Progent's ProSight Active Security Monitoring services incorporate behavior-based detection technology from SentinelOne to provide endpoint and server protection from modern malware attacks such as ransomware, which have demonstrated the ability to evade legacy, signature-based anti-virus defenses. ProSight ASM gives small and mid-sized organizations access to the same threat protection platform used by leading enterprises including Walmart, Netflix, Visa, Citi, NASDAQ, Salesforce and others. By delivering real-time threat prevention, detection, removal and recovery in one unified package, ProSight ASM cuts ownership costs, simplifies management, and speeds up recovery. SentinelOne's next-generation endpoint protection (NGEP) technology used by ProSight ASM was rated by Gartner Group as the most visionary Endpoint Protection Platform in the industry. Progent is a SentinelOne Partner, reseller, and integrator.
Progent's ProSight Active Security Monitoring services utilize a low-overhead agent installed on each protected endpoint and server to build a cohesive security grid that responds to threats at machine speed and allows coordinated and decisive incident response featuring:
- Protection for Windows, Mac OS X and macOS, Linux, iOS and Android endpoints and servers
- Support for Windows Hyper-V, VMware vSphere, and Citrix XenServer virtual environments
- Deep system-level monitoring
- Signature-less machine learning and intelligent automation
- Behavioral analysis and detection of advanced attacks across all vectors
- Full remediation with auto-removal of detected attacks
- Single-click rollback from ransomware and other attacks
- Automatic, network-wide immunization
- Real-time visualization of the attack storyline for comprehensive forensics
- Unified control via a single management console
- HIPAA and PCI certification
Progent's GIAC-certified information assurance consultants and CISSP-certified cybersecurity and compliance experts have earned the security industry's top certifications including CISSP, CISA, GIAC, CISM and ISSAP. With 20 years of experience providing IT security and compliance solutions to organizations of all sizes, Progent has the skills required to help any business to deploy cutting-edge endpoint protection (EPP) technology effectively and affordably. By partnering with leading information security companies, Progent can offer the ProSight Active Security Monitoring package to small and mid-size businesses for enterprise-class threat protection on a small-business budget.
Progent offers ProSight Active Security Monitoring as a low-cost, flat-rate monthly service. A software-only EPP solution, ProSight ASM requires no special hardware or other costly upfront investment. ProSight ASM can provide protection for both on-premises and cloud-based resources. In the event that you suffer an attack, Progent is qualified to act as your red team to help you use ProSight ASM to contain and remove the threat, assess the damage, rollback your network to a healthy state, and understand the source and spread of the malware.
ProSight Active Security Monitoring and the Modern Threat Landscape
97% of data breaches could have been prevented by current security technology, but some successful attacks are inevitable. Sometimes the crooks win. ProSight Active Security Monitoring is designed around the premise that even with the best security technology, you may eventually suffer a breach. For this reason ProSight ASM not only provides malware blocking based on traditional static, signature-based prevention, but also dynamic detection of malware and exploits that have penetrated your network, fast isolation of infected devices, automatic removal of threats, near real-time immunization of all endpoints, single-click recovery (such as a rollback to a pre-ransomware state), and rich forensics to help you understand and eliminate your vulnerability.
By offering best-of-breed technology for before, during and after an attack, ProSight ASM delivers an end-to-end solution for addressing the realities of the modern security landscape and minimizing or eliminating financial, productivity and reputation loss in case of a breach.
Endpoints are the most vulnerable and most frequently targeted component of an information network. ProSight Active Security Monitoring services offer a single, integrated platform to manage the entire threat lifecycle including protection, detection, response and remediation. Threats addressed by ProSight ASM include:
- File-based malware such as ransomware, trojans, worms, backdoors and payload-based attacks
- File-less and memory-only malware with no disk-based indicators
- Document-based exploits embedded in Office and Adobe files, and macros
- Phishing and spear phishing emails (which account for over 90+ of successful data breaches)
- Browser-based attacks rooted in drive-by downloads, Flash, Java, Javascript, VBS, IFraME.htmL5, and plug-ins
- Live attacks based on scripts like PowerShell, Powersploit, WMI, and VBS
- Credential-based attacks including credential-scraping, Mimikatz, and tokens
ProSight ASM's Behavior-based Threat Analysis
Traditional anti-virus tools use signature matching as their main defense. A unique file hash, or signature, is generated for each known threat, and potential threats are checked against a continually updated table of signatures. The flaw in this approach is that the speed and volume of new threats far outpace the anti-virus industry's ability to generate and distribute signatures. In contrast, modern behavior analysis looks at the activities of a potential threat and determines whether it behaves abnormally. For example, does it impact a large number of processes? Does it alter the registry? Does it install a keystroke logger? In essence, behavior analysis uses suspicious activities to create a kind of meta signature that can't be changed by a hacker simply by altering a few irrelevant bytes of code to escape detection.
