ProSight Duo Identity Verification and Management Services
Progent's ProSight Duo family of managed services incorporates industry-leading technology from Duo, a Cisco company, to deliver two-factor authentication solutions. Two-factor authentication (2FA) is one of the foundations of modern zero-trust cybersecurity design. 2FA uses out-of-band identity validation to provide a second layer of protection beyond just passwords. This protects against the most common causes of cybersecurity breaches such as phishing, social engineering, brute-force password attacks, and stolen credentials.
Duo's single-tap Mobile Push app simplifies identity validation
Duo's push technology saves time and hassle by allowing users to verify their identity simply by tapping "Approve" on the authentication prompt on their personal smart phone or watch. This one-tap process eliminates the need to open an email or text message and transcribe a security code manually.
Progent's ProSight Duo suite consists of three subscription-based security services that build on one another. ProSight Duo MFA allows you to deploy Duo's two-factor authentication (2FA) service to protect all users while providing essential access controls, advanced management, and rapid provisioning. ProSight Duo Access includes all the features of ProSight Duo MFA plus adaptive authentication policies and extensive endpoint health monitoring. ProSight Duo Beyond adds the ability to identify corporate as distinct from personal devices, block untrusted devices, and give users secure and seamless access to your internal applications. Progent is a certified Duo Managed Service Provider and can help you design, deploy and manage a modern identity validation solution that provides the highest level of security without bogging down your users.
Two-factor Authentication
80% of security breaches involve compromised passwords. All service offerings in Progent's ProSight Duo line of access security products can do away with your sole reliance on passwords by supporting two-factor authentication. With 2FA activated, when you log into a protected online account and enter your password you are asked to verify your identity via a device that only you possess and that uses a different ("out-of-band") network channel. A broad range of devices can be used as a second form of authentication including a smart phone or watch, a hardware or software token, a landline phone, etc. You can register multiple verification devices.
ProSight Duo 2FA provides an extra level of security
Once you confirm your identity using your out-of-band device, you are permitted to run your application or access your VPN or remote desktop service. With the Duo Mobile app's push notification enabled, you can simply press "Approve" on your iOS or Android phone or smart watch. This streamlines the login experience by making the authentication process virtually instantaneous. For other secondary devices, such as a hardware token, you can transcribe a temporary passcode.
Products Available with ProSight Duo Managed Services
Progent's ProSight Duo line of subscription-based managed service offerings consist of ProSight Duo MFA, ProSight Duo Access, and ProSight Duo Beyond. Progent's cybersecurity experts can help you determine which version of ProSight Duo is the best fit for your environment.
ProSight Duo MFA Features:
- Two-factor Authentication
- Duo Mobile to push single-tap authentication for Android, iOS, Apple Watch
- Authentication via a Universal 2nd Factor (U2F) USB device or biometrics
- Traditional 2FA via a passcode generated by a token, mobile device, or network administrator
- User self-enrollment and self-management
- Dashboard of all devices accessing apps
- Policy enforcement based on application, network, user group
- Cloud-based single sign-on (SSO) for all apps via an MFA-protected dashboard
ProSight Duo Access Features:
- All the features of ProSight Duo
- Unified Endpoint Visibility shows every networked device, not just managed devices
- Flag and track high-risk devices
- Duo Device Health application for laptops and desktops
- Security health visibility for mobile devices
- Policy enforcement based on geo-location
- Blocking options for anonymous networks like Tor
- Detection of high-risk or problem networks
- Health-based policy enforcement for laptops, desktops and mobile devices
- Prompt users during login to update their software and security settings
ProSight Duo Beyond Features:
- All the features of ProSight Duo Access
- Detection of corporate-owned vs. BYOD laptops, desktops and mobile devices
- Detection of third-party agents such as anti-virus running on devices
- Secure access to on-prem websites/apps and SSH servers without requiring VPN credential management
- Verification of both user and device trust
- Limit device access to apps based on enrollment in endpoint management systems
- Limit mobile access to apps based on enrollment in mobile device management systems (MDMs)
Download ProSight Duo Two-factor Authentication Services Datasheet
To download a datasheet about the features and benefits of ProSight Duo Two-factor Authentication Services, select:
ProSight Duo Two-factor Authentication Services Datasheet. (PDF - 335 KB)
Download Importance of Using Modern Password Management Tools White Paper
To view or download a white paper describing the importance of deploying modern password management tools, click:
Importance of Using Password Management Tools White Paper. (PDF - 2.3 MB)
How Progent Can Help You Build an MFA Solution with ProSight Duo
Progent can help you plan, deploy, test and troubleshoot a two-factor authentication solution based on ProSight Duo managed services. Progent can also help you integrate ProSight Duo 2FA services into a cohesive, company-wide cybersecurity strategy by providing expertise in all aspects of modern security technology for any mix of cloud, on-premises, at-home, and mobile environments.
