ProSight Duo Access Security
Progent's ProSight Duo line of managed services incorporates advanced technology from Duo, a Cisco Systems subsidiary, to offer multi-factor authentication services. Two-factor authentication is one of the pillars of zero-trust cybersecurity design. 2FA uses out-of-band identity confirmation to build a second layer of protection beyond traditional passwords. This guards against the most common sources of cybersecurity breaches including phishing, brute-force password attacks, and stolen credentials.
Duo's one-touch Mobile Push app simplifies authentication
Duo's Push App minimizes time and hassle by allowing users to confirm who they are just by pressing "Approve" on the authentication box on their own iOS or Android smartphone or wearable. This one-touch process does away with the need to retrieve an email or text and copy a passcode by hand.
Progent's ProSight Duo catalog includes three subscription-based services that build on one another. ProSight Duo MFA permits organizations to deploy Duo's 2FA service to protect all apps while providing essential policy tools, unified management, and fast provisioning. ProSight Duo Access provides all the features of ProSight Duo MFA plus adaptive ID validation policies and endpoint health monitoring. ProSight Duo Beyond brings the ability to identify corporate as distinct from personal endpoints, block untrusted devices, and allow users safe and transparent access to your inside applications. Progent is a Duo Managed Service Provider and can assist you to design, implement and manage a modern identity authentication solution that delivers the highest level of security without disrupting your users.
The overwhelming majority of security break-ins involve compromised passwords. Each managed service plan in Progent's ProSight Duo line of access security products can reduce your risky reliance on password protection by allowing two-factor authentication. With 2FA activated, when you sign into a protected online account and provide your correct password you are asked to confirm your identity by means of a device which you have exclusive possession of and that utilizes a separate ("out-of-band") channel. A broad assortment of devices can be used as your additional form of ID validation including an iOS or Android smartphone or wearable, a hardware token, a landline phone, etc. You can enroll several different authentication devices.
ProSight Duo two-factor authentication provides an additional layer of security
Once you confirm your identity using your out-of-band device, you are permitted to use your app or access your VPN or remote desktop service. With the Duo Mobile app's push notification feature activated, you can simply press "Approve" on your supported phone or watch. This improves the sign-on experience by making the authentication procedure virtually instantaneous. For traditional secondary units, such as a token, you can transcribe a temporary password.
Plans Offered with ProSight Duo Managed Services
Progent's ProSight Duo line of subscription service offerings include ProSight Duo MFA, ProSight Duo Access, and ProSight Duo Beyond. Progent's cybersecurity experts can assist your business to decide which version of ProSight Duo is best suited for your requirements.
ProSight Duo MFA Features:
ProSight Duo Access Features:
- Two-factor authentication
- Duo Mobile to push one-touch authentication for smartphones and wearables
- Authentication through a Universal 2nd Factor USB device or biometrics
- Traditional 2FA with a passcode displayed on a token, mobile computer, or provided by an IT admin
- User self-enrollment and management
- Dashboard of all managed devices accessing secured applications
- Access policy enforcement based on application, group
- Cloud-based SSO for any apps via an MFA-protected dashboard
ProSight Duo Beyond Features:
- All of the features included with ProSight Duo
- Unified Endpoint Visibility displays every networked device, not simply managed devices
- Highlight and track high-risk endpoints
- Duo Device Health apps for laptops and PCs
- Security health monitoring for mobile devices
- Access policy enforcement driven by geo-location
- Blocking capability for anonymous networks like The Onion Router (Tor)
- Detection of suspicious or problem networks
- Health-determined policy enforcement for laptops, PCs and computers
- Advise users during login to bring up to date their software and security settings
Download ProSight Duo Two-factor Authentication Service Plans Datasheet
- All the capabilities included with ProSight Duo Access
- Detection of corporate-owned vs. personally owned notebooks, desktops and mobile devices
- Identification of 3rd-party software agents such as anti-virus running on endpoints
- Secure access to on-premises websites/applications and SSH servers without requiring VPN credential management
- Validation of both user and device trust
- Control device access to apps based on enrollment in endpoint management systems
- Control mobile access to applications determined by enrollment in mobile device management systems
For a datasheet describing the key capabilities of ProSight Duo Two-factor Authentication Services, select:
ProSight Duo two-factor authentication services datasheet. (PDF - 335 KB)
Download Importance of Deploying Modern Password Management Technology White Paper
To view or download a white paper about the importance of deploying up-to-date password management technology, click:
Reasons for Using Modern Password Management Technology White Paper. (PDF - 2.3 MB)
How Progent Can Help You to Build an 2FA System with ProSight Duo
Progent can help your business to design, deploy, manage and debug a two-factor authentication system based on ProSight Duo technology. Progent can also assist your company to incorporate ProSight Duo 2FA services into a cohesive, end-to-end security strategy by delivering expertise in all facets of modern cybersecurity technology for any mix of cloud, on-prem, at-home, and mobile environments.
