Stealth penetration testing is a vital method for allowing organizations to determine how exposed their networks are to real world threats by showing how well corporate security processes, procedures and technologies hold up against authorized but unannounced attacks by veteran security specialists using advanced hacking techniques.

Progent's security experts can perform extensive in-depth penetration testing without the knowledge of internal IT resources. Such testing uncovers whether existing security monitoring tools such as intrusion detection alerts and event log monitoring are correctly set up and actively monitored.

Penetration testing can encompass any or all of the following areas:

  • Running a series of port scanning tools to identify open network access vectors and to identify and characterize a customer's network environment and overall security level.
  • Running a series of exploit identification tools that test all open access vectors against a large database of known vulnerabilities resulting from servers that are not up to date on security patches, out of date firmware/software, poorly configured servers and devices, and default or common installation passwords.
  • Evaluation of wireless network security by attempting on-site access from publicly accessible locations including parking lots, hallways, bathrooms, and physically adjacent spaces or floors. Identification of security methods utilized by wireless infrastructure and running known exploit tools to gain access
  • Attempt to determine remote access capabilities of network and perform exploit and brute force attack methods to gain access through remote access infrastructure.
  • Perform remote office security evaluation and testing, and determine whether remote sites can be used as a vector into the corporate network through VPNs or other private network infrastructure.
  • Performing brute force account and password attacks using a database of over 40 million possible passwords
  • For devices and servers that are successfully penetrated, Progent security experts will manually use assorted hacker techniques to extend such exploit vectors to gain an understanding of the full network environment and see how many internal systems can be accessed and compromised. This type of security testing can expose the full scope of the vulnerability of a network environment.
  • Determination of internal and external network addressing configuration through email beaconing techniques
  • Performing various Denial of Service attacks, coordinated with internal senior management to determine whether it is possible to stop or hinder network productivity. Once proof of impact is reported, such testing can be immediately ceased to avoid impact to actual business productivity.
  • Perform PBX remote access and voice mail security testing
For larger companies, Progent can perform anonymous physical security penetration testing, including attempts to gain unauthorized/unchecked access to physical premises by pretending to be authorized personnel, with proof of success from copying of confidential information and accessing internal network resources behind all perimeter firewalls.

Progent experts can use social engineering techniques and public information to attempt customized password penetration testing utilizing information such as employees' family member names, birthdates, home addresses, and phone numbers. Progent team members can often quickly uncover this information through Internet online search and public records. Progent can uncover employee names/email addresses through publicly accessible information on the Internet, from PBX voice mail directories, public records filings, marketing materials and press releases, web sites, and receptionist.

Progent will provide a complete report of methods used and vulnerabilities uncovered during stealth penetration testing, along with a detailed list of recommended remediation steps. Progent can then work with internal IT staff to perform an audit and evaluation of the actual security protection, configuration, tools, and processes and help your company develop a comprehensive security plan.

ProSight Low-Cost Managed Services for Information Assurance
Progent's affordable ProSight family of managed services is intended to provide small and mid-size businesses with enterprise-class support and state-of-the-art technology for all aspects of information assurance and compliance. Managed services offered by Progent include:

  • ProSight Active Security Monitoring: Endpoint Protection and Ransomware Defense
    Progent's ProSight Active Security Monitoring is an endpoint protection service that utilizes next generation behavior machine learning tools to guard endpoints as well as physical and virtual servers against modern malware assaults like ransomware and file-less exploits, which routinely escape traditional signature-matching anti-virus tools. ProSight Active Security Monitoring protects local and cloud resources and offers a single platform to address the complete malware attack progression including protection, identification, containment, cleanup, and forensics. Key capabilities include one-click rollback with Windows Volume Shadow Copy Service and real-time network-wide immunization against newly discovered attacks. Read more about Progent's ProSight Active Security Monitoring endpoint protection and ransomware recovery.

