Penetration testing (PEN testing) is a vital method for allowing organizations to determine how exposed their networks are to real world threats by showing how well corporate security processes, procedures and technologies hold up against announced or unannounced attacks by veteran security specialists using advanced hacking techniques. Progent can provide a one-time pentest or run scheduled or continual pentests delivered as a remotely managed service.
Progent's security experts can perform extensive in-depth penetration testing without the knowledge of internal IT staff. Such testing, known as stealth pentesting, uncovers whether existing security monitoring tools such as intrusion detection alerts and event log monitoring are correctly set up and actively monitored.
Penetration testing can encompass any or all of the following areas:
- Running a series of port scanning tools to identify open network access vectors and to characterize a customer's network environment and overall security level.
- Running a series of exploit identification tools that test all open access vectors against a large database of known vulnerabilities resulting from servers that are not up to date on security patches, out of date firmware/software, poorly configured servers and devices, and default or common installation passwords.
- Evaluation of wireless network security by attempting on-site access from publicly accessible locations including parking lots, hallways, bathrooms, and physically adjacent spaces or floors. Identification of security methods utilized by wireless infrastructure and running known exploit tools to gain access.
- Attempting to determine remote access capabilities of the network and perform exploit and brute force attack methods to gain access through remote access infrastructure.
- Performing remote office security evaluation and testing, and determine whether remote sites can be used as a vector into the corporate network through VPNs or other private network infrastructure.
- Performing brute force account and password attacks using a database of over 40 million possible passwords.
- For devices and servers that are successfully penetrated, Progent security experts will manually use assorted hacker techniques to extend such exploit vectors to gain an understanding of the full network environment and see how many internal systems can be accessed and compromised. This type of security testing can expose the full scope of the vulnerability of a network environment.
- Determining internal and external network addressing configuration through email beaconing techniques.
- Performing various Denial of Service (DoS) attacks, coordinated with internal senior management to determine whether it is possible to stop or reduce network throughput. Once proof of impact is reported, such testing can be immediately terminated to avoid impacting business productivity.
- Performing PBX remote access and voice mail security testing.
- Continuous autonomous PEN testing to map your internal/external attack surface and to identify ways that vulnerabilities, improper configurations, stolen credentials, missing patches, and unsound product defaults can be chained together by threat actors into the multi-vector attacks common to modern strains of ransomware. The NodeZero product from Horizon3.ai is an example of a next-generation penetration testing platform powered by AI technology that can be run continuously to assess, tune, repair, and confirm the security posture of networks of any size in order to provide a high level of protection against modern cyberthreats like ransomware.
Progent experts can use social engineering techniques and public information to attempt customized password penetration testing utilizing information such as employees' family member names, birthdates, home addresses, and phone numbers. Progent team members can often quickly uncover this information through Internet online search and public records. Progent can uncover employee names/email addresses through publicly accessible information on the Internet, from PBX voice mail directories, public records filings, marketing materials and press releases, web sites, and receptionist.
Progent will provide a complete report of methods used and vulnerabilities uncovered during stealth penetration testing, along with a detailed list of recommended remediation steps. Progent can then work with internal IT staff to perform an audit and evaluation of the actual security protection, configuration, tools, and processes and help your company develop a comprehensive security plan.
Consulting Services for Horizon3.ai's NodeZero Pentest Platform
NodeZero from Horizon3.ai is a cutting-edge penetration test (pentest) platform that can deliver repeated, concurrent, automated testing of your internal and perimeter network so you can find, rank, fix, and verify security vulnerabilities before threat actors can exploit them. Progent's pentest experts can help you to use NodeZero to carry out thorough penetration tests of your network perimeter and your internal IT infrastructure so you can evaluate your present security profile. Progent can also help you to strengthen your existing network security and can help you to plan and implement a cohesive cybersecurity ecosystem that streamlines management and provides optimum protection for on-prem, cloud-based, and perimeter IT assets. To find out more details about Progent's vulnerability assessment services based on on NodeZero's pentest platform, refer to Consulting Support for NodeZero's PEN Test Products.
ProSight Fixed-price Managed Services for Information Assurance
Progent's affordable ProSight series of outsourced network management services is designed to provide small and mid-size organizations with enterprise-class support and cutting-edge technology for all facets of information assurance and compliance. ProSight managed services offered by Progent include:
- ProSight Active Security Monitoring: Next Generation Endpoint Protection and Ransomware Recovery
Progent's ProSight Active Security Monitoring is an endpoint protection service that incorporates SentinelOne's cutting edge behavior analysis tools to guard endpoint devices as well as physical and virtual servers against modern malware assaults like ransomware and file-less exploits, which easily evade legacy signature-matching AV tools. ProSight ASM protects on-premises and cloud resources and offers a single platform to manage the complete malware attack lifecycle including filtering, identification, mitigation, remediation, and post-attack forensics. Top capabilities include single-click rollback using Windows VSS and automatic network-wide immunization against new attacks. Progent is a SentinelOne Partner, dealer, and integrator. Find out more about Progent's ProSight Active Security Monitoring (ASM) next-generation endpoint protection and ransomware defense with SentinelOne technology.
