Stealth penetration testing is a vital method for allowing organizations to determine how exposed their networks are to real world threats by showing how well corporate security processes, procedures and technologies hold up against authorized but unannounced attacks by veteran security specialists using advanced hacking techniques.

Progent's security experts can perform extensive in-depth penetration testing without the knowledge of internal IT resources. Such testing uncovers whether existing security monitoring tools such as intrusion detection alerts and event log monitoring are correctly set up and actively monitored.

Penetration testing can encompass any or all of the following areas:

  • Running a series of port scanning tools to identify open network access vectors and to identify and characterize a customer's network environment and overall security level.
  • Running a series of exploit identification tools that test all open access vectors against a large database of known vulnerabilities resulting from servers that are not up to date on security patches, out of date firmware/software, poorly configured servers and devices, and default or common installation passwords.
  • Evaluation of wireless network security by attempting on-site access from publicly accessible locations including parking lots, hallways, bathrooms, and physically adjacent spaces or floors. Identification of security methods utilized by wireless infrastructure and running known exploit tools to gain access
  • Attempt to determine remote access capabilities of network and perform exploit and brute force attack methods to gain access through remote access infrastructure.
  • Perform remote office security evaluation and testing, and determine whether remote sites can be used as a vector into the corporate network through VPNs or other private network infrastructure.
  • Performing brute force account and password attacks using a database of over 40 million possible passwords
  • For devices and servers that are successfully penetrated, Progent security experts will manually use assorted hacker techniques to extend such exploit vectors to gain an understanding of the full network environment and see how many internal systems can be accessed and compromised. This type of security testing can expose the full scope of the vulnerability of a network environment.
  • Determination of internal and external network addressing configuration through email beaconing techniques
  • Performing various Denial of Service attacks, coordinated with internal senior management to determine whether it is possible to stop or hinder network productivity. Once proof of impact is reported, such testing can be immediately ceased to avoid impact to actual business productivity.
  • Perform PBX remote access and voice mail security testing
For larger companies, Progent can perform anonymous physical security penetration testing, including attempts to gain unauthorized/unchecked access to physical premises by pretending to be authorized personnel, with proof of success from copying of confidential information and accessing internal network resources behind all perimeter firewalls.

Progent experts can use social engineering techniques and public information to attempt customized password penetration testing utilizing information such as employees' family member names, birthdates, home addresses, and phone numbers. Progent team members can often quickly uncover this information through Internet online search and public records. Progent can uncover employee names/email addresses through publicly accessible information on the Internet, from PBX voice mail directories, public records filings, marketing materials and press releases, web sites, and receptionist.

Progent will provide a complete report of methods used and vulnerabilities uncovered during stealth penetration testing, along with a detailed list of recommended remediation steps. Progent can then work with internal IT staff to perform an audit and evaluation of the actual security protection, configuration, tools, and processes and help your company develop a comprehensive security plan.

ProSight Fixed-price Managed Services for Information Assurance
Progent's value-priced ProSight family of outsourced network management services is designed to provide small and mid-size organizations with enterprise-class support and state-of-the-art technology for all facets of information assurance and compliance. Managed services available from Progent include:

  • ProSight Active Security Monitoring (ASM): Next Generation Endpoint Protection and Ransomware Defense
    ProSight Active Security Monitoring (ASM) is an endpoint protection service that incorporates cutting edge behavior analysis tools to defend endpoints and physical and virtual servers against modern malware assaults such as ransomware and file-less exploits, which routinely evade traditional signature-based AV tools. ProSight Active Security Monitoring safeguards on-premises and cloud-based resources and offers a unified platform to automate the complete threat lifecycle including protection, identification, mitigation, cleanup, and forensics. Key capabilities include one-click rollback using Windows VSS and automatic network-wide immunization against new attacks. Find out more about Progent's ProSight Active Security Monitoring (ASM) endpoint protection and ransomware defense.

