ProSight Duo Identity Verification and Management Services
Progent's ProSight Duo family of managed services incorporates industry-leading technology from Duo, a Cisco company, to deliver two-factor authentication solutions. Two-factor authentication (2FA) is one of the foundations of modern zero-trust cybersecurity design. 2FA uses out-of-band identity validation to provide a second layer of protection beyond just passwords. This protects against the most common causes of cybersecurity breaches such as phishing, social engineering, brute-force password attacks, and stolen credentials.
Duo's single-tap Mobile Push app simplifies identity validation
Duo's push technology saves time and hassle by allowing users to verify their identity simply by tapping "Approve" on the authentication prompt on their personal smart phone or watch. This one-tap process eliminates the need to open an email or text message and transcribe a security code manually.
Progent's ProSight Duo suite consists of three subscription-based security services that build on one another. ProSight Duo MFA allows you to deploy Duo's two-factor authentication (2FA) service to protect all users while providing essential access controls, advanced management, and rapid provisioning. ProSight Duo Access includes all the features of ProSight Duo MFA plus adaptive authentication policies and extensive endpoint health monitoring. ProSight Duo Beyond adds the ability to identify corporate as distinct from personal devices, block untrusted devices, and give users secure and seamless access to your internal applications. Progent is a certified Duo Managed Service Provider and can help you design, deploy and manage a modern identity validation solution that provides the highest level of security without bogging down your users.
Two-factor Authentication
80% of security breaches involve compromised passwords. All service offerings in Progent's ProSight Duo line of access security products can do away with your sole reliance on passwords by supporting two-factor authentication. With 2FA activated, when you log into a protected online account and enter your password you are asked to verify your identity via a device that only you possess and that uses a different ("out-of-band") network channel. A broad range of devices can be used as a second form of authentication including a smart phone or watch, a hardware or software token, a landline phone, etc. You can register multiple verification devices.
ProSight Duo two-factor authentication adds an extra level of security
Once you confirm your identity using your out-of-band device, you are permitted to run your application or access your VPN or remote desktop service. With the Duo Mobile app's push notification enabled, you can simply press "Approve" on your iOS or Android phone or smart watch. This streamlines the login experience by making the authentication process virtually instantaneous. For other secondary devices, such as a hardware token, you can transcribe a temporary passcode.
Products Available with ProSight Duo Managed Services
Progent's ProSight Duo line of subscription-based managed service offerings consist of ProSight Duo MFA, ProSight Duo Access, and ProSight Duo Beyond. Progent's cybersecurity experts can help you determine which version of ProSight Duo is the best fit for your environment.
ProSight Duo MFA Features:
- Two-factor Authentication
- Duo Mobile to push single-tap authentication for Android, iOS, Apple Watch
- Authentication via a Universal 2nd Factor (U2F) USB device or biometrics
- Traditional 2FA via a passcode generated by a token, mobile device, or network administrator
- User self-enrollment and self-management
- Dashboard of all devices accessing apps
- Policy enforcement based on application, network, user group
- Cloud-based single sign-on (SSO) for all apps via an MFA-protected dashboard
ProSight Duo Access Features:
- All the features of ProSight Duo
- Unified Endpoint Visibility shows every networked device, not just managed devices
- Flag and track high-risk devices
- Duo Device Health application for laptops and desktops
- Security health visibility for mobile devices
- Policy enforcement based on geo-location
- Blocking options for anonymous networks like Tor
- Detection of high-risk or problem networks
- Health-based policy enforcement for laptops, desktops and mobile devices
- Prompt users during login to update their software and security settings
ProSight Duo Beyond Features:
- All the features of ProSight Duo Access
- Detection of corporate-owned vs. BYOD laptops, desktops and mobile devices
- Detection of third-party agents such as anti-virus running on devices
- Secure access to on-prem websites/apps and SSH servers without requiring VPN credential management
- Verification of both user and device trust
- Limit device access to apps based on enrollment in endpoint management systems
- Limit mobile access to apps based on enrollment in mobile device management systems (MDMs)
Download ProSight Duo Two-factor Authentication Services Datasheet
To download a datasheet about the features and benefits of ProSight Duo Two-factor Authentication Services, select:
ProSight Duo Two-factor Authentication Services Datasheet. (PDF - 335 KB)
Download Importance of Using Modern Password Management Tools White Paper
To view or download a white paper describing the importance of deploying modern password management tools, click:
Importance of Using Password Management Tools White Paper. (PDF - 2.3 MB)
How Progent Can Help You Build an MFA Solution with ProSight Duo
Progent can help you plan, deploy, test and troubleshoot a two-factor authentication solution based on ProSight Duo managed services. Progent can also help you integrate ProSight Duo 2FA services into a cohesive, company-wide cybersecurity strategy by providing expertise in all aspects of modern security technology for any mix of cloud, on-premises, at-home, and mobile environments.