  • ProSight Enhanced Security Protection (ESP): Unified Physical and Virtual Endpoint Protection
    ProSight Enhanced Security Protection services offer ultra-affordable in-depth protection for physical servers and virtual machines, desktops, mobile devices, and Microsoft Exchange. ProSight ESP utilizes adaptive security and advanced machine learning for continuously monitoring and responding to security threats from all vectors. ProSight ESP provides firewall protection, penetration alarms, endpoint management, and web filtering via cutting-edge tools packaged within a single agent managed from a unified console. Progent's security and virtualization experts can help your business to design and configure a ProSight ESP deployment that addresses your organization's specific requirements and that helps you achieve and demonstrate compliance with legal and industry data protection regulations. Progent will assist you specify and implement policies that ProSight ESP will manage, and Progent will monitor your IT environment and respond to alerts that require urgent attention. Progent's consultants can also help your company to set up and verify a backup and restore solution such as ProSight Data Protection Services (DPS) so you can get back in business quickly from a destructive security attack like ransomware. Read more about Progent's ProSight Enhanced Security Protection (ESP) unified physical and virtual endpoint protection and Exchange email filtering.

  • ProSight Data Protection Services: Managed Backup
    Progent has worked with leading backup technology companies to create ProSight Data Protection Services (DPS), a family of offerings that provide backup-as-a-service. All ProSight DPS products manage and track your data backup processes and allow non-disruptive backup and fast restoration of important files/folders, applications, images, plus Hyper-V and VMware virtual machines. ProSight DPS helps you avoid data loss caused by hardware failures, natural calamities, fire, malware like ransomware, user mistakes, malicious employees, or application glitches. Managed services available in the ProSight ProSight Data Protection selection include ProSight DPS Ataro VM Backup, ProSight Ataro Office 365 Backup, ProSight ECHO Backup based on Barracuda dedicated storage, and ProSight DPS MSP360 Cloud and On-prem Backup. Your Progent service representative can help you to determine which of these managed services are best suited for your network.

  • ProSight Email Guard: Inbound and Outbound Spam Filtering, Data Leakage Protection and Email Encryption
    ProSight Email Guard is Progent's email security solution that uses the technology of top data security companies to deliver web-based management and comprehensive security for your inbound and outbound email. The hybrid structure of Progent's Email Guard integrates cloud-based filtering with a local gateway appliance to provide complete protection against spam, viruses, Denial of Service Attacks, DHAs, and other email-borne threats. The cloud filter serves as a first line of defense and blocks most threats from making it to your network firewall. This reduces your exposure to external threats and conserves network bandwidth and storage. Email Guard's onsite security gateway device adds a further level of analysis for incoming email. For outgoing email, the onsite security gateway provides AV and anti-spam filtering, policy-based Data Loss Prevention, and email encryption. The on-premises gateway can also help Exchange Server to track and protect internal email traffic that stays inside your security perimeter. Find out more about Progent's ProSight Email Guard spam filtering, virus defense, email content filtering and data leakage prevention.

  • ProSight WAN Watch: Network Infrastructure Remote Monitoring and Management
    ProSight WAN Watch is a network infrastructure monitoring and management service that makes it simple and affordable for small and mid-sized organizations to map, monitor, reconfigure and debug their connectivity hardware such as routers and switches, firewalls, and load balancers plus servers, endpoints and other networked devices. Using cutting-edge RMM technology, WAN Watch ensures that infrastructure topology maps are always updated, copies and manages the configuration of almost all devices connected to your network, tracks performance, and sends alerts when issues are detected. By automating tedious management processes, WAN Watch can knock hours off common tasks like making network diagrams, reconfiguring your network, finding devices that need important updates, or isolating performance problems. Find out more about ProSight WAN Watch network infrastructure management services.

  • ProSight LAN Watch: Server and Desktop Monitoring
    ProSight LAN Watch is Progent’s server and desktop remote monitoring service that uses advanced remote monitoring and management technology to help keep your network running at peak levels by tracking the state of critical assets that drive your business network. When ProSight LAN Watch uncovers a problem, an alert is sent immediately to your designated IT staff and your assigned Progent consultant so that all looming issues can be resolved before they have a chance to impact productivity Learn more about ProSight LAN Watch server and desktop monitoring services.

  • ProSight Virtual Hosting: Hosted Virtual Machines at Progent's Tier III Data Center
    With ProSight Virtual Hosting service, a small organization can have its critical servers and applications hosted in a protected Tier III data center on a high-performance virtual machine host set up and maintained by Progent's IT support experts. Under the ProSight Virtual Hosting model, the client owns the data, the OS platforms, and the apps. Because the environment is virtualized, it can be moved immediately to a different hosting environment without requiring a lengthy and difficult configuration procedure. With ProSight Virtual Hosting, you are not tied one hosting provider. Find out more details about ProSight Virtual Hosting services.

