ProSight Duo Identity Verification and Management Services
Progent's ProSight Duo family of managed services incorporates industry-leading technology from Duo, a Cisco company, to deliver two-factor authentication solutions. Two-factor authentication (2FA) is one of the foundations of modern zero-trust cybersecurity design. 2FA uses out-of-band identity validation to provide a second layer of protection beyond just passwords. This protects against the most common causes of cybersecurity breaches such as phishing, social engineering, brute-force password attacks, and stolen credentials.
Duo's single-tap Mobile Push app simplifies identity validation
Duo's push technology saves time and hassle by allowing users to verify their identity simply by tapping "Approve" on the authentication prompt on their personal smart phone or watch. This one-tap process eliminates the need to open an email or text message and transcribe a security code manually.
Progent's ProSight Duo suite consists of three subscription-based security services that build on one another. ProSight Duo MFA allows you to deploy Duo's two-factor authentication (2FA) service to protect all users while providing essential access controls, advanced management, and rapid provisioning. ProSight Duo Access includes all the features of ProSight Duo MFA plus adaptive authentication policies and extensive endpoint health monitoring. ProSight Duo Beyond adds the ability to identify corporate as distinct from personal devices, block untrusted devices, and give users secure and seamless access to your internal applications. Progent is a certified Duo Managed Service Provider and can help you design, deploy and manage a modern identity validation solution that provides the highest level of security without bogging down your users.
Two-factor Authentication
80% of security breaches involve compromised passwords. All service offerings in Progent's ProSight Duo line of access security products can do away with your sole reliance on passwords by supporting two-factor authentication. With 2FA activated, when you log into a protected online account and enter your password you are asked to verify your identity via a device that only you possess and that uses a different ("out-of-band") network channel. A broad range of devices can be used as a second form of authentication including a smart phone or watch, a hardware or software token, a landline phone, etc. You can register multiple verification devices.
ProSight Duo 2FA provides an extra layer of security
Once you confirm your identity using your out-of-band device, you are permitted to run your application or access your VPN or remote desktop service. With the Duo Mobile app's push notification enabled, you can simply press "Approve" on your iOS or Android phone or smart watch. This streamlines the login experience by making the authentication process virtually instantaneous. For other secondary devices, such as a hardware token, you can transcribe a temporary passcode.
Products Available with ProSight Duo Managed Services
Progent's ProSight Duo line of subscription-based managed service offerings consist of ProSight Duo MFA, ProSight Duo Access, and ProSight Duo Beyond. Progent's cybersecurity experts can help you determine which version of ProSight Duo is the best fit for your environment.
ProSight Duo MFA Features:
- Two-factor Authentication
- Duo Mobile to push single-tap authentication for Android, iOS, Apple Watch
- Authentication via a Universal 2nd Factor (U2F) USB device or biometrics
- Traditional 2FA via a passcode generated by a token, mobile device, or network administrator
- User self-enrollment and self-management
- Dashboard of all devices accessing apps
- Policy enforcement based on application, network, user group
- Cloud-based single sign-on (SSO) for all apps via an MFA-protected dashboard
ProSight Duo Access Features:
- All the features of ProSight Duo
- Unified Endpoint Visibility shows every networked device, not just managed devices
- Flag and track high-risk devices
- Duo Device Health application for laptops and desktops
- Security health visibility for mobile devices
- Policy enforcement based on geo-location
- Blocking options for anonymous networks like Tor
- Detection of high-risk or problem networks
- Health-based policy enforcement for laptops, desktops and mobile devices
- Prompt users during login to update their software and security settings
ProSight Duo Beyond Features:
- All the features of ProSight Duo Access
- Detection of corporate-owned vs. BYOD laptops, desktops and mobile devices
- Detection of third-party agents such as anti-virus running on devices
- Secure access to on-prem websites/apps and SSH servers without requiring VPN credential management
- Verification of both user and device trust
- Limit device access to apps based on enrollment in endpoint management systems
- Limit mobile access to apps based on enrollment in mobile device management systems (MDMs)
Download ProSight Duo Two-factor Authentication Services Datasheet
To download a datasheet about the features and benefits of ProSight Duo Two-factor Authentication Services, select:
ProSight Duo Two-factor Authentication Services Datasheet. (PDF - 335 KB)
Download Importance of Using Modern Password Management Tools White Paper
To view or download a white paper describing the importance of deploying modern password management tools, click:
Importance of Using Password Management Tools White Paper. (PDF - 2.3 MB)
How Progent Can Help You Build an MFA Solution with ProSight Duo
Progent can help you plan, deploy, test and troubleshoot a two-factor authentication solution based on ProSight Duo managed services. Progent can also help you integrate ProSight Duo 2FA services into a cohesive, company-wide cybersecurity strategy by providing expertise in all aspects of modern security technology for any mix of cloud, on-premises, at-home, and mobile environments.