Progent's Cisco-certified CCIE network engineers can help you to configure and troubleshoot your Cisco Firepower firewalls, Catalyst switches, VPN devices, and other network infrastructure to support Cisco Duo's ID verification technology. Progent's authorized Azure integration experts, AWS support experts and Google Cloud Platform consulting experts can assist you to add the security of ProSight Duo 2FA services to your cloud-hosted applications. Progent's teleworker integration experts can help your organization to plan and configure protected and resilient remote connectivity for your teleworkers.
Progent can also provide fast guidance from Exchange Online experts, SQL Server experts, and Microsoft 365 consultants help you to prepare and implement Duo 2FA with your key workloads. Progent's CISSP-certified network security experts and CISM-certified network security specialists can help your company to assess and elevate your company-wide cybersecurity posture. Progent also offers ProSight Active Security Monitoring (ASM) managed services for machine-learning based endpoint security powered by SentinelOne.
Other Managed Services Available from Progent
Besides ProSight Duo identity authentication services, Progent can provide other low-cost managed service packages that cover vital aspects of your IT network such as security, backup/restore, and infrastructure management. By partnering with top-tier technology providers, Progent can offer small and middle-size businesses the advantages of the same advanced tools and services utilized by the world's largest enterprises. Managed service packages available from Progent include:
Contact Progent for Cybersecurity Solutions
- ProSight Active Security Monitoring: Endpoint Protection and Ransomware Defense
ProSight Active Security Monitoring (ASM) is an endpoint protection (EPP) service that incorporates SentinelOne's next generation behavior-based machine learning technology to guard physical and virtual endpoint devices against new malware attacks like ransomware and email phishing, which routinely evade legacy signature-matching anti-virus products. ProSight ASM safeguards local and cloud resources and offers a single platform to address the complete threat lifecycle including protection, identification, containment, cleanup, and forensics. Top features include single-click rollback with Windows Volume Shadow Copy Service and real-time system-wide immunization against new threats. Progent is a SentinelOne Partner, reseller, and integrator. Learn more about Progent's ProSight Active Security Monitoring endpoint protection and ransomware defense.
- ProSight Enhanced Security Protection (ESP): Endpoint Protection and Microsoft Exchange Email Filtering
Progent's ProSight Enhanced Security Protection (ESP) services offer ultra-affordable multi-layer protection for physical servers and VMs, desktops, mobile devices, and Microsoft Exchange. ProSight ESP utilizes contextual security and modern behavior analysis for continuously monitoring and reacting to security assaults from all vectors. ProSight ESP delivers firewall protection, intrusion alarms, device control, and web filtering via cutting-edge tools incorporated within a single agent accessible from a single control. Progent's data protection and virtualization consultants can help your business to design and configure a ProSight ESP deployment that addresses your organization's unique requirements and that helps you achieve and demonstrate compliance with legal and industry data security regulations. Progent will help you specify and implement security policies that ProSight ESP will manage, and Progent will monitor your network and respond to alarms that call for immediate attention. Progent's consultants can also help your company to install and verify a backup and restore system like ProSight Data Protection Services (DPS) so you can recover quickly from a potentially disastrous security attack like ransomware. Learn more about Progent's ProSight Enhanced Security Protection unified physical and virtual endpoint protection and Exchange filtering.
- ProSight Data Protection Services: Backup and Disaster Recovery Services
Progent has partnered with leading backup/restore technology companies to create ProSight Data Protection Services (DPS), a portfolio of management outsourcing plans that deliver backup-as-a-service. ProSight DPS products manage and monitor your backup operations and enable transparent backup and fast recovery of vital files, apps, system images, and virtual machines. ProSight DPS lets your business avoid data loss resulting from hardware breakdown, natural calamities, fire, malware like ransomware, user error, malicious insiders, or software bugs. Managed services in the ProSight DPS portfolio include ProSight DPS Altaro VM Backup, ProSight 365 Total Backup (formerly Altaro 365 Backup), ProSight DPS ECHO Backup based on Barracuda purpose-built hardware, and ProSight DPS MSP360 Hybrid Backup. Your Progent expert can help you to identify which of these fully managed backup services are best suited for your network.