  • ProSight IT Asset Management: Network Documentation Management
    ProSight IT Asset Management service is an IT infrastructure documentation management service that makes it easy to capture, update, retrieve and safeguard information related to your network infrastructure, processes, business apps, and services. You can instantly locate passwords or IP addresses and be alerted automatically about upcoming expirations of SSLs ,domains or warranties. By updating and organizing your IT documentation, you can eliminate up to 50% of time wasted looking for vital information about your network. ProSight IT Asset Management includes a centralized location for holding and collaborating on all documents related to managing your business network such as standard operating procedures and self-service instructions. ProSight IT Asset Management also offers a high level of automation for collecting and associating IT data. Whether you’re making enhancements, performing maintenance, or reacting to a crisis, ProSight IT Asset Management delivers the data you require as soon as you need it. Learn more details about ProSight IT Asset Management service.

  • Progent's Patch Management: Software/Firmware Update Management Services
    Progent's support services for software and firmware patch management provide organizations of any size a flexible and cost-effective alternative for evaluating, testing, scheduling, applying, and tracking software and firmware updates to your ever-evolving IT system. Besides maximizing the protection and reliability of your IT environment, Progent's software/firmware update management services permit your in-house IT staff to concentrate on more strategic initiatives and activities that derive maximum business value from your network. Learn more about Progent's software/firmware update management support services.

  • ProSight Duo Multi-Factor Authentication: Identity Validation, Endpoint Policy Enforcement, and Secure Single Sign-on
    Progent's Duo MFA managed services incorporate Cisco's Duo cloud technology to protect against password theft through the use of two-factor authentication. Duo enables one-tap identity confirmation on Apple iOS, Google Android, and other out-of-band devices. With 2FA, when you sign into a protected online account and give your password you are asked to confirm your identity via a device that only you possess and that is accessed using a different network channel. A broad selection of out-of-band devices can be utilized for this second form of authentication including a smartphone or wearable, a hardware token, a landline telephone, etc. You can designate multiple validation devices. To find out more about ProSight Duo two-factor identity validation services, go to Cisco Duo MFA two-factor authentication (2FA) services for access security.
ProSight Network Audits
Progent's ProSight Network Audits offer a fast and low-cost alternative for small and medium-size organizations to obtain an objective evaluation of the overall health of their IT system. Based on some of the top remote monitoring and management (RMM) platforms available, and overseen by Progent's certified group of information technology professionals, ProSight Network Audits show you how well the deployment of your essential network devices conform to industry best practices. The Basic and Advanced versions of ProSight Network Audit services are available at a low, one-time cost and deliver instant ROI such as a cleaner Active Directory (AD) system. Both versions also include one year of cutting-edge remote network monitoring and management (RMM). Benefits can include easier management, better compliance with government and industry security regulations, higher utilization of network assets, faster troubleshooting, more dependable backup and recovery, and increased uptime. See more about Progent's ProSight Network Audits network infrastructure review.

Progent's ProSight Ransomware Preparedness Report Service
The ProSight Ransomware Preparedness Report service is a low-cost service centered on a phone discussion with a Progent information assurance consultant. The interview is intended to help assess your organization's ability either to stop or recover rapidly following an assault by a ransomware strain like Ryuk, WannaCry, MongoLock, or Locky. Progent will consult with you directly to gather information about your existing AV defense and backup platform, and Progent will then produce a custom Basic Security and Best Practices Report describing how you can follow industry best practices to deploy an efficient security and backup/recovery system that meets your business requirements. For more information, refer to Progent's ProSight Ransomware Preparedness Report.

Contact Progent for Penetration Testing Consulting
For computer security consulting expertise, telephone Progent at 800-993-9400 or see Contact Progent.



An index of content::

  • 24x7 Providers Schaumburg-Elk Grove Schaumburg, Illinois Consultancy Services Group
  • 8540 wireless controller Remote Technical Support wireless controller Technology Consulting Services
  • At Home Workers Consulting Services near Aurora - Backup/Restore Systems Expertise Aurora, IL At Home Workers Consultants - Aurora - Backup Solutions Consulting Aurora
  • At Home Workforce Consulting Experts nearby Columbus - Backup/Restore Technology Guidance Muscogee County Georgia, United States Columbus Georgia, USA Telecommuters Columbus Expertise - Backup/Recovery Systems Expertise
  • Award Winning Cisco Server Migration Specialists Cisco Integration Specialists
  • CISSP Protection Miami Beach, FL Firewall Security Consulting Miami Beach
  • Chesapeake Virginia Network Consultant Suse Linux, Sun Solaris, UNIX Debian Linux, Solaris, UNIX Remote Troubleshooting Chesapeake Hampton Roads
  • Cisco Computer Outsourcing Orlando Network Security Consulting Cisco Orlando Florida
  • Consultant WannaCry Ransomware Removal Ransomware Recovery Technology Professional
  • Firewall Security Auditing Rockville-Fredrick Security Network Security Test Rockville-Montgomery County, Maryland
  • Gentoo Linux, Sun Solaris, UNIX IT Services Birmingham Red Hat Linux, Sun Solaris, UNIX IT Consulting Birmingham