Progent's Cisco-certified CCIE network engineers can help you set up your Cisco firewalls, switches, VPN devices and other infrastructure to support Duo's identity authentication services. Progent's certified Azure experts, AWS consultants and Google Cloud Platform consultants can help you add the security of ProSight Duo two-factor authentication to your cloud-hosted applications and services. Progent's work-from-home specialists can help you set up secure and reliable remote access for your teleworkers.
Progent can also provide the support of O365 Exchange consultants, SQL Server experts, and Microsoft 365 consultants to help you plan and deploy Duo 2FA with your key applications. Progent's CISSP-certified cybersecurity consultants and CISM-certified network security experts can help you review and fortify your corporate-wide security posture. Progent also offers ProSight Active Security Monitoring services for AI-based endpoint protection.
Additional Managed Services Available from Progent
In addition to ProSight Duo identity authentication services, Progent offers other affordably-priced managed service packages that address key components of your information system such as security, backup/recovery, and network infrastructure management. By partnering with leading technology innovators, Progent can offer small and mid-size businesses the benefits of the same advanced technology used by global enterprises. Managed services available from Progent include:
- ProSight Active Security Monitoring: Endpoint Protection and Ransomware Defense
ProSight Active Security Monitoring (ASM) is an endpoint protection solution that incorporates SentinelOne's cutting edge behavior machine learning technology to guard physical and virtual endpoint devices against modern malware assaults like ransomware and file-less exploits, which routinely escape legacy signature-matching anti-virus products. ProSight ASM protects local and cloud-based resources and provides a single platform to automate the complete threat progression including filtering, identification, containment, remediation, and forensics. Top capabilities include one-click rollback using Windows VSS and real-time network-wide immunization against new threats. Progent is a SentinelOne Partner, dealer, and integrator. Read more about Progent's ProSight Active Security Monitoring (ASM) next-generation endpoint protection and ransomware defense.
- ProSight Enhanced Security Protection (ESP): Endpoint Security and Microsoft Exchange Email Filtering
ProSight Enhanced Security Protection (ESP) managed services deliver economical in-depth security for physical and virtual servers, desktops, smartphones, and Exchange email. ProSight ESP uses adaptive security and advanced heuristics for continuously monitoring and responding to cyber assaults from all attack vectors. ProSight ESP delivers firewall protection, intrusion alerts, device control, and web filtering via cutting-edge tools incorporated within one agent managed from a unified console. Progent's security and virtualization experts can assist your business to design and configure a ProSight ESP deployment that meets your company's unique requirements and that helps you achieve and demonstrate compliance with legal and industry information protection regulations. Progent will help you define and implement policies that ProSight ESP will manage, and Progent will monitor your network and react to alarms that call for urgent attention. Progent can also help your company to install and verify a backup and restore solution like ProSight Data Protection Services so you can get back in business quickly from a potentially disastrous security attack like ransomware. Find out more about Progent's ProSight Enhanced Security Protection (ESP) unified endpoint protection and Microsoft Exchange filtering.
- ProSight Data Protection Services: Backup and Recovery Services
Progent has partnered with advanced backup/restore software companies to produce ProSight Data Protection Services (DPS), a selection of management offerings that deliver backup-as-a-service (BaaS). ProSight DPS products manage and track your data backup operations and allow transparent backup and fast recovery of vital files/folders, apps, system images, and Hyper-V and VMware virtual machines. ProSight DPS lets you protect against data loss resulting from hardware breakdown, natural disasters, fire, cyber attacks such as ransomware, human mistakes, malicious employees, or software glitches. Managed services available in the ProSight Data Protection Services product family include ProSight Altaro VM Backup, ProSight 365 Total Backup (formerly Altaro 365 Backup), ProSight DPS ECHO Backup using Barracuda purpose-built storage, and ProSight MSP360 Cloud and On-prem Backup. Your Progent consultant can assist you to determine which of these managed services are most appropriate for your network.
