like ransomware. Read more about Progent's ProSight Enhanced Security Protection (ESP) unified physical and virtual endpoint protection and Exchange email filtering.

  • ProSight DPS: Managed Backup and Recovery
    Progent has partnered with advanced backup/restore technology vendors to produce ProSight Data Protection Services (DPS), a selection of management offerings that provide backup-as-a-service (BaaS). All ProSight DPS services manage and track your data backup operations and allow non-disruptive backup and rapid recovery of vital files, applications, system images, plus Hyper-V and VMware virtual machines. ProSight DPS lets your business recover from data loss resulting from hardware failures, natural disasters, fire, cyber attacks such as ransomware, user mistakes, malicious insiders, or application bugs. Managed backup services available in the ProSight DPS product line include ProSight DPS Altaro VM Backup, ProSight 365 Total Backup (formerly Altaro Office 365 Backup), ProSight DPS ECHO Backup based on Barracuda purpose-built storage, and ProSight MSP360 Cloud and On-prem Backup. Your Progent expert can assist you to identify which of these fully managed services are most appropriate for your IT environment.

  • ProSight Email Guard: Inbound and Outbound Spam Filtering, Data Leakage Protection and Email Encryption
    ProSight Email Guard is Progent's email security platform that incorporates the services and infrastructure of top information security companies to provide centralized management and comprehensive security for your inbound and outbound email. The hybrid structure of Email Guard managed service integrates a Cloud Protection Layer with an on-premises security gateway device to offer advanced defense against spam, viruses, Dos Attacks, Directory Harvest Attacks (DHAs), and other email-based threats. Email Guard's Cloud Protection Layer serves as a first line of defense and keeps most unwanted email from making it to your network firewall. This reduces your vulnerability to inbound attacks and saves network bandwidth and storage. Email Guard's on-premises gateway appliance adds a further level of analysis for incoming email. For outbound email, the on-premises security gateway offers anti-virus and anti-spam filtering, DLP, and encryption. The local security gateway can also help Exchange Server to track and protect internal email that stays within your security perimeter. Learn more about Progent's ProSight Email Guard spam filtering, virus defense, email content filtering and data loss prevention.

  • ProSight WAN Watch: Network Infrastructure Management
    Progent's ProSight WAN Watch is an infrastructure management service that makes it simple and affordable for smaller businesses to diagram, track, optimize and debug their networking hardware such as switches, firewalls, and wireless controllers as well as servers, printers, client computers and other devices. Incorporating state-of-the-art RMM technology, WAN Watch makes sure that network maps are kept current, captures and manages the configuration of almost all devices connected to your network, tracks performance, and sends alerts when potential issues are discovered. By automating complex management and troubleshooting activities, ProSight WAN Watch can cut hours off common tasks such as making network diagrams, reconfiguring your network, finding devices that need critical updates, or isolating performance issues. Find out more about ProSight WAN Watch network infrastructure monitoring and management services.

  • ProSight LAN Watch: Server and Desktop Monitoring
    ProSight LAN Watch is Progent's server and desktop monitoring managed service that incorporates advanced remote monitoring and management technology to help keep your network operating efficiently by tracking the health of vital assets that power your information system. When ProSight LAN Watch detects an issue, an alarm is transmitted automatically to your specified IT staff and your assigned Progent engineering consultant so all looming problems can be addressed before they have a chance to impact your network Find out more about ProSight LAN Watch server and desktop monitoring services.

  • ProSight Virtual Hosting: Hosted VMs at Progent's Tier III Data Center
    With ProSight Virtual Hosting service, a small organization can have its key servers and applications hosted in a protected fault tolerant data center on a fast virtual host configured and maintained by Progent's IT support experts. Under Progent's ProSight Virtual Hosting service model, the client retains ownership of the data, the operating system platforms, and the applications. Since the system is virtualized, it can be moved easily to an alternate hardware solution without requiring a time-consuming and difficult configuration process. With ProSight Virtual Hosting, you are not tied one hosting provider. Find out more about ProSight Virtual Hosting services.