  • Cisco Firepower NGFW Firewalls Technology Consulting
    Emergency Firepower NGFW Firewalls Professional

    Cisco's Firepower Next Generation Firewalls (NGFWs) provide a major performance improvement over Cisco's popular ASA 5500-X security appliances and offer centralized control of modern cybersecurity capabilities like application visibility and control, next-generation intrusion protection with risk prioritization, advanced malware protection (AMP), URL filtering, and sandboxing. Progent's Cisco CCIE-certified firewall consultants can assist you to design and carry out an efficient upgrade to Firepower Series firewalls from Cisco's legacy ASA 5500-X, ASA 5500, or PIX firewalls and help you enhance Firepower appliances with Cisco's subscription-based security services to create and centrally manage network environments that span branch offices, data centers, and cloud resources.

  • Immediate Microsoft Exchange 2010 Network Security Consulting Petaluma Sonoma County Exchange Server 2013 Information Technology Outsourcing Companies Petaluma California
  • 24-7 Cybersecurity Penetration Testing Cybersecurity Firm
  • Kansas City, KC, Missouri Technology Consultants Network Support Group Kansas City, KC, Missouri
  • Lower Manhattan Short Term IT Staffing Help Lower Manhattan-Lower Manhattan, NY, U.S.A. Immediate Supplemental Staffing Support Consulting Experts Lower Manhattan-Tribeca
  • Microsoft LCS Server Instant Messaging Support Outsourcing Consulting Microsoft Live Communications Server

  • Urgent Security Consulting Company Windows 7 Migration
    Business Computer Server Companies Windows 7 64-bit Upgrade

    Progent's Microsoft certified engineers can help you to test Windows 7 to verify application compatibility and to check its speed and stability working with your applications. Progent's consultants can also help you to assess the potential business value of moving to Microsoft Windows 7. If you decide that Microsoft Windows 7 fits your business, Progent can help your IT organization to design and carry out a smooth deployment of Windows 7 from a previous release of Microsoft Windows.

  • Microsoft T-SQL Contract Programming SQL 2008 Reporting Services Contract Programmer
  • Minneapolis At Home Workforce IP Voice Solutions Assistance Minneapolis, MN Minneapolis Remote Workers IP Voice Solutions Assistance Minneapolis Hennepin County
  • Mountain View Online Troubleshooting Los Altos Remote Support
  • Cybersecurity Penetration Testing Security Auditing
  • Network Specialists Cisco Sausalito, CA 24x7 Cisco installation and Administration San Rafael, CA
  • New Haven WannaCry Crypto-Ransomware Forensics Analysis New Haven Hermes Ransomware Forensics New Haven Connecticut

  • Microsoft and Mac Desktop Network Specialists
    Microsoft Desktop Computer Service Providers

    Progent can deliver a wide array of affordable services to help your business to deploy, integrate, troubleshoot, and administer workstations and notebooks powered by Microsoft Windows, macOS and OS X, or popular editions of Linux. Progent can offer onsite or online assistance for individual machines or notebooks or help you to design and implement a large-scale migration to new or revised operating system platforms and applications. Progent can also provide consultants and technical workers to help you to prepare for and complete an office move or consolidation organized to produce minimal interruption to your productivity.

  • Omaha, Nebraska Consolidation Omaha, Nebraska System Consulting

  • Security Company Symantec VPN
    Symantec VelociRaptor Technology Consulting Services

    Progent's Symantec experts can help you maintain discontinued Symantec firewall and Symantec VPN products such as the Raptor and VelociRaptor line or help you upgrade to more recent firewall/VPN technology. Progent can also help you create and execute a comprehensive security plan that can incorporate firewall and VPN appliances and utilities, managed security and virus defense services, server and application monitoring software, and documented policies and enforcement procedures. Progent has the expertise to be your one-stop resource for on-going technical support, administration, training, and security consulting.