Progent's Cisco-certified CCIE network engineers can help you set up your Cisco firewalls, switches, VPN devices and other infrastructure to support Duo's identity authentication services. Progent's certified Azure experts, AWS consultants and Google Cloud Platform consultants can help you add the security of ProSight Duo two-factor authentication to your cloud-hosted applications and services. Progent's work-from-home specialists can help you set up secure and reliable remote access for your teleworkers.
Progent can also provide the support of O365 Exchange consultants, SQL Server experts, and Microsoft 365 consultants to help you plan and deploy Duo 2FA with your key applications. Progent's CISSP-certified cybersecurity consultants and CISM-certified network security experts can help you review and fortify your corporate-wide security posture. Progent also offers ProSight Active Security Monitoring services for AI-based endpoint protection.
Additional Managed Services Available from Progent
In addition to ProSight Duo identity authentication services, Progent offers other affordably-priced managed service packages that address key components of your information system such as security, backup/recovery, and network infrastructure management. By partnering with leading technology innovators, Progent can offer small and mid-size businesses the benefits of the same advanced technology used by global enterprises. Managed services available from Progent include:
- ProSight Active Security Monitoring: Endpoint Protection and Ransomware Defense
ProSight Active Security Monitoring (ASM) is an endpoint protection solution that utilizes SentinelOne's next generation behavior-based analysis technology to defend physical and virtual endpoints against new malware attacks such as ransomware and email phishing, which routinely escape traditional signature-matching AV products. ProSight ASM protects local and cloud-based resources and provides a unified platform to manage the entire threat progression including protection, identification, mitigation, remediation, and post-attack forensics. Top features include single-click rollback with Windows VSS and automatic network-wide immunization against newly discovered threats. Progent is a SentinelOne Partner, dealer, and integrator. Read more about Progent's ProSight Active Security Monitoring next-generation endpoint protection and ransomware recovery.
- ProSight Enhanced Security Protection: Endpoint Security and Exchange Email Filtering
ProSight Enhanced Security Protection (ESP) services offer economical in-depth security for physical and virtual servers, workstations, smartphones, and Microsoft Exchange. ProSight ESP uses contextual security and modern behavior analysis for continuously monitoring and reacting to cyber threats from all vectors. ProSight ESP provides firewall protection, intrusion alarms, device control, and web filtering through leading-edge tools packaged within a single agent accessible from a single control. Progent's data protection and virtualization experts can assist your business to plan and configure a ProSight ESP environment that addresses your organization's specific needs and that allows you prove compliance with legal and industry data protection regulations. Progent will help you define and configure policies that ProSight ESP will manage, and Progent will monitor your network and respond to alerts that require immediate action. Progent's consultants can also help you to set up and verify a backup and restore system like ProSight Data Protection Services (DPS) so you can get back in business rapidly from a potentially disastrous security attack such as ransomware. Read more about Progent's ProSight Enhanced Security Protection unified endpoint protection and Exchange filtering.
- ProSight Data Protection Services (DPS): Managed Backup and Disaster Recovery Services
Progent has partnered with leading backup software companies to produce ProSight Data Protection Services, a portfolio of management outsourcing plans that deliver backup-as-a-service (BaaS). ProSight DPS services manage and track your backup operations and allow transparent backup and fast restoration of vital files/folders, applications, images, plus VMs. ProSight DPS lets your business avoid data loss resulting from equipment failures, natural calamities, fire, cyber attacks such as ransomware, human mistakes, malicious insiders, or software bugs. Managed services in the ProSight Data Protection Services product family include ProSight Altaro VM Backup, ProSight 365 Total Backup (formerly Altaro 365 Backup), ProSight DPS ECHO Backup based on Barracuda purpose-built hardware, and ProSight MSP360 Cloud and On-prem Backup. Your Progent service representative can assist you to identify which of these fully managed backup services are best suited for your IT environment.
