Penetration testing (PEN testing) is a vital method for allowing organizations to determine how exposed their networks are to real world threats by showing how well corporate security processes, procedures and technologies hold up against announced or unannounced attacks by veteran security specialists using advanced hacking techniques. Progent can provide a one-time pentest or run scheduled or continual pentests delivered as a remotely managed service.

Progent's security experts can perform extensive in-depth penetration testing without the knowledge of internal IT staff. Such testing, known as stealth pentesting, uncovers whether existing security monitoring tools such as intrusion detection alerts and event log monitoring are correctly set up and actively monitored.

Penetration testing can encompass any or all of the following areas:

  • Running a series of port scanning tools to identify open network access vectors and to characterize a customer's network environment and overall security level.
  • Running a series of exploit identification tools that test all open access vectors against a large database of known vulnerabilities resulting from servers that are not up to date on security patches, out of date firmware/software, poorly configured servers and devices, and default or common installation passwords.
  • Evaluation of wireless network security by attempting on-site access from publicly accessible locations including parking lots, hallways, bathrooms, and physically adjacent spaces or floors. Identification of security methods utilized by wireless infrastructure and running known exploit tools to gain access.
  • Attempting to determine remote access capabilities of the network and perform exploit and brute force attack methods to gain access through remote access infrastructure.
  • Performing remote office security evaluation and testing, and determine whether remote sites can be used as a vector into the corporate network through VPNs or other private network infrastructure.
  • Performing brute force account and password attacks using a database of over 40 million possible passwords.
  • For devices and servers that are successfully penetrated, Progent security experts will manually use assorted hacker techniques to extend such exploit vectors to gain an understanding of the full network environment and see how many internal systems can be accessed and compromised. This type of security testing can expose the full scope of the vulnerability of a network environment.
  • Determining internal and external network addressing configuration through email beaconing techniques.
  • Performing various Denial of Service (DoS) attacks, coordinated with internal senior management to determine whether it is possible to stop or reduce network throughput. Once proof of impact is reported, such testing can be immediately terminated to avoid impacting business productivity.
  • Performing PBX remote access and voice mail security testing.
  • Continuous autonomous PEN testing to map your internal/external attack surface and to identify ways that vulnerabilities, improper configurations, stolen credentials, missing patches, and unsound product defaults can be chained together by threat actors into the multi-vector attacks common to modern strains of ransomware. The NodeZero product from Horizon3.ai is an example of a next-generation penetration testing platform powered by AI technology that can be run continuously to assess, tune, repair, and confirm the security posture of networks of any size in order to provide a high level of protection against modern cyberthreats like ransomware.
Progent experts can use social engineering techniques and public information to attempt customized password penetration testing utilizing information such as employees' family member names, birthdates, home addresses, and phone numbers. Progent team members can often quickly uncover this information through Internet online search and public records. Progent can uncover employee names/email addresses through publicly accessible information on the Internet, from PBX voice mail directories, public records filings, marketing materials and press releases, web sites, and receptionist.

Progent will provide a complete report of methods used and vulnerabilities uncovered during stealth penetration testing, along with a detailed list of recommended remediation steps. Progent can then work with internal IT staff to perform an audit and evaluation of the actual security protection, configuration, tools, and processes and help your company develop a comprehensive security plan.

Consulting Services for Horizon3.ai's NodeZero Pentest Platform
NodeZero from Horizon3.ai is a cutting-edge penetration test (pentest) platform that can deliver repeated, concurrent, automated testing of your internal and perimeter network so you can find, rank, fix, and verify security vulnerabilities before threat actors can exploit them. Progent's pentest experts can help you to use NodeZero to carry out thorough penetration tests of your network perimeter and your internal IT infrastructure so you can evaluate your present security profile. Progent can also help you to strengthen your existing network security and can help you to plan and implement a cohesive cybersecurity ecosystem that streamlines management and provides optimum protection for on-prem, cloud-based, and perimeter IT assets. To find out more details about Progent's vulnerability assessment services based on on NodeZero's pentest platform, refer to Consulting Support for NodeZero's PEN Test Products.