  • Remote Work from Home Employees Austin Consultants - Connectivity Consulting Austin Teleworkers Austin Expertise - Integration Consulting Austin, TX
  • Remote Workforce Consulting and Support Services near Hayward - VoIP Solutions Consulting Experts Union City, CA Work at Home Employees Consulting Experts in Hayward - VoIP Technology Consultants
  • SQL Server 2012 Technology Consulting Company Microsoft SQL Server 2016 Network Service Carlsbad-Temecula, CA
  • Sandy Springs-Cobb County Tech Support BlackBerry Software BlackBerry Email Network Help Sandy Springs GA

  • Cisco EWC for Catalyst 9100 AP Remote Support Services
    Catalyst Wi-Fi 6 AP Planning Troubleshooting

    Progent's Cisco-certified Catalyst 9100 Series 802.11ax Wi-Fi 6 Wireless Access Point experts offer affordable remote and on-premises support for Catalyst Wi-Fi 6 wireless APs.

  • SharePoint Server 2019 Help and Support Allegheny County Pennsylvania SharePoint Consulting Services Pittsburgh, PA
  • Stamford At Home Workforce Stamford Consulting and Support Services - Voice/Video Conferencing Solutions Assistance Fairfield County Connecticut Work at Home Employees Consultants nearby Stamford - Video Conferencing Solutions Consulting
  • Teleworkers Assistance near me in Wilmington - Cloud Integration Solutions Guidance Wilmington, Delaware Wilmington Offsite Workforce Cloud Integration Solutions Guidance Wilmington-New Castle
  • Top Rated Work from Home Employees Consulting and Support Services - Montgomery - Integration Consulting and Support Services Montgomery, AL, U.S.A. Montgomery Telecommuters Infrastructure Consulting Services Montgomery Alabama
  • Uberlândia, State of Minas Gerais Biggest Uberlândia Staffing Help Uberlândia IT Staff Temps for IT Support Organizations

  • Information Technology Consulting CISSP Certified
    CISSP Certified Security Auditor Professional

    Progent's CISSP-certified cybersecurity consultants can help businesses of any size with any aspect of IT security. Progent can implement efficient cybersecurity systems that guard a small office from modern threats or Progent can design, configure, and manage an end-to-end security environment for hybrid networks that accommodate onsite, online, and mobile clients sharing IT resources distributed over multiple physical sites and public and private clouds.

  • Vacaville IT Consulting Group Solano County Software Consultant
  • Virginia Beach South Hampton Roads Small Business IT Outsourcing Company Exchange Server 2010 Virginia Beach Outsource IT Exchange 2010 Server

  • Small Business IT Outsourcing Engineers
    CIO Outsourcing Engineers

    Progent is organized provide comprehensive remote support for all major technical areas common to small company IT systems and offers a variety of strategic, on-demand services including a temporary Chief Information Officer to offer senior-level planning and negotiating capability, a Call Center for help desk support, proactive remote monitoring, spam and email-borne virus protection as a managed service, project management for major projects like site moves orOS migrations, Cisco-certified consultants for building and maintaining fast and reliable infrastructure, certified security engineers to ensure information protection and compliance, disaster recovery experts to design and document business continuity plans, and software programmers to write, enhance, or repair business applications.

  • Vitória Ransomware Computer-Malware Susceptibility Vitória Crypto-Ransomware Sodinokibi Susceptibility Evaluation Vitoria
  • Wave 2 Wi-Fi controller Configuration Support wi-fi controller
  • Windows 2008 Server Network Security Consultants Madison Baraboo 24 Hour Windows Server 2016 Small Business IT Outsourcing

  • ASA 5500-X Firewall with Firepower Consultant
    Support Cisco ASA 5500-X Firewall

    The current Cisco ASA 5500-X Series Next-Generation Firewalls with Firepower Services offer significantly more value than Cisco's earlier PIX and ASA 5500 firewalls and have superseded the ASA 5500 and PIX 500 firewalls for all new deployments. Progent's Cisco-premier CCIE network consultants can assist you to maintain your current PIX or Cisco ASA 5500 firewalls and migrate efficiently to Cisco ASA 5500-X firewalls with Firepower Services. Progent can also assist your business to plan, configure, tune, manage and debug firewall solutions built on Cisco ASA 5500-X firewalls with Firepower Services.


    © 2002-2022 Progent Corporation. All rights reserved.