- ProSight Enhanced Security Protection: Unified Physical and Virtual Endpoint Security
ProSight Enhanced Security Protection (ESP) managed services deliver economical in-depth security for physical and virtual servers, desktops, smartphones, and Exchange Server. ProSight ESP utilizes adaptive security and advanced heuristics for round-the-clock monitoring and reacting to cyber assaults from all vectors. ProSight ESP provides firewall protection, penetration alarms, endpoint management, and web filtering through cutting-edge technologies packaged within a single agent accessible from a single control. Progent's security and virtualization consultants can assist your business to design and configure a ProSight ESP deployment that meets your company's specific needs and that allows you demonstrate compliance with legal and industry data protection regulations. Progent will assist you specify and configure security policies that ProSight ESP will manage, and Progent will monitor your IT environment and respond to alarms that require immediate attention. Progent can also help your company to set up and test a backup and disaster recovery system like ProSight Data Protection Services (DPS) so you can get back in business rapidly from a potentially disastrous security attack like ransomware. Find out more about Progent's ProSight Enhanced Security Protection (ESP) unified physical and virtual endpoint protection and Exchange filtering.
- ProSight DPS: Managed Cloud Backup and Recovery
Progent has worked with advanced backup product vendors to produce ProSight Data Protection Services (DPS), a selection of offerings that deliver backup-as-a-service. All ProSight DPS products automate and monitor your backup operations and allow non-disruptive backup and rapid restoration of vital files, apps, images, and virtual machines. ProSight DPS helps you recover from data loss caused by hardware breakdown, natural disasters, fire, malware such as ransomware, user error, ill-intentioned employees, or software bugs. Managed backup services in the ProSight DPS portfolio include ProSight DPS Altaro VM Backup, ProSight 365 Total Backup (formerly Altaro Office 365 Backup), ProSight ECHO Backup using Barracuda purpose-built storage, and ProSight MSP360 Hybrid Backup. Your Progent consultant can help you to identify which of these managed services are best suited for your network.
- ProSight Email Guard: Inbound and Outbound Spam Filtering, Data Leakage Protection and Content Filtering
ProSight Email Guard is Progent's email filtering and encryption platform that uses the technology of top data security vendors to deliver web-based management and world-class protection for your email traffic. The powerful structure of Progent's Email Guard managed service combines cloud-based filtering with an on-premises gateway device to provide advanced defense against spam, viruses, Dos Attacks, Directory Harvest Attacks, and other email-based malware. The cloud filter acts as a preliminary barricade and keeps the vast majority of threats from reaching your security perimeter. This decreases your exposure to external threats and saves system bandwidth and storage. Email Guard's onsite security gateway device provides a deeper level of inspection for incoming email. For outbound email, the local gateway provides anti-virus and anti-spam protection, policy-based Data Loss Prevention, and encryption. The onsite security gateway can also assist Microsoft Exchange Server to track and safeguard internal email traffic that originates and ends within your corporate firewall. Learn more about Progent's ProSight Email Guard spam filtering, virus blocking, content filtering and data loss prevention.
- ProSight WAN Watch: Infrastructure Management
Progent's ProSight WAN Watch is a network infrastructure management service that makes it easy and inexpensive for smaller businesses to map, track, enhance and debug their networking hardware such as routers and switches, firewalls, and wireless controllers plus servers, endpoints and other networked devices. Incorporating cutting-edge Remote Monitoring and Management (RMM) technology, ProSight WAN Watch makes sure that network maps are always updated, copies and manages the configuration information of virtually all devices connected to your network, monitors performance, and generates alerts when issues are discovered. By automating tedious management and troubleshooting processes, ProSight WAN Watch can knock hours off common tasks such as network mapping, reconfiguring your network, finding appliances that need critical software patches, or resolving performance problems. Learn more about ProSight WAN Watch network infrastructure monitoring and management consulting.
- ProSight LAN Watch: Server and Desktop Monitoring
ProSight LAN Watch is Progent's server and desktop monitoring service that incorporates advanced remote monitoring and management (RMM) techniques to help keep your IT system operating efficiently by tracking the state of critical computers that power your business network. When ProSight LAN Watch detects a problem, an alert is transmitted automatically to your specified IT management personnel and your Progent engineering consultant so any looming issues can be resolved before they can disrupt productivity Learn more about ProSight LAN Watch server and desktop remote monitoring consulting.