ProSight Fixed-price Managed Services for Information Assurance
Progent's affordable ProSight series of outsourced network management services is designed to provide small and mid-size organizations with enterprise-class support and cutting-edge technology for all facets of information assurance and compliance. ProSight managed services offered by Progent include:

  • ProSight Active Security Monitoring: Next Generation Endpoint Protection and Ransomware Recovery
    Progent's ProSight Active Security Monitoring is an endpoint protection service that incorporates SentinelOne's cutting edge behavior analysis tools to guard endpoint devices as well as physical and virtual servers against modern malware assaults like ransomware and file-less exploits, which easily evade legacy signature-matching AV tools. ProSight ASM protects on-premises and cloud resources and offers a single platform to manage the complete malware attack lifecycle including filtering, identification, mitigation, remediation, and post-attack forensics. Top capabilities include single-click rollback using Windows VSS and automatic network-wide immunization against new attacks. Progent is a SentinelOne Partner, dealer, and integrator. Find out more about Progent's ProSight Active Security Monitoring (ASM) next-generation endpoint protection and ransomware defense with SentinelOne technology.

  • ProSight Enhanced Security Protection: Unified Physical and Virtual Endpoint Security
    ProSight Enhanced Security Protection (ESP) managed services deliver economical in-depth security for physical and virtual servers, desktops, smartphones, and Exchange Server. ProSight ESP utilizes adaptive security and advanced heuristics for round-the-clock monitoring and reacting to cyber assaults from all vectors. ProSight ESP provides firewall protection, penetration alarms, endpoint management, and web filtering through cutting-edge technologies packaged within a single agent accessible from a single control. Progent's security and virtualization consultants can assist your business to design and configure a ProSight ESP deployment that meets your company's specific needs and that allows you demonstrate compliance with legal and industry data protection regulations. Progent will assist you specify and configure security policies that ProSight ESP will manage, and Progent will monitor your IT environment and respond to alarms that require immediate attention. Progent can also help your company to set up and test a backup and disaster recovery system like ProSight Data Protection Services (DPS) so you can get back in business rapidly from a potentially disastrous security attack like ransomware. Find out more about Progent's ProSight Enhanced Security Protection (ESP) unified physical and virtual endpoint protection and Exchange filtering.

  • ProSight DPS: Managed Cloud Backup and Recovery
    Progent has worked with advanced backup product vendors to produce ProSight Data Protection Services (DPS), a selection of offerings that deliver backup-as-a-service. All ProSight DPS products automate and monitor your backup operations and allow non-disruptive backup and rapid restoration of vital files, apps, images, and virtual machines. ProSight DPS helps you recover from data loss caused by hardware breakdown, natural disasters, fire, malware such as ransomware, user error, ill-intentioned employees, or software bugs. Managed backup services in the ProSight DPS portfolio include ProSight DPS Altaro VM Backup, ProSight 365 Total Backup (formerly Altaro Office 365 Backup), ProSight ECHO Backup using Barracuda purpose-built storage, and ProSight MSP360 Hybrid Backup. Your Progent consultant can help you to identify which of these managed services are best suited for your network.

  • ProSight Email Guard: Inbound and Outbound Spam Filtering, Data Leakage Protection and Content Filtering
    ProSight Email Guard is Progent's email filtering and encryption platform that uses the technology of top data security vendors to deliver web-based management and world-class protection for your email traffic. The powerful structure of Progent's Email Guard managed service combines cloud-based filtering with an on-premises gateway device to provide advanced defense against spam, viruses, Dos Attacks, Directory Harvest Attacks, and other email-based malware. The cloud filter acts as a preliminary barricade and keeps the vast majority of threats from reaching your security perimeter. This decreases your exposure to external threats and saves system bandwidth and storage. Email Guard's onsite security gateway device provides a deeper level of inspection for incoming email. For outbound email, the local gateway provides anti-virus and anti-spam protection, policy-based Data Loss Prevention, and encryption. The onsite security gateway can also assist Microsoft Exchange Server to track and safeguard internal email traffic that originates and ends within your corporate firewall. Learn more about Progent's ProSight Email Guard spam filtering, virus blocking, content filtering and data loss prevention.

  • ProSight WAN Watch: Infrastructure Management
    Progent's ProSight WAN Watch is a network infrastructure management service that makes it easy and inexpensive for smaller businesses to map, track, enhance and debug their networking hardware such as routers and switches, firewalls, and wireless controllers plus servers, endpoints and other networked devices. Incorporating cutting-edge Remote Monitoring and Management (RMM) technology, ProSight WAN Watch makes sure that network maps are always updated, copies and manages the configuration information of virtually all devices connected to your network, monitors performance, and generates alerts when issues are discovered. By automating tedious management and troubleshooting processes, ProSight WAN Watch can knock hours off common tasks such as network mapping, reconfiguring your network, finding appliances that need critical software patches, or resolving performance problems. Learn more about ProSight WAN Watch network infrastructure monitoring and management consulting.

