Progent's Security Assessment Packages for Enterprise Networks
Network Security Inventory ScanningProgent offers three levels of set-price security assessment packages designed to provide larger enterprises an objective and thorough evaluation of their network security vulnerability. The assessments are performed by Progent's world-class team of certified security engineers using test procedures ranging from relatively friendly to aggressive. All three levels of security assessment include automated scans of services and ports from outside and inside your network firewall, manual analysis of web applications, manual checking of network configurations by a Cisco-certified CCIE engineer, interpretation of scan results by seasoned network security consultants, creation of a concise high-level summary and presentation of an interactive outbrief for your executives, plus a comprehensive technical report and extensive live outbrief for your IT staff. Progent's security engineers are available to help your IT staff with remediation support, and these services, if requested, are billed at Progent's standard consulting rates.

For Progent's standard security assessment packages, Progent's security engineers collect all information about your environment remotely and require temporary access to a computer inside your firewall for hosting a virtual machine from which to conduct internal testing. Progent also presents live, interactive outbriefs online rather than in person. Progent has found that by performing security assessments remotely rather than on site, the client saves money, experiences less disruption, gets faster results, and still receives a comprehensive and actionable security vulnerability evaluation. In situation that require onsite support, Progent can for an added fee provide a team of security engineers to perform testing and outbriefs at your location anywhere in the United States.

Deliverables of Progent's Security Assessment Packages
All levels of Progent's security vulnerability assessment services include deliverables in the form of written reports and interactive verbal presentations. These deliverables are designed to be informative and actionable so that corporate executives have a greater understanding of network security issues and in-house technical staff have a clear roadmap for mitigating any security vulnerabilities uncovered by Progent's assessment tests.

  • Executive Report:
    This summary document includes a statement of accomplishments, a security score card, a list of top outstanding issues, plus high-level guidance and recommendations for mitigation. The Executive Report is brief and is targeted to a technically unsophisticated audience interested mainly in the business implications of Progent's security findings.
  • Executive Outbrief:
    This verbal presentation provides an overview of your company's security posture and allows executives to interact with the senior engineer from Progent's security team responsible for managing the project. This is an opportunity for executives to drill down into the security issues associated with their network, clarify any questions they have about the observations and recommendations contained in Progent's Executive Report, and obtain a broader perspective of today's worldwide security environment.
  • Technical Report:
    This comprehensive security assessment document includes the rules of engagement, goals, testing methodology, findings, recommendations, risks, suggestions about how to move forward, and relevant raw data collected by Progent. This report is intended for technical personnel who can manage the remediation activity proposed by Progent, and the assessment document provides sufficient detail to allow competent network engineers to implement the recommended fixes without further assistance from Progent. Progent's network consultants are available to help with mitigation work at Progent's standard consulting rates.
  • Technical Outbrief:
    This in-depth technical presentation explains Progent's findings and recommendations to your IT staff. This presentation can last for up to two hours and allows your technical personnel to ask questions and discuss with Progent's security engineers the advantages or pitfalls of various mitigation alternatives and techniques.
Level 1 Package
With the Level 1 Security Assessment package, Progent's engineers look for security vulnerabilities and improperly configured software. Enumeration is accomplished by running external and internal scans of open ports and services. Progent also utilize both open and commercial tools to test web applications for common vulnerabilities such as blind SQL injection, XSS, command injection, unsafe CGIs, etc. Progent also performs a basic manual review of the web application.

Level 2 Package
The Level 2 package includes all Level 1 activity plus verification, exploitation, limited pivoting for expansion, and examination of trusted processes and relationships that may expose attack vectors. Progent also performs web application verification and exploitation, plus a more thorough manual review of web application logic.

Level 3 Package
The Level 3 package is the most aggressive and includes everything in Levels 1 and 2 plus phishing attacks, malicious email, social engineering, MITM attacks, leveraging compromised devices and pillaging them for sensitive data, and physical testing of controls where appropriate. Progent also tests the web application at every user level and extensively reviews web application logic. This service does not include an examination of web application source code.