  • ProSight Enhanced Security Protection: Unified Physical and Virtual Endpoint Protection
    ProSight Enhanced Security Protection managed services offer economical multi-layer protection for physical servers and VMs, workstations, mobile devices, and Exchange email. ProSight ESP uses contextual security and advanced heuristics for round-the-clock monitoring and reacting to security assaults from all attack vectors. ProSight ESP delivers firewall protection, penetration alarms, endpoint control, and web filtering via leading-edge tools packaged within one agent accessible from a single console. Progent's data protection and virtualization consultants can assist you to plan and configure a ProSight ESP deployment that addresses your organization's specific requirements and that helps you prove compliance with government and industry data protection regulations. Progent will assist you specify and implement policies that ProSight ESP will manage, and Progent will monitor your network and react to alarms that call for urgent action. Progent's consultants can also assist you to install and test a backup and disaster recovery system like ProSight Data Protection Services (DPS) so you can get back in business quickly from a potentially disastrous security attack like ransomware. Read more about Progent's ProSight Enhanced Security Protection (ESP) unified endpoint security and Microsoft Exchange filtering.

  • ProSight DPS: Managed Cloud Backup
    ProSight Data Protection Services from Progent offer small and mid-sized businesses a low cost end-to-end service for reliable backup/disaster recovery (BDR). For a low monthly cost, ProSight DPS automates your backup activities and enables rapid restoration of critical files, applications and VMs that have become unavailable or damaged as a result of component breakdowns, software glitches, disasters, human error, or malicious attacks such as ransomware. ProSight Data Protection Services can help you protect, retrieve and restore files, folders, apps, system images, plus Microsoft Hyper-V and VMware images/. Important data can be backed up on the cloud, to an on-promises storage device, or to both. Progent's BDR consultants can deliver world-class expertise to set up ProSight Data Protection Services to comply with regulatory standards such as HIPPA, FIRPA, PCI and Safe Harbor and, whenever necessary, can help you to recover your business-critical data. Find out more about ProSight DPS Managed Backup.

  • ProSight Email Guard: Spam Filtering, Data Leakage Protection and Content Filtering
    ProSight Email Guard is Progent's email security solution that incorporates the services and infrastructure of top data security vendors to provide web-based control and world-class security for your inbound and outbound email. The powerful structure of Email Guard integrates cloud-based filtering with a local security gateway device to provide advanced protection against spam, viruses, Denial of Service (DoS) Attacks, Directory Harvest Attacks (DHAs), and other email-borne malware. The Cloud Protection Layer serves as a first line of defense and keeps the vast majority of threats from reaching your security perimeter. This reduces your exposure to external attacks and conserves network bandwidth and storage. Email Guard's onsite gateway device provides a further level of analysis for incoming email. For outbound email, the local security gateway offers anti-virus and anti-spam protection, protection against data leaks, and encryption. The onsite gateway can also help Exchange Server to track and safeguard internal email traffic that stays within your corporate firewall. Learn more about Progent's ProSight Email Guard spam filtering, virus defense, email content filtering and data loss protection.

  • ProSight WAN Watch: Infrastructure Remote Monitoring and Management
    Progentís ProSight WAN Watch is an infrastructure monitoring and management service that makes it easy and affordable for small and mid-sized businesses to diagram, track, reconfigure and debug their connectivity appliances such as routers, firewalls, and load balancers as well as servers, endpoints and other devices. Incorporating cutting-edge RMM technology, WAN Watch ensures that infrastructure topology diagrams are always current, copies and displays the configuration of virtually all devices on your network, monitors performance, and generates notices when problems are discovered. By automating complex management and troubleshooting activities, ProSight WAN Watch can cut hours off ordinary chores such as network mapping, reconfiguring your network, finding appliances that require important software patches, or identifying the cause of performance bottlenecks. Learn more about ProSight WAN Watch network infrastructure monitoring and management services.

  • ProSight LAN Watch: Server and Desktop Remote Monitoring and Management
    ProSight LAN Watch is Progentís server and desktop monitoring service that incorporates advanced remote monitoring and management (RMM) techniques to help keep your IT system running efficiently by tracking the state of vital computers that drive your business network. When ProSight LAN Watch uncovers an issue, an alert is sent automatically to your specified IT management personnel and your assigned Progent engineering consultant so any potential problems can be addressed before they can impact productivity Learn more details about ProSight LAN Watch server and desktop monitoring services.