  • ProSight LAN Watch: Server and Desktop Monitoring
    ProSight LAN Watch is Progent's server and desktop monitoring service that incorporates advanced remote monitoring and management (RMM) techniques to help keep your IT system operating efficiently by tracking the state of critical computers that power your business network. When ProSight LAN Watch detects a problem, an alert is transmitted automatically to your specified IT management personnel and your Progent engineering consultant so any looming issues can be resolved before they can disrupt productivity Learn more about ProSight LAN Watch server and desktop remote monitoring consulting.

  • ProSight Virtual Hosting: Hosted VMs at Progent's World-class Data Center
    With Progent's ProSight Virtual Hosting service, a small or mid-size business can have its critical servers and apps hosted in a protected Tier III data center on a high-performance virtual host set up and maintained by Progent's IT support experts. Under Progent's ProSight Virtual Hosting service model, the client owns the data, the OS software, and the applications. Because the environment is virtualized, it can be ported easily to an alternate hosting environment without a time-consuming and technically risky reinstallation procedure. With ProSight Virtual Hosting, your business is not tied a single hosting provider. Learn more details about ProSight Virtual Hosting services.

  • ProSight IT Asset Management: Network Documentation Management
    ProSight IT Asset Management service is a cloud-based IT documentation management service that makes it easy to capture, update, find and safeguard information about your network infrastructure, processes, business apps, and services. You can instantly find passwords or serial numbers and be warned about impending expirations of SSL certificates or warranties. By updating and organizing your network documentation, you can eliminate as much as 50% of time wasted looking for critical information about your IT network. ProSight IT Asset Management includes a common location for holding and collaborating on all documents related to managing your business network such as standard operating procedures and self-service instructions. ProSight IT Asset Management also offers a high level of automation for gathering and relating IT information. Whether you're making enhancements, performing maintenance, or reacting to a crisis, ProSight IT Asset Management gets you the knowledge you need when you need it. Learn more details about ProSight IT Asset Management service.

  • Patch Management: Patch Management Services
    Progent's managed services for software and firmware patch management provide organizations of any size a flexible and cost-effective alternative for evaluating, testing, scheduling, applying, and documenting updates to your dynamic information system. In addition to optimizing the security and reliability of your computer environment, Progent's software/firmware update management services allow your in-house IT team to focus on more strategic initiatives and activities that deliver maximum business value from your network. Read more about Progent's software/firmware update management services.

  • ProSight Duo Two-Factor Authentication: Identity Validation, Endpoint Remediation, and Secure Single Sign-on
    Progent's Duo MFA services utilize Cisco's Duo cloud technology to protect against password theft by using two-factor authentication. Duo enables single-tap identity verification with iOS, Android, and other out-of-band devices. With Duo 2FA, whenever you sign into a secured application and enter your password you are requested to confirm your identity via a unit that only you possess and that uses a different network channel. A wide selection of devices can be utilized as this second means of authentication including a smartphone or wearable, a hardware/software token, a landline telephone, etc. You may register multiple validation devices. For more information about Duo two-factor identity authentication services, go to Duo MFA two-factor authentication services for access security.
ProSight Network Audits
Progent's ProSight Network Audits are a fast and affordable way for small and medium-size organizations to get an objective assessment of the health of their network. Powered by some of the leading remote monitoring and management (RMM) tools available, and supervised by Progent's certified group of IT professionals, ProSight Network Audits show you how well the deployment of your core infrastructure devices adhere to industry leading practices. The Basic and Advanced versions of ProSight Network Audit services are offered at a low, one-time cost and provide instant ROI such as a cleaner Active Directory (AD) environment. Both versions also include one year of advanced remote network monitoring and management. Advantages can include easier management, improved compliance with information security requirements, more efficient utilization of network resources, quicker problem resolution, more dependable backup and recovery, and increased uptime. Read more about Progent's ProSight Network Audits IT infrastructure assessment.

Progent's ProSight Ransomware Preparedness Report Service
Progent's ProSight Ransomware Preparedness Report service is a low-cost service based on a brief interview with a Progent information assurance consultant. The interview is intended to assess your company's ability either to stop or recover quickly following an attack by a ransomware variant such as Ryuk, WannaCry, MongoLock, or Hermes. Progent will consult with you personally to collect information about your existing antivirus tools and backup/recovery system, and Progent will then produce a written Basic Security and Best Practices Report describing how you can follow best practices to create an efficient AV and backup/recovery system that meets your business needs. For details, see The ProSight Ransomware Preparedness Report Service.