  • ProSight IT Asset Management: Network Documentation Management
    Progent's ProSight IT Asset Management service is a cloud-based IT documentation management service that makes it easy to capture, update, retrieve and protect information related to your IT infrastructure, processes, business apps, and services. You can quickly locate passwords or serial numbers and be alerted about impending expirations of SSLs or domains. By cleaning up and organizing your IT documentation, you can save as much as half of time spent searching for vital information about your IT network. ProSight IT Asset Management includes a common location for holding and collaborating on all documents related to managing your business network such as recommended procedures and How-To's. ProSight IT Asset Management also offers a high level of automation for gathering and relating IT data. Whether you're planning enhancements, performing maintenance, or responding to a crisis, ProSight IT Asset Management gets you the knowledge you need when you need it. Find out more details about Progent's ProSight IT Asset Management service.

  • Patch Management: Software/Firmware Update Management Services
    Progent's managed services for patch management provide organizations of all sizes a versatile and cost-effective solution for assessing, validating, scheduling, implementing, and documenting software and firmware updates to your ever-evolving information system. Besides optimizing the security and functionality of your IT environment, Progent's patch management services permit your in-house IT team to concentrate on line-of-business projects and activities that deliver maximum business value from your information network. Find out more about Progent's software/firmware update management support services.

  • ProSight Duo Two-Factor Authentication: ID Confirmation, Endpoint Remediation, and Protected Single Sign-on
    Progent's Duo MFA services incorporate Cisco's Duo technology to defend against password theft by using two-factor authentication (2FA). Duo enables single-tap identity confirmation with Apple iOS, Android, and other personal devices. Using Duo 2FA, when you sign into a secured application and give your password you are requested to confirm your identity on a unit that only you possess and that is accessed using a different ("out-of-band") network channel. A wide selection of out-of-band devices can be used for this second means of authentication such as a smartphone or wearable, a hardware/software token, a landline telephone, etc. You can register several verification devices. To learn more about ProSight Duo two-factor identity authentication services, refer to Duo MFA two-factor authentication services.
ProSight Network Audits
Progent's ProSight Network Audits are a fast and affordable alternative for small and mid-size businesses to obtain an objective evaluation of the health of their IT system. Powered by a selection of the leading remote monitoring and management (RMM) tools in the industry, and overseen by Progent's world-class group of information technology professionals, ProSight Network Audits show you how closely the deployment of your essential infrastructure assets conform to industry leading practices. Both the Basic and Advanced options for ProSight Network Audit services are offered at a low, one-time cost and deliver instant ROI like a cleaner Active Directory (AD) system. Both also include a year of cutting-edge remote network monitoring and management. Benefits can include lower-cost management, improved compliance with government and industry security standards, higher utilization of IT assets, faster troubleshooting, more dependable backup and restore, and increased uptime. Read more about Progent's ProSight Network Audits network infrastructure review.

Progent's ProSight Ransomware Preparedness Report
The ProSight Ransomware Preparedness Report service is a low-cost service centered on a phone interview with a Progent information assurance expert. The interview is designed to assess your company's preparedness either to block or recover quickly after an assault by a ransomware strain such as Ryuk, WannaCry, MongoLock, or Hermes. Progent will consult with you personally to collect information about your current AV defense and backup/recovery platform, and Progent will then produce a written Basic Security and Best Practices Report detailing how you can follow best practices to build an efficient security and backup system that meets your company's needs. For additional information, refer to Progent's ProSight Ransomware Preparedness Report Service.

Contact Progent for Penetration Testing Consulting
If you want network security expertise, telephone Progent at 800-993-9400 or see Contact Progent.

Ransomware 24x7 Hot Line: Call 800-462-8800
Progent's Ransomware 24x7 Hot Line is designed to assist you to complete the time-critical first step in mitigating a ransomware attack by putting out the fire. Progent's remote ransomware engineer can help businesses to identify and quarantine infected servers and endpoints and guard undamaged assets from being compromised. If your network has been breached by any strain of ransomware, act fast. Get immediate help by calling Progent's Ransomware Hot Line at 800-462-8800. For details, see Progent's Ransomware 24x7 Hot Line.