Prevention: Before the Attack
With nation-state intelligence agencies joining the ranks of professional and amateur hackers, new malware is being developed far faster than the ability of anti-virus providers to write new signatures. The limitations of signature-matching endpoint protection has been recognized since around 2012 and its inadequacy is now an accepted tenet of IT security.
Malware production has increased beyond the capacity of traditional signature-based AV technology to block it
ProSight ASM utilizes low-overhead cloud intelligence and reputation services from multiple vendors to filter known malware. Deep file inspection plus dynamic blacklisting and whitelisting help make ProSight ASM a significant improvement over legacy anti-virus platforms, but prevention is only the first line of defense. Advanced exploits, file-less malware and script-based attacks can sneak past signature-matching barriers. For example, so-called "packers" compress code to disguise malware data so it can't be read by security researchers or malware blocking programs.
Detection and Response: During the Attack
The second phase of endpoint protection involves dealing with malware while it is executing. ProSight ASM uses next-generation endpoint protection (NGEP) technology to detect malicious behavior from any malware that gets through the automated blacklisting process. Even in the case of advanced file-less malware such as application and memory-based attacks, the malicious code must perform certain recognizable activities (e.g., creating an executable file without permission) if it is to compromise data. ProSight ASM's lightweight agent watches all activity in each protected endpoint and uses state-of-the-art behavioral threat analysis and full execution context to identify new attacks at inception. When an attack is discovered, ProSight ASM immediately disconnects the affected device from the network to contain the threat. Because the ProSight ASM agent is autonomous, devices stay protected even when they are not connected to the Internet.
Remediation: After the Attack
Once an attack is contained, ProSight ASM begins policy-based mitigation. When you use ProSight ASM in conjunction with Windows Volume Shadow Copy Service, modifications to data made by the malware attack can be rolled back automatically with a single click. ProSight ASM also logs whatever system-level files and settings were changed by the attack and what were remediated. Whenever ProSight ASM detects a new malicious binary, the threat is flagged and all protected agents on the network are immediately immunized against the attack. In addition, the ProSight ASM management console provides in-depth forensics, which include a clear visualization of the attack's progress through the network from inception to termination. This real-time audit trail of what happened during the attack exposes weaknesses that need to be addressed in your security strategy and answers questions like: How did the attack enter our network? Which employee or guest opened the malware file? What did the malware change on our network?
ProSight ASM's management console provides a real-time view of threats from inception to termination
Download the ProSight Active Security Monitoring Datasheet
To download a PDF datasheet describing the key features of ProSight Active Security Monitoring, click:
Progent's ProSight Active Security Monitoring Services Datasheet. (PDF - 89 KB)
Other ProSight Managed Services Available from Progent
In addition to ProSight Active Security Monitoring, Progent's ProSight suite of network management services includes other budget-friendly, flat-rate managed services that address key aspects of your IT network including backup and disaster recovery, network infrastructure monitoring and management, and email content filtering. By partnering with some of the industry's most innovative technology vendors, Progent can offer small and mid-size organizations the benefits of the same advanced technology used by the world's largest enterprises. Managed services offered by Progent include:
- ProSight Enhanced Security Protection: Endpoint Security and Microsoft Exchange Filtering
Progent's ProSight Enhanced Security Protection (ESP) managed services offer economical multi-layer protection for physical servers and virtual machines, workstations, smartphones, and Microsoft Exchange. ProSight ESP uses adaptive security and modern behavior analysis for round-the-clock monitoring and reacting to cyber assaults from all vectors. ProSight ESP delivers firewall protection, penetration alarms, device control, and web filtering via cutting-edge technologies incorporated within one agent accessible from a single console. Progent's security and virtualization experts can help you to plan and configure a ProSight ESP deployment that addresses your company's unique requirements and that allows you demonstrate compliance with government and industry information security regulations. Progent will help you specify and configure policies that ProSight ESP will manage, and Progent will monitor your IT environment and react to alarms that call for urgent attention. Progent can also assist your company to install and verify a backup and restore solution like ProSight Data Protection Services (DPS) so you can get back in business rapidly from a destructive security attack such as ransomware. Find out more about Progent's ProSight Enhanced Security Protection unified physical and virtual endpoint security and Exchange email filtering.