  • ProSight Virtual Hosting: Hosted VMs at Progent's World-class Data Center
    With ProSight Virtual Hosting service, a small or mid-size business can have its key servers and apps hosted in a secure fault tolerant data center on a high-performance virtual machine host set up and managed by Progent's network support experts. With the ProSight Virtual Hosting model, the customer owns the data, the OS platforms, and the apps. Since the environment is virtualized, it can be ported easily to an alternate hosting environment without a time-consuming and difficult configuration process. With ProSight Virtual Hosting, you are not locked into a single hosting provider. Find out more details about ProSight Virtual Hosting services.

  • ProSight IT Asset Management: Network Infrastructure Documentation Management
    ProSight IT Asset Management service is an IT infrastructure documentation management service that allows you to capture, update, find and safeguard data related to your IT infrastructure, processes, applications, and services. You can instantly find passwords or IP addresses and be alerted about upcoming expirations of SSLs or domains. By cleaning up and managing your network documentation, you can eliminate up to 50% of time wasted trying to find vital information about your IT network. ProSight IT Asset Management includes a centralized repository for holding and collaborating on all documents related to managing your business network such as standard operating procedures (SOPs) and self-service instructions. ProSight IT Asset Management also offers advanced automation for collecting and relating IT data. Whether youíre making improvements, doing regular maintenance, or reacting to an emergency, ProSight IT Asset Management delivers the data you require when you need it. Learn more about Progent's ProSight IT Asset Management service.
ProSight Network Audits
Progent's ProSight Network Audits offer a fast and affordable way for small and medium-size organizations to get an objective evaluation of the overall health of their information system. Based on a selection of the top remote monitoring and management (RMM) platforms in the industry, and overseen by Progent's world-class group of information technology experts, ProSight Network Audits help you see how well the deployment of your essential network assets conform to industry best practices. The Basic and Advanced options for ProSight Network Audit services are available at a low, one-time cost and deliver instant benefits such as a more manageable Active Directory environment. Both also come with one year of cutting-edge remote network monitoring and management. Benefits can include simpler management, improved compliance with government and industry security regulations, higher utilization of IT resources, faster troubleshooting, more dependable backup and restore, and less downtime. See more about ProSight Network Audits IT infrastructure review.

Progent's ProSight Ransomware Preparedness Report Service
Progent's ProSight Ransomware Preparedness Report service is a low-cost service based on a brief discussion with a Progent backup/recovery consultant. The fact-finding interview is designed to assess your organization's preparedness either to block or recover rapidly following an attack by a ransomware variant such as Ryuk, WannaCry, NotPetya, or Locky. Progent will work with you personally to collect information about your current antivirus tools and backup platform, and Progent will then produce a written Basic Security and Best Practices Report describing how you can follow industry best practices to create an efficient security and backup environment that aligns with your company's needs. For additional information, see The ProSight Ransomware Preparedness Report.

Contact Progent for Penetration Testing Consulting
If you want computer security consulting, call Progent at 800-993-9400 or go to Contact Progent.



An index of content::

  • 24/7/365 BlackBerry Desktop Manager Integration Consultant Lynnwood-Edmonds, Washington RIM BlackBerry Systems Support Lynnwood-Edmonds, WA
  • 24x7 Remote Workers Broomfield Consulting Experts - Setup Consulting Broomfield Teleworkers Infrastructure Assistance Broomfield-Thornton, Colorado
  • 24x7x365 Technical Support Services Fedora Linux, Solaris, UNIX Southlake-Irving, TX Fedora Linux, Solaris, UNIX Setup and Support Southlake-Irving, Texas
  • At Home Workers Consulting Experts in Seattle - Cybersecurity Systems Consulting Seattle At Home Workers Cybersecurity Solutions Assistance Seattle Washington
  • MCSE Expert Certified Penetration Testing Security Certification
  • At Home Workforce Assistance in Portland - Help Desk Call Center Augmentation Consulting Services Portland At Home Workers Portland Consulting and Support Services - Call Desk Solutions Consulting Services Portland
  • At Home Workforce Consultants in Washington - Cloud Systems Consulting Washington DC DC Washington Teleworkers Cloud Systems Consultants
  • Award Winning Dublin System Consultants Network Setup Dublin
  • Beverly Hills-West Hollywood Beverly Hills Work from Home Employees Infrastructure Consulting Services Beverly Hills Telecommuters Integration Consulting Services Beverly Hills-West Hollywood, CA