Major Benefits of Progent's Security Assessment Packages for Enterprise Networks
Progent's Security Assessment Packages offer enterprises the advantages associated with a third-party consulting firm with world-class experience and know-how in evaluating the security and mitigating the vulnerabilities of large, sophisticated information networks and web applications. Key characteristics of Progent's security evaluation services include:

  • Objective: Progent's security team offers you an unbiased and professional look at your security vulnerabilities
  • Certified: Progent's security engineers have been awarded the top security certifications in the industry including Cisco CCIE, CISA, CISM, GIAC, and ISSAP
  • Actionable: Progent's analyses and recommendations give you a solid blueprint for better protecting your network assets
  • Effective: Knowledge of today's security environment and the latest hacking techniques allows Progent's seasoned security consultants to perform thorough testing and make sensible recommendations
  • Budget Friendly: Progent's Security Assessment Packages are competitively priced and, because they are offered at a set fee, contain no surprises and are easy to budget for. If you utilize Progent to assist with remediation work, Progent's knowledge of your specific network environment will reduce the time required to implement and verify fixes, allowing you to keep IT service costs to a minimum.
Download the Enterprise Security Assessment Datasheet
To download a single-page printable datasheet describing Progent's three set-price Security Assessment service packages for enterprises, click:
Enterprise Security Assessment Packages

Additional Network Security Auditing Services Available from Progent
Progent offers a selection of additional security evaluation and enhancement services intended to test your network for security risks, validate your compliance with governmental or industry security requirements, and remediate potential weaknesses in your network protection:

  • Small Business Security Inventory Evaluation Packages
    Progent offers two Security Inventory evaluation packages for small businesses, the External Network Security Inventory and the Internal Network Security Inventory, which assess different aspects of network security vulnerability and which you can use separately or together. Both packages offer features designed to meet the needs of small businesses who want to take a more proactive role in making their networks safe from malicious assaults but who don't have the time or the budget to manage an exhaustive enterprise-class network security audit.
  • Unannounced Penetration Testing
    Progent can perform in-depth penetration exercises without the knowledge of internal IT resources. Unannounced Penetration Testing uncovers whether existing network security monitoring mechanisms such as intrusion detection alarms and event log tracking are properly set up and actively managed. Progent security experts can utilize a number of hacker techniques to extend attack vectors to gain an understanding of the full network environment and determine how many internal systems can be accessed and compromised. This type of vulnerability checking can expose the full extent of the security flaws of an IT environment.
  • Security Assessment Consulting Services
    Progent's expert network security audit and compliance testing support services can assist your company to validate your procedures and policies and assess your network environment to allow you to build the maximum level of security into your information system. Progent's security engineers can also manually check your web-based applications for security vulnerability and can perform corporate-wide security audits to confirm your company's compliance with major security standards such as HIPAA, NIST, and ISO.
Contact Progent for Network Security Auditing
If you're trying to find more information about Progent's network security inventory packages, phone Progent at 800-993-9400 or see Contact Progent.



An index of content::

  • 24-7 Stamford-Milford Security Consulting Firms Stamford Small Business Network Consulting Companies
  • 24x7 Apple iPhone IT Consultant Apple iPad Integration

  • Amazon S3 disaster recovery Developer Firm
    Development Company Amazon cloud AMI

    Progent offers cost-effective remote support to assist businesses to integrate Amazon AWS cloud services including Amazon EC2 for virtual server hosting, Amazon Simple Storage Service (Amazon S3), and Glacier. Progent can assist your IT team with every aspect of Amazon AWS integration including needs analysis, preparedness evaluation, system design and review, pilot testing, deployment, centralized administration, performance tuning, licensing management, disaster recovery mechanisms, and security strategies.