- ProSight Data Protection Services: Managed Backup and Disaster Recovery Services
Progent has worked with advanced backup/restore software companies to produce ProSight Data Protection Services (DPS), a portfolio of management outsourcing plans that deliver backup-as-a-service (BaaS). ProSight DPS products automate and monitor your data backup operations and enable transparent backup and fast recovery of important files/folders, apps, system images, and virtual machines. ProSight DPS lets your business recover from data loss resulting from hardware failures, natural disasters, fire, malware such as ransomware, human mistakes, ill-intentioned insiders, or software glitches. Managed backup services available in the ProSight DPS portfolio include ProSight DPS Altaro VM Backup, ProSight 365 Total Backup (formerly Altaro 365 Backup), ProSight ECHO Backup based on Barracuda purpose-built storage, and ProSight DPS MSP360 Hybrid Backup. Your Progent expert can assist you to identify which of these managed services are best suited for your IT environment.
- ProSight Email Guard: Inbound and Outbound Spam Filtering and Data Leakage Protection
ProSight Email Guard is Progent's spam and virus filtering service that incorporates the technology of leading data security vendors to deliver web-based management and world-class protection for all your email traffic. The hybrid structure of Email Guard managed service combines a Cloud Protection Layer with a local gateway device to offer advanced defense against spam, viruses, Denial of Service (DoS) Attacks, Directory Harvest Attacks (DHAs), and other email-borne threats. Email Guard's Cloud Protection Layer acts as a first line of defense and blocks the vast majority of unwanted email from making it to your security perimeter. This reduces your exposure to inbound attacks and saves system bandwidth and storage space. Email Guard's onsite security gateway device adds a deeper layer of analysis for inbound email. For outgoing email, the on-premises gateway provides AV and anti-spam filtering, DLP, and email encryption. The local gateway can also assist Exchange Server to track and safeguard internal email traffic that originates and ends within your security perimeter. For more details, see Email Guard spam filtering and data leakage protection.
- ProSight WAN Watch: Infrastructure Remote Monitoring and Management
ProSight WAN Watch is a network infrastructure management service that makes it simple and affordable for smaller organizations to map out, monitor, enhance and troubleshoot their connectivity hardware such as routers, firewalls, and wireless controllers plus servers, printers, endpoints and other devices. Using cutting-edge RMM technology, ProSight WAN Watch ensures that network maps are kept updated, copies and manages the configuration information of almost all devices on your network, tracks performance, and sends alerts when potential issues are detected. By automating tedious management activities, ProSight WAN Watch can knock hours off ordinary tasks such as making network diagrams, reconfiguring your network, locating appliances that need critical software patches, or resolving performance issues. Learn more about ProSight WAN Watch network infrastructure management services.
- ProSight LAN Watch: Server and Desktop Monitoring
ProSight LAN Watch is Progent's server and desktop remote monitoring managed service that uses state-of-the-art remote monitoring and management techniques to keep your network running at peak levels by checking the state of critical assets that drive your information system. When ProSight LAN Watch detects an issue, an alarm is sent automatically to your specified IT staff and your Progent engineering consultant so that any looming problems can be addressed before they can disrupt productivity. Learn more about ProSight LAN Watch server and desktop remote monitoring consulting.
- ProSight Virtual Hosting: Hosted Virtual Machines at Progent's World-class Data Center
With ProSight Virtual Hosting service, a small business can have its critical servers and applications hosted in a protected Tier III data center on a high-performance virtual host set up and managed by Progent's network support professionals. With Progent's ProSight Virtual Hosting model, the customer owns the data, the operating system software, and the applications. Because the environment is virtualized, it can be moved immediately to an alternate hardware environment without requiring a time-consuming and technically risky configuration process. With ProSight Virtual Hosting, your business is not locked into one hosting provider. Learn more about ProSight Virtual Hosting services.