  • Remote Support Spotlight and Outlook for Mac
    Urgent Outlook for Mac Consultants

    Microsoft Exchange and Macintosh computers can co-exist efficiently. Progent's Apple and Microsoft premier consultants can help you install Microsoft Entourage and Microsoft Exchange Server so your Mac users are able to work closely with teammates who run Microsoft Outlook. With Exchange and Entourage for Mac, Exchange and Apple Macintosh systems can coexist, allowing Mac users to receive and transmit messages, search the GAL, import addresses, sync up calendars, and invite fellow workers to conferences with your Microsoft Exchange account. Progent will verify that your Microsoft Server is properly configured and that LDAP and Outlook Web connectivity are working. Progent also can provide customized onsite Entourage training.

  • Biggest Telecommuters Palo Alto Consulting Experts - Backup/Restore Technology Consulting and Support Services Atherton CA Urgent Palo Alto Offsite Workforce Backup/Restore Systems Assistance East Palo Alto
  • BlackBerry Enterprise Server Service Providers El Paso BlackBerry Exchange Help Center El Paso, Fort Bliss

  • 24-7 Small Business WAPs Specialist
    CCIE Certified Consultants Small Business Wireless AP

    Progent's Cisco-certified wireless technology consultants can assist organizations to configure, administer, and debug Cisco Small Business 100/300/500 Wireless Access Points.

  • CentOS Linux, Sun Solaris, UNIX Troubleshooting The Woodlands Mandrake Linux, Solaris, UNIX Configuration The Woodlands
  • Chandler At Home Workforce Call Desk Solutions Expertise Chandler, Maricopa County Telecommuters Chandler Assistance - Call Desk Augmentation Consulting Experts Chandler Tempe Mesa Gilbert
  • Chandler Work from Home Employees Cloud Systems Expertise Chandler, Maricopa County Remote Workforce Chandler Consulting Experts - Cloud Systems Consultants Chandler Arizona

  • Emergency Microsoft Office 2000 Repair Installation
    Top Rated Microsoft Office 2003 Computer Firms

    To provide economical IT services for small businesses, Progent has developed comprehensive computer outsourcing packages that give small offices fast access to technical expertise without requiring you to recruit, train, and manage a large full-time IT staff. Progentís IT outsourcing services offer you an affordable alternative for creating a protected and reliable environment for your important Windows business productivity suites including Microsoft Office XP and Office 2003.

  • Columbia, SC, Charleston, SC, Rock Hill, SC, Greenville, SC Cisco Install 24-7 Cisco Computer Consulting Company South Carolina - Columbia, SC, Charleston, SC, Rock Hill, SC, Greenville, SC
  • Configuration Services BlackBerry Professional Software Ronald Reagan Washington Airport DCA BlackBerry Computer Network Consultants Washington DC

  • Remote Support Offsite Workforce Cybersecurity
    Offsite Workers Cybersecurity Consultant Services

    Progent can help small and mid-size businesses to configure cybersecurity protection systems and provide response expertise required for at-home workers.

  • Stealth Penetration Testing Security Consulting
  • Consulting for IT Service Firms - Waltham - Transparent Short-Term Staff Assistance Waltham-Newton Consulting for Computer Support Providers - Waltham - Short-Term Support Team Augmentation Waltham-Hyde Park, Massachusetts
  • Penetration Testing Cybersecurity Contractors
  • Database Applications Specialist Online Support RDBMS

  • 24/7/365 Microsoft Project Server Outsourced Programming
    Project Server Programmer

    Progent's Microsoft-certified consultants offer in-depth support in implementing, using and troubleshooting any edition of Microsoft Project Server and can deliver a broad range of cost-effective remote consulting services based on industry best practices to assist organizations of all sizes to get all the benefits of this powerful project management solution. Services available from Progent include system design, installation and upgrades, strategies for safe collaboration among local and remote or mobile users, network optimization, and specialized webinar training classes.