- ProSight Virtual Hosting: Hosted VMs at Progent's World-class Data Center
With Progent's ProSight Virtual Hosting service, a small or mid-size business can have its critical servers and apps hosted in a protected Tier III data center on a high-performance virtual host set up and maintained by Progent's IT support experts. Under Progent's ProSight Virtual Hosting service model, the client owns the data, the OS software, and the applications. Because the environment is virtualized, it can be ported easily to an alternate hosting environment without a time-consuming and technically risky reinstallation procedure. With ProSight Virtual Hosting, your business is not tied a single hosting provider. Learn more details about ProSight Virtual Hosting services.
- ProSight IT Asset Management: Network Documentation Management
ProSight IT Asset Management service is a cloud-based IT documentation management service that makes it easy to capture, update, find and safeguard information about your network infrastructure, processes, business apps, and services. You can instantly find passwords or serial numbers and be warned about impending expirations of SSL certificates or warranties. By updating and organizing your network documentation, you can eliminate as much as 50% of time wasted looking for critical information about your IT network. ProSight IT Asset Management includes a common location for holding and collaborating on all documents related to managing your business network such as standard operating procedures and self-service instructions. ProSight IT Asset Management also offers a high level of automation for gathering and relating IT information. Whether you're making enhancements, performing maintenance, or reacting to a crisis, ProSight IT Asset Management gets you the knowledge you need when you need it. Learn more details about ProSight IT Asset Management service.
- Patch Management: Patch Management Services
Progent's managed services for software and firmware patch management provide organizations of any size a flexible and cost-effective alternative for evaluating, testing, scheduling, applying, and documenting updates to your dynamic information system. In addition to optimizing the security and reliability of your computer environment, Progent's software/firmware update management services allow your in-house IT team to focus on more strategic initiatives and activities that deliver maximum business value from your network. Read more about Progent's software/firmware update management services.
- ProSight Duo Two-Factor Authentication: Identity Validation, Endpoint Remediation, and Secure Single Sign-on
Progent's Duo MFA services utilize Cisco's Duo cloud technology to protect against password theft by using two-factor authentication. Duo enables single-tap identity verification with iOS, Android, and other out-of-band devices. With Duo 2FA, whenever you sign into a secured application and enter your password you are requested to confirm your identity via a unit that only you possess and that uses a different network channel. A wide selection of devices can be utilized as this second means of authentication including a smartphone or wearable, a hardware/software token, a landline telephone, etc. You may register multiple validation devices. For more information about Duo two-factor identity authentication services, go to Duo MFA two-factor authentication services for access security.
ProSight Network Audits
Progent's ProSight Network Audits are a fast and affordable way for small and medium-size organizations to get an objective assessment of the health of their network. Powered by some of the leading remote monitoring and management (RMM) tools available, and supervised by Progent's certified group of IT professionals, ProSight Network Audits show you how well the deployment of your core infrastructure devices adhere to industry leading practices. The Basic and Advanced versions of ProSight Network Audit services are offered at a low, one-time cost and provide instant ROI such as a cleaner Active Directory (AD) environment. Both versions also include one year of advanced remote network monitoring and management. Advantages can include easier management, improved compliance with information security requirements, more efficient utilization of network resources, quicker problem resolution, more dependable backup and recovery, and increased uptime. Read more about Progent's ProSight Network Audits IT infrastructure assessment.
Progent's ProSight Ransomware Preparedness Report Service
Progent's ProSight Ransomware Preparedness Report service is a low-cost service based on a brief interview with a Progent information assurance consultant. The interview is intended to assess your company's ability either to stop or recover quickly following an attack by a ransomware variant such as Ryuk, WannaCry, MongoLock, or Hermes. Progent will consult with you personally to collect information about your existing antivirus tools and backup/recovery system, and Progent will then produce a written Basic Security and Best Practices Report describing how you can follow best practices to create an efficient AV and backup/recovery system that meets your business needs. For details, see The ProSight Ransomware Preparedness Report Service.
Contact Progent for Penetration Testing Consulting
If you need security expertise, phone Progent at 800-993-9400 or refer to Contact Progent.
Ransomware 24x7 Hot Line: Call 800-462-8800
Progent's Ransomware 24x7 Hot Line is intended to guide you to take the time-critical first phase in responding to a ransomware assault by containing the malware. Progent's remote ransomware engineer can assist businesses to identify and quarantine infected devices and guard undamaged assets from being compromised. If your system has been breached by any version of ransomware, act fast. Get immediate help by calling Progent's Ransomware Hot Line at 800-462-8800. For more information, visit Progent's Ransomware 24x7 Hot Line.