- ProSight IT Asset Management: Network Documentation Management
ProSight IT Asset Management service is a cloud-based IT documentation management service that makes it easy to capture, update, retrieve and safeguard information related to your network infrastructure, procedures, applications, and services. You can instantly locate passwords or serial numbers and be warned about impending expirations of SSLs or warranties. By cleaning up and organizing your IT documentation, you can eliminate up to half of time spent looking for vital information about your IT network. ProSight IT Asset Management features a centralized location for holding and sharing all documents related to managing your network infrastructure like standard operating procedures and self-service instructions. ProSight IT Asset Management also offers advanced automation for collecting and relating IT information. Whether you're making improvements, performing maintenance, or responding to an emergency, ProSight IT Asset Management delivers the information you require the instant you need it. Find out more about Progent's ProSight IT Asset Management service.
- Active Protection Against Ransomware: Machine Learning-based Ransomware Identification and Remediation
Progent's Active Defense Against Ransomware is an endpoint protection service that utilizes next generation behavior-based machine learning technology to guard endpoints and servers and VMs against modern malware assaults like ransomware and email phishing, which easily get by legacy signature-based anti-virus tools. Progent ASM services protect local and cloud resources and offers a single platform to manage the entire malware attack progression including protection, detection, mitigation, remediation, and post-attack forensics. Key features include single-click rollback using Windows Volume Shadow Copy Service and automatic network-wide immunization against newly discovered attacks. Find out more about Progent's ransomware protection and recovery services.
- Outsourced/Co-managed Help Desk: Support Desk Managed Services
Progent's Support Center managed services enable your IT team to offload Call Center services to Progent or split activity for support services transparently between your in-house network support staff and Progent's nationwide roster of IT support engineers and subject matter experts (SMEs). Progent's Shared Help Desk Service provides a smooth extension of your internal network support staff. End user access to the Help Desk, provision of support services, problem escalation, ticket creation and tracking, efficiency metrics, and maintenance of the service database are consistent whether issues are taken care of by your in-house IT support group, by Progent, or both. Find out more about Progent's outsourced/shared Call Desk services.
- Progent's Patch Management: Software/Firmware Update Management Services
Progent's support services for patch management offer businesses of any size a flexible and cost-effective solution for assessing, testing, scheduling, implementing, and documenting software and firmware updates to your ever-evolving information system. In addition to optimizing the security and reliability of your computer environment, Progent's patch management services free up time for your in-house IT staff to concentrate on line-of-business projects and activities that derive maximum business value from your network. Learn more about Progent's patch management services.
- ProSight Duo Two-Factor Authentication: ID Confirmation, Endpoint Remediation, and Protected Single Sign-on (SSO)
Progent's Duo authentication service plans incorporate Cisco's Duo technology to protect against password theft through the use of two-factor authentication (2FA). Duo enables one-tap identity verification with iOS, Android, and other personal devices. With 2FA, whenever you sign into a protected application and enter your password you are requested to confirm your identity on a device that only you have and that uses a different network channel. A broad selection of out-of-band devices can be utilized as this added means of ID validation including a smartphone or watch, a hardware/software token, a landline telephone, etc. You may designate multiple verification devices. To find out more about ProSight Duo two-factor identity validation services, go to Cisco Duo MFA two-factor authentication services for access security.
- ProSight Reporting: Real-time Reporting for Ticketing and Network Monitoring Platforms
ProSight Reporting is an expanding suite of in-depth management reporting tools created to integrate with the leading ticketing and network monitoring platforms including ConnectWise Manage, ConnectWise Automate, Customer Thermometer, Auvik, and SentinelOne. ProSight Reporting uses Microsoft Graph and features color coding to surface and contextualize critical issues such as inconsistent support follow-up or machines with missing patches. By identifying ticketing or network health problems clearly and in near-real time, ProSight Reporting enhances productivity, reduces management hassle, and saves money. For details, see ProSight Reporting for ticketing and network monitoring platforms.