An index of content::

  • 24-7 Cisco Outsourcing Companies Napa California Cisco Small Business Network Consulting Company Napa
  • PEN Testing Firewall Network Install
  • After Hours Recife Network Consulting Firm Immediate Small Office Network Consultant Recife
  • Security Company Stealth Penetration Testing
  • At Home Workers Consulting Services - Richmond - Management Tools Consulting Richmond California, America Remote Workers Richmond Consultants - Management Systems Consulting and Support Services Richmond
  • Award Winning SQL Server 2012 Computer Consulting Firms Spartanburg Internet Networking Consultants SQL Server 2012
  • Birmingham 24 Hour Birmingham Conti Crypto-Ransomware System-Rebuild 24 Hour Birmingham Netwalker Ransomware Cleanup Birmingham
  • BlackBerry Wireless Networking Consultancy Services Providence County Rhode Island Immediate BlackBerry Redirector Networking Specialist Providence, RI
  • Cisco Certified Computer Network Firms Salinas Marina Network Setup
  • Cleveland Public Square Offsite Workforce Expertise near Cleveland - Help Desk Call Center Outsourcing Consulting Experts Cleveland Teleworkers Help Desk Call Center Outsourcing Expertise Cleveland, Cuyahoga County
  • Consulting Support for San Diego IT Support Companies Expertise for IT Service Providers in San Diego - Transparent Temporary Support Team Expansion
  • Consulting Team Microsoft SQL 2008 Lubbock, USA Network Recovery Microsoft SQL Server 2016 Lubbock, TX
  • Consulting for IT Support Organizations - Lawrence - Transparent Short-Term Staff Expansion Lawrence-Essex County, Massachusetts Consulting Services for Network Service Companies - Lawrence - Seamless Temporary Support Team Assistance Lawrence, MA
  • Eugene Work from Home Employees Help Desk Solutions Assistance Eugene Oregon Telecommuters Eugene Consulting - Call Desk Augmentation Consulting Eugene, OR
  • Exchange 2019 Technical Firms Rancho Cordova Exchange Server 2013 Migration Support
  • Expert Microsoft Certified Exchange Server 2013 Configuration Exchange 2013 Performance Tuning Professionals
  • Fargo, ND Computer Consulting Services Top Ranked Fargo-Grand Forks Networking Consultancy Services
  • Folsom-Rancho Cordova Cisco Migration Company Computer Consulting Firm Cisco Rancho Cordova, CA
  • Immediate Offsite Workforce Consulting Services near Virginia Beach - Backup/Restore Systems Consulting Services Virginia Beach Virginia At Home Workforce Virginia Beach Consulting - Backup Solutions Expertise Virginia Beach
  • Computer Security Cybersecurity Pen Testing
  • Londrina Hermes Ransomware Settlement Guidance Maringa, Parana Londrina Sodinokibi Ransomware Settlement Negotiation Consultants Paraná

  • Technical Support Co-managed Help Desk
    Extended Support Desk Computer Consultant

    Progent's Co-managed Help Desk service makes it possible for your business to share responsibilities for Help Desk services seamlessly between your in-house IT staff and Progent's nationwide pool of certified technical support technicians and subject matter experts (SMEs). Progent's Co-managed Help Desk service is an advanced service desk solution based on ConnectWise Manage, the top shared professional services automation (PSA) platform for handling service requests, ticket lifecycle, responsibility, progress tracking, and metrics.

  • Minnetonka Nephilim Ransomware Mitigation Minnetonka Minnesota Minnetonka Ryuk Ransomware Counter-Measures Minnetonka-St Louis Park, Minnesota

  • Catalyst 9100 Series Access Point IT Services
    Catalyst Wireless Access Point Technical Support Services

    Progent's Cisco-certified Catalyst 9100 Series 802.11ax Wi-Fi 6 Access Point experts offer economical remote and onsite support for Catalyst next-generation Wi-Fi 6 wireless APs.