Progent's Cisco-certified CCIE network engineers can help you set up your Cisco firewalls, switches, VPN devices and other infrastructure to support Duo's identity authentication services. Progent's certified Azure experts, AWS consultants and Google Cloud Platform consultants can help you add the security of ProSight Duo two-factor authentication to your cloud-hosted applications and services. Progent's work-from-home specialists can help you set up secure and reliable remote access for your teleworkers.
Progent can also provide the support of O365 Exchange consultants, SQL Server experts, and Microsoft 365 consultants to help you plan and deploy Duo 2FA with your key applications. Progent's CISSP-certified cybersecurity consultants and CISM-certified network security experts can help you review and fortify your corporate-wide security posture. Progent also offers ProSight Active Security Monitoring services for AI-based endpoint protection.
Additional Managed Services Available from Progent
In addition to ProSight Duo identity authentication services, Progent offers other affordably-priced managed service packages that address key components of your information system such as security, backup/recovery, and network infrastructure management. By partnering with leading technology innovators, Progent can offer small and mid-size businesses the benefits of the same advanced technology used by global enterprises. Managed services available from Progent include:
- ProSight Active Security Monitoring: Endpoint Protection and Ransomware Defense
Progent's ProSight Active Security Monitoring (ASM) is an endpoint protection (EPP) solution that utilizes SentinelOne's next generation behavior-based analysis tools to guard physical and virtual endpoints against new malware assaults such as ransomware and email phishing, which routinely get by traditional signature-matching AV products. ProSight ASM protects on-premises and cloud resources and provides a single platform to automate the entire malware attack progression including protection, infiltration detection, containment, cleanup, and forensics. Key features include one-click rollback with Windows VSS and real-time network-wide immunization against newly discovered attacks. Progent is a SentinelOne Partner, dealer, and integrator. Find out more about Progent's ProSight Active Security Monitoring next-generation endpoint protection and ransomware recovery.
- ProSight Enhanced Security Protection: Physical and Virtual Endpoint Protection and Microsoft Exchange Filtering
ProSight Enhanced Security Protection managed services offer affordable in-depth security for physical and virtual servers, desktops, mobile devices, and Exchange email. ProSight ESP utilizes adaptive security and advanced machine learning for continuously monitoring and reacting to cyber assaults from all attack vectors. ProSight ESP provides two-way firewall protection, intrusion alerts, endpoint control, and web filtering via leading-edge technologies packaged within a single agent accessible from a unified control. Progent's data protection and virtualization experts can help your business to design and configure a ProSight ESP environment that addresses your organization's specific needs and that allows you prove compliance with government and industry information protection standards. Progent will assist you define and configure security policies that ProSight ESP will enforce, and Progent will monitor your IT environment and respond to alarms that call for urgent action. Progent can also assist your company to install and verify a backup and restore system such as ProSight Data Protection Services so you can recover quickly from a potentially disastrous security attack such as ransomware. Learn more about Progent's ProSight Enhanced Security Protection (ESP) unified physical and virtual endpoint security and Exchange email filtering.
- ProSight Data Protection Services: Managed Backup and Recovery Services
Progent has partnered with advanced backup technology providers to create ProSight Data Protection Services (DPS), a portfolio of subscription-based offerings that deliver backup-as-a-service. ProSight DPS services automate and monitor your data backup operations and enable non-disruptive backup and fast restoration of critical files, applications, system images, plus virtual machines. ProSight DPS lets your business avoid data loss resulting from equipment failures, natural calamities, fire, cyber attacks such as ransomware, human mistakes, ill-intentioned insiders, or software bugs. Managed services available in the ProSight Data Protection Services portfolio include ProSight DPS Altaro VM Backup, ProSight 365 Total Backup (formerly Altaro 365 Backup), ProSight DPS ECHO Backup based on Barracuda dedicated hardware, and ProSight MSP360 Hybrid Backup. Your Progent service representative can assist you to determine which of these fully managed backup services are most appropriate for your IT environment.