- ProSight WAN Watch: Infrastructure Remote Monitoring and Management
Progent's ProSight WAN Watch is an infrastructure management service that makes it simple and affordable for small and mid-sized organizations to diagram, track, optimize and troubleshoot their networking appliances such as routers, firewalls, and wireless controllers plus servers, endpoints and other networked devices. Incorporating state-of-the-art Remote Monitoring and Management technology, WAN Watch ensures that infrastructure topology diagrams are always updated, copies and displays the configuration information of virtually all devices connected to your network, monitors performance, and generates notices when potential issues are detected. By automating complex network management processes, WAN Watch can cut hours off common chores like making network diagrams, expanding your network, finding devices that need important updates, or identifying the cause of performance problems. Learn more about ProSight WAN Watch infrastructure monitoring and management consulting.
- ProSight LAN Watch: Server and Desktop Monitoring and Management
ProSight LAN Watch is Progent's server and desktop monitoring managed service that incorporates state-of-the-art remote monitoring and management techniques to help keep your IT system running efficiently by checking the state of critical computers that power your business network. When ProSight LAN Watch uncovers an issue, an alarm is sent immediately to your designated IT management staff and your assigned Progent consultant so that all looming issues can be resolved before they have a chance to impact productivity. Find out more about ProSight LAN Watch server and desktop monitoring consulting.
- ProSight IT Asset Management: Network Documentation Management
Progent's ProSight IT Asset Management service is a cloud-based IT documentation management service that makes it easy to create, maintain, retrieve and protect data about your network infrastructure, procedures, business apps, and services. You can quickly find passwords or serial numbers and be warned automatically about impending expirations of SSL certificates or warranties. By cleaning up and managing your IT documentation, you can eliminate up to 50% of time thrown away looking for vital information about your network. ProSight IT Asset Management includes a centralized location for holding and sharing all documents required for managing your business network like recommended procedures and self-service instructions. ProSight IT Asset Management also supports a high level of automation for gathering and relating IT data. Whether you're planning enhancements, performing regular maintenance, or responding to an emergency, ProSight IT Asset Management delivers the knowledge you require the instant you need it. Read more about Progent's ProSight IT Asset Management service.
- Progent Active Defense Against Ransomware: Machine Learning-based Ransomware Identification and Remediation
Progent's Active Defense Against Ransomware is an endpoint protection solution that incorporates next generation behavior machine learning technology to defend endpoint devices and servers and VMs against new malware attacks like ransomware and file-less exploits, which easily escape traditional signature-based anti-virus tools. Progent Active Security Monitoring services safeguard local and cloud-based resources and offers a unified platform to automate the complete threat progression including filtering, detection, mitigation, cleanup, and forensics. Key features include one-click rollback using Windows Volume Shadow Copy Service (VSS) and automatic network-wide immunization against new threats. Learn more about Progent's ransomware protection and recovery services.
- Outsourced/Co-managed Call Desk: Help Desk Managed Services
Progent's Help Desk services allow your information technology team to offload Support Desk services to Progent or divide activity for support services seamlessly between your in-house support resources and Progent's nationwide roster of certified IT service engineers and subject matter experts (SMEs). Progent's Co-managed Help Desk Service offers a transparent extension of your internal support group. End user access to the Help Desk, provision of technical assistance, problem escalation, ticket creation and updates, efficiency metrics, and maintenance of the support database are cohesive whether issues are taken care of by your core network support organization, by Progent, or a mix of the two. Read more about Progent's outsourced/co-managed Call Desk services.
- Patch Management: Patch Management Services
Progent's managed services for software and firmware patch management offer businesses of any size a versatile and affordable alternative for assessing, validating, scheduling, applying, and tracking updates to your dynamic IT network. In addition to maximizing the security and functionality of your IT environment, Progent's software/firmware update management services allow your IT team to focus on line-of-business projects and tasks that deliver the highest business value from your network. Find out more about Progent's software/firmware update management support services.
Contact Progent for Cybersecurity Expertise
If you need expertise in any aspect of network security, call Progent at 800-993-9400 or visit Contact Progent.
Ransomware 24x7 Hot Line: Call 800-462-8800
Progent's Ransomware 24x7 Hot Line is designed to assist organizations to take the time-critical first phase in responding to a ransomware attack by containing the malware. Progent's remote ransomware engineer can help you to locate and isolate breached servers and endpoints and protect clean resources from being compromised. If your network has been penetrated by any strain of ransomware, act fast. Get immediate help by calling Progent's Ransomware Hot Line at 800-462-8800. For details, see Progent's Ransomware 24x7 Hot Line.