  • Computer Security Specialist Penetration Testing
  • Morgan Hill BlackBerry Redirector Support Outsourcing BlackBerry Redirector Network Support Consultant Gilroy CA
  • Oak Park, IL Remote Workforce Assistance - Chicago - Help Desk Augmentation Consulting Experts Chicago Loop, Illinois, United States Work at Home Employees Expertise nearby Chicago - Call Desk Outsourcing Consulting Services
  • Online Support Services Redhat Louisiana Linux IT Services New Orleans, Louisiana
  • Plano, Texas IT Consulting Firm Plano, Texas Computer Network Support Companies
  • Professional VMware ESX Server VMware vCloud Director vCD Consulting Services

  • SCCM 2016 Security Configuration
    Support SCCM 2016 Primary Site

    Configuration Manager 2016 automates software provisioning and updating, centralizes security and compliance settings management, inventories network resources, protects against company data leakage, performs network health monitoring, enables secure end-user self service, and offers a single control mechanism for managing multi-operating system ecosystems running on-premises, cloud-centric, or hybrid deployment topologies. Progent's Microsoft-certified Configuration Manager 2016 consultants and Azure cloud integration specialists can assist your organization with any facet of designing, installing, operating and troubleshooting a SCCM 2016 solution for on-premises, cloud, or hybrid environments.

  • Server Setup Cisco Cisco Computer Help Parsippany-Cedar Knolls
  • Supplemental IT Support Staffing Help Consultants Appleton, WI, USA Supplemental Staffing Support Services Consulting Appleton-Fond du Lac, WI
  • Technical Firms Microsoft SQL Server 2017 Gilroy CA Microsoft SQL Server Computer Consulting Morgan Hill, CA

  • Juniper J2350 Router Firewall Audit
    Juniper J6350 Router Testing

    Progent's Juniper-certified network engineers can assist your organization to design and carry out the installation of Juniper J Series firewall/VPN routers, configure security policies and fault-tolerant redundancy, and provide ongoing technical consulting and troubleshooting services.

  • Uniondale Remote Workforce Management Systems Consulting Experts Offsite Workforce Consulting near me in Uniondale - Management Tools Guidance Uniondale-Ronkonkoma, New York

  • SCCM 2016 Cloud Integration Support and Integration
    SCCM 2016 Hybrid Integration Technology Consulting Services

    Configuration Manager 2016 automates software provisioning and updating, streamlines compliance settings management, keeps track of network resources, protects against company data leakage, performs health reporting, allows safe self service, and delivers a common control mechanism for managing mixed-OS ecosystems running on-premises, cloud-centric, or hybrid deployment architectures. Progent's Microsoft-certified SCCM 2016 consultants and Microsoft Azure cloud integration specialists can help your organization with any facet of planning, installing, operating and troubleshooting a System Center 2016 Configuration Manager deployment for local, cloud, or hybrid environments.

  • Vermont, United States Windows Small Business Specialist Top Windows Security Consulting Services Vermont - Burlington, VT, Rutland, VT, Montpelier, VT

  • Cisco ASA 5500 IT Services
    Cisco ASA 5500 Firewalls Online Technical Support

    Progent's Cisco certified networking experts can help your organization to maintain older PIX 500 or ASA 5500 firewalls or transition to Cisco ASA 5500-X firewalls. Progent can also assist you to set up, manage, upgrade and troubleshoot Cisco ASA 5500-X security appliances with Firepower Services.

  • Windows 2008 Server Network Consult New Orleans Network Engineer Windows Server 2016 New Orleans Louisiana
  • Windows 2019 Server Network Security Consultant South East England, United Kingdom Windows Server 2012 R2 Networking Consultants

  • Cisco and Microsoft Certified NodeZero Certified Penetration Testing Security Audits
    Biggest NodeZero Cybersecurity Pen Testing IT Services

    Progent's certified security experts can perform NodeZero-powered threat assessments to verify your security monitoring and protection tools and policies are correctly set up and effective.

  • Windows Networking Support Honolulu Urgent Windows Server 2012 Server Migration Specialists
  • Windows Server 2012 Configuration Services Manaus, Amazonas Windows Server 2016 Small Business IT Outsourcing Services Amazonas

  • © 2002-2024 Progent Corporation. All rights reserved.