  • Duval County Florida BlackBerry BES Consulting Services BlackBerry Enterprise Server Network Engineers Jacksonville, FL
  • Edison Short Term IT Staffing Support Services Edison-Piscataway Emergency Temporary IT Support Staffing Services Consulting Support Edison-Mercer County, New Jersey
  • Exchange Consulting Service Firm Southlake-Grapevine , Texas Southlake-Grand Prairie, TX Urgent Microsoft Exchange 2010 Management
  • CISA Certified Security Expert Stealth Penetration Testing Security Consultancies
  • Exchange Server 2010 Support and Help Exchange Server 2010 Integration Online Help
  • Gilroy Server Help IT Outsourcing Firms Morgan Hill
  • Hosting Online Troubleshooting Remote Co-Location Technical Consultant

  • Award Winning Meraki Wireless Access Point Setup and Support
    Meraki Outdoor APs Remote Troubleshooting

    Progent's Cisco-certified wireless networking experts can provide remote and onsite consulting and troubleshooting services to help your organization to design, install, manage, tune, and repair Wi-Fi deployments that incorporate Cisco's Meraki access points. Progent's consultants can also help your organization to design and implement hybrid environments that integrate on-premises and cloud-hosted resources and that provide seamless connectivity, enhanced security and compliance, streamlined management, and consistent operation for all your mobile and desktop devices.

  • IT Outsourcing Small Business Computer Consulting Firms Microsoft and Cisco Migration Company Lancaster Antelope Valley
  • Kansas City, Jackson County Exchange Server 2016 Server Install Specialists Exchange 2010 Server Kansas City, Jackson County
  • Knoxville Software Security Consultant Knoxville System Support
  • Stealth Penetration Testing Security Services
  • Largest Small Business Computer Consulting Group Cisco Billings, Missoula, Great Falls, MT Cisco Network Support Technician Montana

  • Amazon MWS integration Programming Companies
    Programming Firm Amazon Marketplace Web Service development training

    Amazon Marketplace Web Service (Amazon MWS) is a collection of APIs that allows Amazon sellers to improve the efficiency of their operations by automating key sales activities such as listings, orders, shipments, inbound and outbound fulfillment, and reports. By tapping into Amazon's vast online ecosystem and automating their sales, merchants can broaden their reach, lower their operating costs, improve response time to customers, and increase their bottom line. Progent's Amazon Marketplace Web Service developers can collaborate with your development staff and provide application programming, workflow integration, project management support, and mentoring so you can shorten development time and get to market quickly.

  • Lawrence-Hillsborough County, Massachusetts SharePoint Server 2007 IT Services Microsoft SharePoint Computer Consultant Lawrence-Essex County
  • MS Dynamics NAV ERP Remote Consulting Enterprise Resource Planning Engineer
  • Mac OS X Training Microsoft Outlook for Mac Training Professional

  • Linux Online Consultants
    UNIX Online Network Consult

    Progent offers nationwide urgent help and consulting services for businesses that run Solaris environments or whose IT systems feature a mix of Sun Solaris and Microsoft technology. Remote technical support provides maximum return for your IT dollar by extending user productivity and limiting the hours billed for network analysis and repair. Advanced online support technology and skilled technicians and engineers combine to enable Progent to solve the majority of IT issues without squandering time and expense by traveling to your location. In most of cases your network issues can be remediated over the phone or via a combination of telephone support and remote access. Progent can put you in touch with Cisco certified CCIE infrastructure experts and CISA certified security specialists to assist with the toughest system issues.