Download Progent's 10 Benefits of Managed IT Services White Paper
To view a white paper describing why managed services are rapidly replacing the old break/fix model of network support for small and mid-size companies, click:
10 Benefits of Managed IT Services. (PDF - 710 KB)
ProSight Network Audits
Progent's ProSight Network Audits offer a quick and low-cost alternative for small and medium-size organizations to obtain an objective assessment of the health of their IT system. Powered by some of the top remote monitoring and management (RMM) tools available, and supervised by Progent's world-class group of information technology professionals, ProSight Network Audits help you see how closely the configuration of your essential network devices adhere to best practices. The Basic and Advanced options for ProSight Network Audit services are available at a low, one-time cost and deliver instant benefits such as a more manageable Active Directory environment. Both versions also include a year of advanced remote network monitoring and management. Advantages can include easier management, improved compliance with data security regulations, higher utilization of network assets, quicker problem resolution, more dependable backup and recovery, and increased uptime. See more information about ProSight Network Audits IT infrastructure assessment.
The ProSight Ransomware Preparedness Report
The ProSight Ransomware Preparedness Report service is a low-cost service built around a phone discussion with a Progent information assurance consultant. The fact-finding interview is intended to evaluate your organization's preparedness to block ransomware or recover quickly following an assault by a ransomware strain such as Ryuk, Maze, Sodinokibi, Netwalker, Phobos, LockBit or Egregor. Progent will consult with you directly to gather information concerning your current antivirus tools and backup/recovery procedures, and Progent will then deliver a written Basic Security and Best Practices Report document describing how you can follow best practices to build an efficient security and backup system that minimizes your vulnerability to ransomware and meets your company's requirements. For additional information, visit The ProSight Ransomware Preparedness Report.
The Progent Advantage
Progent's team of more than 100 consulting professionals includes certified experts in every aspect of information technology related to small and mid-size businesses. With this breadth of expertise, Progent can be your one-stop source for integrating a comprehensive security solution that delivers immediate business value. In addition to the endpoint protection provided by ProSight Active Security Monitoring, Progent offers other managed services and specially-priced service packages designed to help small and mid-size businesses to deploy, validate, and manage networks that feature enterprise-class information assurance and low total cost of ownership (TCO).
Besides the ProSight suite of ongoing network management services, Progent offers specially priced one-time service bundles to help organizations of any size to achieve and demonstrate compliance with regulatory and industry security standards. These value-priced services include security vulnerability assessment and stealth penetration testing. Progent also offers expert disaster recovery planning consulting and business continuity planning consulting to help ensure you can return to operations quickly in case of a catastrophic failure due to a natural disaster, fire, cyber attack, human error, equipment breakdown, or any other foreseeable disruptive event.
Progent has expertise in all the endpoints, servers and virtual machines that can be protected by ProSight Active Security Monitoring and offers services that include Windows 11 planning and migration consulting, Windows 10 integration, Linux support, Mac OS X and macOS consulting, iPhone and iPad configuration, Android integration, Windows Server 2022 integration expertise, Windows Server 2019 migration consulting, Hyper-V virtualization support, and VMware vSphere consulting. For single-click or manual rollback capability, Progent's Windows Server consultants can help you set up Windows Volume Shadow Copy Service (VSS). Progent can also provide online and onsite access to certified Cisco CCIE consultants to help you plan, protect or troubleshoot your network infrastructure. If your network incorporates cloud resources, Progent offers the guidance of Microsoft Azure consultants, Amazon AWS experts, and Google Cloud integration consultants.
Contact Progent about ProSight Active Security Monitoring Services
To find out more about how Progent can help you set up an affordable, fully managed endpoint security solution with ProSight Active Security Monitoring, call 1-800-993-9400 or visit Contact Progent.
Ransomware 24x7 Hot Line: Call 800-462-8800
Progent's Ransomware 24x7 Hot Line is intended to guide organizations to carry out the urgent first step in mitigating a ransomware assault by containing the malware. Progent's online ransomware expert can assist businesses to identify and isolate breached devices and guard clean assets from being penetrated. If your network has been breached by any strain of ransomware, don't panic. Get help quickly by calling Progent's Ransomware Hot Line at 800-462-8800. For details, see Progent's Ransomware 24x7 Hot Line.