- ProSight WAN Watch: Infrastructure Management
ProSight WAN Watch is a network infrastructure monitoring and management service that makes it easy and affordable for smaller businesses to diagram, track, optimize and troubleshoot their networking appliances such as routers, firewalls, and load balancers as well as servers, client computers and other devices. Incorporating state-of-the-art Remote Monitoring and Management technology, WAN Watch ensures that network diagrams are kept updated, captures and manages the configuration information of almost all devices on your network, tracks performance, and generates alerts when potential issues are detected. By automating time-consuming management and troubleshooting activities, WAN Watch can knock hours off common tasks like network mapping, reconfiguring your network, finding devices that need important updates, or identifying the cause of performance issues. Find out more details about ProSight WAN Watch infrastructure management services.
- ProSight LAN Watch: Server and Desktop Remote Monitoring and Management
ProSight LAN Watch is Progent's server and desktop remote monitoring managed service that uses advanced remote monitoring and management technology to help keep your IT system operating at peak levels by tracking the health of critical assets that power your business network. When ProSight LAN Watch detects an issue, an alarm is transmitted immediately to your specified IT management staff and your Progent consultant so any potential problems can be resolved before they can impact productivity. Learn more about ProSight LAN Watch server and desktop monitoring consulting.
- ProSight IT Asset Management: Network Documentation Management
ProSight IT Asset Management service is a cloud-based IT documentation management service that makes it easy to create, maintain, find and protect data about your network infrastructure, procedures, applications, and services. You can quickly locate passwords or serial numbers and be alerted about upcoming expirations of SSL certificates ,domains or warranties. By cleaning up and organizing your IT infrastructure documentation, you can eliminate as much as half of time wasted looking for vital information about your IT network. ProSight IT Asset Management features a common location for holding and collaborating on all documents related to managing your business network like recommended procedures and How-To's. ProSight IT Asset Management also supports advanced automation for gathering and associating IT data. Whether you're making enhancements, doing regular maintenance, or reacting to an emergency, ProSight IT Asset Management delivers the knowledge you require as soon as you need it. Read more about Progent's ProSight IT Asset Management service.
- Active Defense Against Ransomware: AI-based Ransomware Identification and Remediation
Progent's Active Defense Against Ransomware is an endpoint protection (EPP) service that utilizes cutting edge behavior-based machine learning tools to defend endpoint devices and servers and VMs against new malware attacks like ransomware and file-less exploits, which easily evade legacy signature-based AV products. Progent ASM services protect local and cloud-based resources and provides a single platform to automate the complete malware attack progression including filtering, detection, containment, remediation, and forensics. Top features include single-click rollback using Windows Volume Shadow Copy Service (VSS) and real-time system-wide immunization against new threats. Learn more about Progent's ransomware defense and cleanup services.
- Outsourced/Co-managed Call Desk: Support Desk Managed Services
Progent's Help Desk managed services permit your information technology team to outsource Support Desk services to Progent or split activity for support services seamlessly between your in-house support resources and Progent's nationwide pool of IT support technicians, engineers and subject matter experts (SMEs). Progent's Shared Service Desk offers a smooth extension of your corporate support resources. End user access to the Help Desk, delivery of support, issue escalation, ticket generation and updates, performance metrics, and management of the support database are cohesive regardless of whether incidents are resolved by your in-house network support staff, by Progent, or a mix of the two. Learn more about Progent's outsourced/co-managed Service Center services.
- Progent's Patch Management: Software/Firmware Update Management Services
Progent's support services for patch management offer organizations of all sizes a flexible and cost-effective alternative for assessing, validating, scheduling, applying, and documenting updates to your dynamic IT system. Besides maximizing the protection and functionality of your computer network, Progent's patch management services permit your IT staff to focus on more strategic initiatives and tasks that derive maximum business value from your network. Read more about Progent's patch management services.
If you need assistance with MFA access security or any other facet of cybersecurity, call Progent at 800-993-9400 or visit Contact Progent.