- ProSight WAN Watch: Infrastructure Remote Monitoring and Management
Progent's ProSight WAN Watch is a network infrastructure monitoring and management service that makes it simple and affordable for smaller organizations to map out, track, optimize and troubleshoot their connectivity appliances like routers and switches, firewalls, and access points plus servers, printers, endpoints and other devices. Incorporating state-of-the-art RMM technology, WAN Watch makes sure that infrastructure topology diagrams are always updated, captures and manages the configuration of almost all devices on your network, monitors performance, and generates notices when issues are discovered. By automating tedious network management activities, WAN Watch can knock hours off ordinary tasks such as making network diagrams, expanding your network, locating devices that need important software patches, or resolving performance problems. Find out more about ProSight WAN Watch infrastructure management services.
- ProSight LAN Watch: Server and Desktop Remote Monitoring
ProSight LAN Watch is Progent's server and desktop remote monitoring managed service that uses state-of-the-art remote monitoring and management technology to help keep your IT system operating at peak levels by checking the state of critical assets that drive your business network. When ProSight LAN Watch detects a problem, an alert is transmitted automatically to your designated IT staff and your Progent engineering consultant so that all looming problems can be resolved before they can impact your network. Find out more about ProSight LAN Watch server and desktop monitoring consulting.
- ProSight IT Asset Management: Network Documentation Management
Progent's ProSight IT Asset Management service is an IT infrastructure documentation management service that makes it easy to create, maintain, find and safeguard data related to your IT infrastructure, processes, applications, and services. You can instantly find passwords or IP addresses and be alerted automatically about impending expirations of SSLs ,domains or warranties. By updating and organizing your network documentation, you can eliminate as much as half of time spent looking for critical information about your network. ProSight IT Asset Management includes a common location for storing and sharing all documents related to managing your business network such as standard operating procedures (SOPs) and How-To's. ProSight IT Asset Management also offers advanced automation for gathering and associating IT data. Whether you're making enhancements, performing regular maintenance, or reacting to a crisis, ProSight IT Asset Management gets you the information you require the instant you need it. Find out more about ProSight IT Asset Management service.
- Active Defense Against Ransomware: AI-based Ransomware Detection and Remediation
Progent's Active Protection Against Ransomware is an endpoint protection (EPP) solution that incorporates next generation behavior-based analysis technology to guard endpoint devices and physical and virtual servers against modern malware assaults such as ransomware and email phishing, which routinely evade legacy signature-matching AV tools. Progent Active Security Monitoring services safeguard on-premises and cloud-based resources and offers a unified platform to manage the entire threat lifecycle including protection, infiltration detection, mitigation, remediation, and post-attack forensics. Top features include single-click rollback using Windows Volume Shadow Copy Service (VSS) and real-time network-wide immunization against newly discovered attacks. Find out more about Progent's ransomware protection and cleanup services.
- Outsourced/Co-managed Service Desk: Support Desk Managed Services
Progent's Help Center services permit your information technology group to offload Help Desk services to Progent or split responsibilities for Help Desk services seamlessly between your internal network support group and Progent's nationwide pool of IT support technicians, engineers and subject matter experts (SMEs). Progent's Co-managed Service Desk offers a smooth extension of your core network support organization. Client interaction with the Service Desk, delivery of support, issue escalation, trouble ticket creation and updates, performance metrics, and management of the service database are consistent regardless of whether incidents are taken care of by your core IT support group, by Progent, or by a combination. Find out more about Progent's outsourced/shared Help Desk services.
- Progent's Patch Management: Patch Management Services
Progent's managed services for software and firmware patch management provide businesses of all sizes a flexible and cost-effective solution for evaluating, testing, scheduling, implementing, and tracking updates to your dynamic IT system. In addition to maximizing the protection and functionality of your computer environment, Progent's software/firmware update management services free up time for your IT team to concentrate on line-of-business projects and activities that derive the highest business value from your network. Learn more about Progent's patch management support services.
Contact Progent for Cybersecurity Expertise
If you need expertise in any aspect of network security, call Progent at 800-993-9400 or visit Contact Progent.
Ransomware 24x7 Hot Line: Call 800-462-8800
Progent's Ransomware 24x7 Hot Line is designed to guide organizations to carry out the time-critical first phase in responding to a ransomware assault by stopping the bleeding. Progent's online ransomware expert can help you to locate and quarantine infected servers and endpoints and guard clean resources from being penetrated. If your network has been breached by any version of ransomware, don't panic. Get help quickly by calling Progent's Ransomware Hot Line at 800-462-8800. For details, see Progent's Ransomware 24x7 Hot Line.