- ProSight WAN Watch: Network Infrastructure Management
ProSight WAN Watch is a network infrastructure management service that makes it easy and affordable for small and mid-sized businesses to diagram, monitor, enhance and debug their networking appliances like routers and switches, firewalls, and access points as well as servers, endpoints and other devices. Incorporating state-of-the-art Remote Monitoring and Management (RMM) technology, ProSight WAN Watch ensures that network maps are kept updated, copies and manages the configuration of almost all devices connected to your network, monitors performance, and sends notices when problems are discovered. By automating complex management activities, WAN Watch can knock hours off common chores such as making network diagrams, expanding your network, finding devices that need important updates, or resolving performance problems. Find out more about ProSight WAN Watch network infrastructure monitoring and management consulting.
- ProSight LAN Watch: Server and Desktop Monitoring
ProSight LAN Watch is Progent's server and desktop monitoring service that uses advanced remote monitoring and management technology to keep your network running efficiently by tracking the health of vital assets that power your information system. When ProSight LAN Watch uncovers a problem, an alarm is transmitted automatically to your specified IT management staff and your assigned Progent engineering consultant so all potential problems can be resolved before they can disrupt your network. Find out more details about ProSight LAN Watch server and desktop monitoring services.
- ProSight IT Asset Management: Network Documentation Management
Progent's ProSight IT Asset Management service is a cloud-based IT documentation management service that makes it easy to create, maintain, retrieve and protect information related to your IT infrastructure, procedures, business apps, and services. You can instantly locate passwords or serial numbers and be warned automatically about impending expirations of SSLs or warranties. By cleaning up and managing your network documentation, you can save as much as half of time spent searching for vital information about your IT network. ProSight IT Asset Management features a centralized repository for holding and collaborating on all documents related to managing your network infrastructure such as standard operating procedures (SOPs) and self-service instructions. ProSight IT Asset Management also supports a high level of automation for collecting and associating IT information. Whether you're planning improvements, performing regular maintenance, or responding to a crisis, ProSight IT Asset Management gets you the data you require the instant you need it. Learn more about Progent's ProSight IT Asset Management service.
- Progent Active Defense Against Ransomware: AI-based Ransomware Identification and Cleanup
Progent's Active Defense Against Ransomware is an endpoint protection managed service that utilizes next generation behavior analysis technology to defend endpoints as well as physical and virtual servers against new malware attacks such as ransomware and email phishing, which easily evade traditional signature-based AV products. Progent Active Security Monitoring services safeguard local and cloud-based resources and offers a single platform to manage the complete threat lifecycle including blocking, infiltration detection, containment, remediation, and post-attack forensics. Top capabilities include one-click rollback with Windows Volume Shadow Copy Service (VSS) and automatic system-wide immunization against new attacks. Read more about Progent's ransomware protection and recovery services.
- Outsourced/Co-managed Call Center: Support Desk Managed Services
Progent's Support Center managed services permit your information technology team to outsource Call Center services to Progent or divide responsibilities for Service Desk support seamlessly between your internal support group and Progent's nationwide pool of IT service technicians, engineers and subject matter experts (SMEs). Progent's Co-managed Help Desk Service offers a transparent extension of your core IT support organization. Client access to the Help Desk, provision of support, problem escalation, trouble ticket creation and updates, efficiency measurement, and maintenance of the support database are cohesive regardless of whether issues are taken care of by your core IT support group, by Progent's team, or a mix of the two. Read more about Progent's outsourced/co-managed Call Desk services.
- Progent's Patch Management: Software/Firmware Update Management Services
Progent's support services for software and firmware patch management offer businesses of all sizes a flexible and affordable alternative for evaluating, testing, scheduling, applying, and documenting updates to your dynamic IT network. Besides optimizing the security and functionality of your computer network, Progent's patch management services permit your in-house IT team to focus on line-of-business initiatives and activities that deliver the highest business value from your network. Find out more about Progent's software/firmware update management support services.
Contact Progent for Cybersecurity Expertise
If you need expertise in any aspect of network security, call Progent at 800-993-9400 or visit Contact Progent.
Ransomware 24x7 Hot Line: Call 800-462-8800
Progent's Ransomware 24x7 Hot Line is designed to help organizations to carry out the time-critical first phase in mitigating a ransomware attack by stopping the bleeding. Progent's remote ransomware engineer can assist you to locate and isolate infected servers and endpoints and protect clean assets from being penetrated. If your network has been penetrated by any strain of ransomware, don't panic. Get help quickly by calling Progent's Ransomware Hot Line at 800-462-8800. For details, see Progent's Ransomware 24x7 Hot Line.