Contact Progent for Penetration Testing Consulting
If you need security expertise, phone Progent at 800-993-9400 or refer to Contact Progent.

Ransomware 24x7 Hot Line: Call 800-462-8800
Progent's Ransomware 24x7 Hot Line is intended to guide you to take the time-critical first phase in responding to a ransomware assault by containing the malware. Progent's remote ransomware engineer can assist businesses to identify and quarantine infected devices and guard undamaged assets from being compromised. If your system has been breached by any version of ransomware, act fast. Get immediate help by calling Progent's Ransomware Hot Line at 800-462-8800. For more information, visit Progent's Ransomware 24x7 Hot Line.



An index of content::

  • 24-Hour Outlook Mac Network Consulting Mac Email client for Exchange Consultant Services
  • 24/7 Baltimore Sodinokibi Ransomware Removal Baltimore Downtown, United States Baltimore Spora Ransomware Recovery Baltimore Downtown, United States
  • Albany NY Albany Crypto-Ransomware WannaCry Vulnerability Checkup Albany-Troy Award Winning Albany Ransomware Vulnerability
  • Allen MS Dynamics GP-Software Migration Expert Allentown, PA, USA 24/7 Dynamics GP (Great Plains) Allen VAR - SQL Server Help Lehigh County Pennsylvania
  • At Home Workforce Consultants near Lakeland - Infrastructure Consulting and Support Services Lakeland At Home Workers Consultants in Lakeland - Infrastructure Guidance Lakeland, Florida
  • Austin Sodinokibi Crypto-Ransomware Negotiation Consulting Austin, TX Austin Ransomware Settlement Negotiation Consulting Austin, TX

  • Great Plains Accounting Consulting Services
    Business Portal for Dynamics GP Professionals

    Progent's expertise providing Microsoft .NET support and Microsoft SQL Server help, and Progent's application development experience with VBasic, XML, and additional developer tools enable Progent to design specialized line-of-business programs and eCommerce environments that integrate seamlessly with Dynamics GP Software. Progent's Microsoft Dynamics GP management reporting consultants can help you design reports that let you analyze your business more effectively, transforming raw information into valuable understanding of your business.

  • BlackBerry Desktop Manager Network Design Lambert International Airport STL, USA Computer Network Consultants BlackBerry Desktop Manager St Louis Missouri, U.S.A.
  • BlackBerry Redirector On-Call Services Cabo Frio, Rio de Janeiro Cabo Frio, RJ Implementation Services BlackBerry Software
  • Broomfield NotPetya Ransomware Business Recovery Broomfield-Boulder, Colorado Broomfield Conti Crypto-Ransomware System-Rebuild Broomfield-Boulder, Colorado
  • Cabo Frio Avaddon Ransomware Repair Cabo Frio Cabo Frio Conti Ransomware Business-Recovery Cabo Frio
  • Chicago Spora Crypto-Ransomware Forensics Oak Park, IL, US Chicago WannaCry Crypto-Ransomware Forensics Analysis Berwyn, IL
  • Cisco CCIE Engineer Career Virginia Beach Computer Support Contractor Virginia Beach, VA, United States
  • Consulting Services for Stockton IT Service Companies Stockton Manteca, CA Expertise for Stockton IT Support Providers
  • Estado de São Paulo Biggest Computer Consultancy Companies Microsoft SQL Server 2016 Microsoft SQL Server 2017 Outsourced IT Support
  • Exchange 2003 Server Tech Support San Juan, US Microsoft Exchange Computer Specialists San Juan-Caribbean
  • Exchange Server 2013 Networking Help Barra da Tijuca, State of Rio de Janeiro Microsoft Exchange Server 2007 Support Outsourcing Services Barra
  • Fedora Linux, Solaris, UNIX Outsourcing Broomfield, United States 24-7 CentOS Linux, Sun Solaris, UNIX On-site Support
  • Gentoo Linux, Solaris, UNIX Technology Consulting Services Ubuntu Linux, Sun Solaris, UNIX Computer Consultant Belo Horizonte, Minas Gerais
  • Juniper J Series Router Security Audit Services Juniper J2350 Router Cybersecurity Firm
  • Lincoln, Lancaster County, USA Windows Server 2012 Service Provider Windows Network Setup Lancaster County Nebraska
  • Microsoft Windows 11 Snap Groups Consultant Windows 11 Configuration Online Consulting
  • Microsoft Windows Server 2016 Maintenance Colorado Springs, CO Microsoft Windows Server 2016 Configuration Colorado Springs, CO, U.S.A.
  • Migration Consultants Microsoft and Cisco Arlington Woodbridge Help Desk Information Technology Outsourcing Arlington Woodbridge
  • Pasadena DopplePaymer Ransomware Cleanup Harris County Texas Pasadena Phobos Crypto-Ransomware Mitigation Pasadena
  • Philadelphia Firewall Consultants Security Company CISSP
  • Remote Outsourcing Technology Microsoft Exchange 2010 Tukwila-Federal Way Tukwila, WA Exchange Server 2016 Computer Networking
  • SCCM 2016 Primary Site Onsite Technical Support SCCM 2016 Central Administration Site Support and Help
  • Santos NotPetya Ransomware Recovery Praia Grande, São Paulo Santos Phobos Crypto-Ransomware Rollback Santos
  • Schaumburg Microsoft Dynamics GP Training Help Schaumburg-Elk Grove Village, Illinois, United States Schaumburg Dynamics GP (Great Plains) Customization Support Services Schaumburg-Deerfield, Illinois
  • Cybersecurity Pen Testing Cybersecurity Firm
  • Server Installation Cisco Augusta Aiken Augusta, Richmond County Open Now Cisco Small Business IT Outsourcing Group