  • Microsoft Windows Server 2016 Technical Support Firm Cleveland, OH Cleveland Ohio Microsoft Windows Server 2019 IT Outsourcing Company
  • Minneapolis Consulting Experts for IT Service Companies Minneapolis Saint Paul Consulting for Minneapolis Computer Support Firms Minneapolis Saint Paul
  • Office Word for Android Consulting Office Word 2016 Specialists
  • Offsite Workforce Assistance near me in Las Vegas - Help Desk Call Center Augmentation Guidance Las Vegas, Clark County Las Vegas Work at Home Employees Help Desk Call Center Outsourcing Consulting Services Las Vegas Nevada
  • Offsite Workforce Pleasanton Consulting - Conferencing Systems Consulting Experts Livermore, CA Remote Workforce Consultants nearby Pleasanton - Conferencing Technology Consulting Livermore, CA
  • Offsite Workforce San Mateo Consulting - Endpoint Management Tools Consulting Burlingame CA After Hours At Home Workforce Guidance in San Mateo - Endpoint Management Solutions Consulting Foster City, CA
  • Penetration Testing Information Technology Consulting
  • Online Support Services Cisco Charlotte Cisco Outsourcing Firm Charlotte, Mecklenburg County
  • Portland International Airport PDX Top SharePoint Server 2019 Technology Consulting Top Outsourcing SharePoint 2013 Portland - Gresham
  • ProSight Email Content Filtering Professionals Consulting Services ProSight Email Guard AES Encryption
  • Information Technology Consulting Stealth Penetration Testing
  • Professionals Cisco Boise City, ID, Pocatello, ID, Idaho Falls, ID, Lewiston, ID Idaho Largest Cisco System Support
  • Remote Workers Consulting and Support Services near me in Phoenix - Integration Consulting Phoenix - Paradise Valley - Tempe At Home Workers Consultants in Phoenix - Support Expertise Phoenix Valley of the Sun

  • External Security Inventory Technology Professional
    Internal Security Inventory Services

    Progent provides small businesses two specially designed security inventory scanning packages that include, for a preset price, remotely managed scans of your network security profile which are analyzed by expert security specialists who interpret the data collected by the scan, deliver objective summaries of your current network security, and offer suggestions for remediation. Progent has developed two non-overlapping security evaluation scanning packages for external and internal security scanning that are priced to meet the restricted budgets of small companies while offering enterprise-quality evaluations of your network's exposure to assault.

  • Richmond 24-7 CentOS Linux, Solaris, UNIX Computer Consultant Richmond Virginia Red Hat Linux, Solaris, UNIX Information Technology Consulting
  • SQL 2014 Assessment Mobile Alabama Mobile Alabama Microsoft SQL 2014 Outsourcing Technical Support
  • Salt Lake City CryptoLocker Recovery Consulting Summit County Utah 24x7 Salt Lake City Crypto Recovery Salt Lake City
  • Santa Cruz, CA Online Consulting Santa Cruz-Pacific Grove Service Providers
  • Security Firewall Configure Urgent Firewall Network Consultant Santa Cruz California
  • SharePoint 2010 Technical Support Microsoft SharePoint 2010 Computer Consultant Norfolk Virginia Beach
  • SharePoint 2013 Remote Support Wichita, Sedgwick County Outsourcing SharePoint Server 2019 Wichita, Sedgwick County
  • SharePoint 2013 eDiscovery Center Configuration SharePoint Foundation Technical Support
  • Support Services Fedora Linux, Solaris, UNIX Mission Viejo Redhat Linux, Solaris, UNIX Online Help Mission Viejo-Laguna Hills, California
  • Teleworkers Expertise - Sacramento - Security Systems Consultants At Home Workers Sacramento Consultants - Cybersecurity Solutions Consultants Sacramento Airport SMF
  • Teleworkers Southfield Assistance - Cybersecurity Systems Assistance Southfield-Livonia, Michigan Southfield At Home Workforce Network Security Systems Expertise Southfield-Detroit
  • Top Offsite Workforce Consulting Services nearby Irvine - Conferencing Systems Consulting and Support Services Irvine California Remote Workers Irvine Consulting Services - Video Conferencing Systems Assistance Irvine Newport Beach California
  • Virginia Beach, Norfolk, Chesapeake, VA Technical Support Outsource Cisco Server Migration Specialists Cisco Virginia Beach Virginia
  • Windows Server Essentials Launchpad Consult Windows Server Essentials Compliance Engineers
  • Work from Home Employees Consultants near me in Skokie - Voice/Video Conferencing Solutions Consultants Skokie-Lincolnwood, IL Skokie-Lincolnshire, Illinois Skokie Work at Home Employees Voice/Video Conferencing Systems Consulting Services

  • © 2002-2020 Progent Corporation. All rights reserved.