  • Upgrading Exchange 2000 Upgrade
    Specialist Exchange Server 2000 Upgrade

    Progent is one of the most qualified network support firms for designing email systems powered by Exchange 2000. Progent is skilled in helping small and mid-size businesses get the full advantages of Microsoft Exchange Server 2000 for common situations including updating from Exchange 5.5 Server, migration from an ISP-managed or POP3 e-mail environment, and jobbing out your Microsoft Exchange 2000 support.

  • Shreveport MongoLock Ransomware Forensics Analysis Shreveport Bossier City , U.S.A. Shreveport Avaddon Crypto-Ransomware Forensics Shreveport, LA
  • 24-Hour Consulting Services Cybersecurity Pen Testing
  • Skokie, Illinois Network Engineer Skokie Support Company

  • Meraki MR30H Access Point Network Consultant
    Meraki MR72 Access Point Consultant

    Progent's Cisco-Meraki Wi-Fi access point experts can assist your organization to design, configure, manage and debug Cisco's Meraki-based Wi-Fi networks for deployments ranging from a branch office to a campus or a nationwide enterprise. Progent can also help clients to integrate other Cisco devices for unified management.

  • Software Security Consultant Cambridge Cambridge Support Firm
  • Springfield Massachusetts Springfield Lockbit Ransomware Operational-Recovery Springfield Massachusetts, USA Springfield Spora Ransomware File-Recovery
  • Supplemental Network Support Staffing Support Consultants Dallas Fort Worth Metroplex Garland IT Staff Augmentation Support Garland Texas
  • System Center MOM Professional Consulting 24x7 Network
  • Urgent Des Moines Sodinokibi Crypto-Ransomware Repair Des Moines Iowa Des Moines Netwalker Crypto-Ransomware Rollback Des Moines
  • Waltham IT Staffing Support Waltham-Framingham, MA Supplemental IT Staffing Support Consulting Specialist Waltham, Massachusetts, United States
  • Washington-Alexandria Repair Installation Washington District of Columbia Computer Consultants
  • Windows 2008 Server Computer Consulting Companies Chatsworth-Chatsworth, California Windows 2008 Server Network Consulting Organization Chatsworth, US

  • Amazon hybrid cloud integration Contract Development
    Programming Firm Amazon hybrid cloud integration

    Progent can provide affordable remote support to assist businesses of any size to integrate Amazon Web Services (AWS) cloud services such as Elastic Compute Cloud (EC2) for virtual server hosting, Amazon Simple Storage Service (Amazon S3), and Amazon Glacier. Progent can assist your IT team with every phase of Amazon AWS integration including needs analysis, readiness evaluation, system design and review, testing, configuration, centralized administration, performance tuning, software license management, backup/restore solutions, and security strategies.

  • Windows 2019 Server Remote Troubleshooting Riverside - Moreno Valley Windows 2008 Server Small Office Network Consulting Riverside, CA
  • Work from Home Employees Augusta-Richmond County Guidance - Endpoint Security Systems Consulting Augusta Aiken Remote Workers Consultants - Augusta-Richmond County - Cybersecurity Solutions Expertise Augusta, Richmond County
  • Work from Home Employees San Jose Assistance - Management Tools Consultants San Jose Silicon Valley Offsite Workforce San Jose Consulting - Endpoint Management Tools Consulting Services

  • © 2002-2024 Progent Corporation. All rights reserved.