  • 24x7x365 Work from Home Employees Consulting near Stockton - VoIP Solutions Consulting Experts Lodi, Escalon CA Lathrop, Ripon CA Teleworkers Stockton Consultants - IP Voice Technology Consultants
  • Atlanta Hartsfield-Jackson Airport ATL Atlanta Teleworkers Integration Consultants Atlanta Work from Home Employees Set up Consulting Experts ATL
  • Security Vulnerability Assessment Consult
  • Best Security Certification Security Springfield, MA CISSP Consultants Hampden County Massachusetts
  • Boston Consultancy BlackBerry Software Boston BlackBerry Exchange Computer Consulting Firm
  • CISSP Compliance Audit Charlotte North Carolina Security Consultancies CISSP Charlotte
  • Carlsbad Technical Support Carlsbad, California Migration Companies
  • Cisco Network Design Consultant Grand Rapids Michigan Grand Rapids Cisco Troubleshooting
  • Cisco Small Business IT Outsourcing Companies Cisco Integration Firm Brooklyn

  • Network Consulting Monitoring and Reporting
    Microsoft and Cisco Authorized Expert Technical Support Network Monitoring

    Remote continuous monitoring, automated alerts, and actionable reports are crucial to preserving the health of your network and avoiding unnecessary and expensive disruptions. Remote Monitoring and Management (RMM) solutions have advanced so far that businesses of any size can afford a level of protection that was previously limited to large enterprises. Progent offers a variety Remote Monitoring and Management options delivered as economical services designed to help your company to detect and resolve a an array of IT network problems before they can hurt productivity.

  • Cisco Small Office Network Consulting Boston, MA New England Biggest Migration Companies Cisco
  • Cisco Support Specialist California - Los Angeles, San Diego, Long Beach, Fresno Cisco Small Business IT Outsourcing Los Angeles, San Diego, Long Beach, Santa Ana, Anaheim, Riverside, Bakersfield, CA
  • Computer Network Support Group Exchange 2019 Sacramento CA Exchange Server 2019 Networking Specialist Sacramento - Folsom
  • Emergency Phone Support Networking Consultant Los Angeles County California Lancaster Antelope Valley Emergency Phone Support Security Consultants
  • Exchange Server 2013 IT Support Las Vegas, Clark County Exchange 2003 Server Migration Consulting
  • Fargo-Bismarck Urgent Technology Consulting Slackware Linux, Solaris, UNIX Gentoo Linux, Solaris, UNIX Online Consulting Fargo-Williston
  • Firewall Security Audits Southlake-Irving 24-Hour Security Security Auditing Southlake-Flower Mound
  • Google Cloud Disaster Recovery Engineers Google Cloud AI Building Blocks Consulting Services

  • Email White Lists Engineers
    Emergency Technology Professional ProSight Email Content Filtering

    Progent's ProSight Email Guard uses the services and infrastructure of top information security companies to deliver web-based management and comprehensive protection for your email traffic. The powerful architecture of Progent's Email Guard managed service integrates a Cloud Protection Layer with a local security gateway device to offer complete defense against spam, viruses, Denial of Service (DoS) Attacks, Directory Harvest Attacks, and other email-based threats. The Cloud Protection Layer acts as a preliminary barricade and keeps most threats from reaching your security perimeter. This reduces your vulnerability to inbound threats and saves system bandwidth and storage space. ProSight Email Guard's onsite gateway device provides a deeper layer of inspection for incoming email. For outgoing email, the on-premises gateway provides AV and anti-spam filtering, DLP, and email encryption. The on-premises gateway can also help Microsoft Exchange Server to track and safeguard internal email traffic that originates and ends inside your corporate firewall.

  • IT Consultants BlackBerry BlackBerry BES Server Setup Service Appleton-Oshkosh
  • IT Consultants Dynamics GP Custom Software Dynamics GP Software Development Support and Setup
  • Immediate Offsite Workforce Consultants near Allen - VoIP Technology Assistance Allentown Pennsylvania At Home Workforce Allen Consulting - VoIP Solutions Expertise Allentown Bethlehem Easton
  • Security Assessment Consultant
  • Internet Security and Acceleration Server Consulting ISA 2004 Standard Edition Server Integration Support
  • Largest Network Designers SharePoint Rhode Island Rhode Island Largest SharePoint Security Consulting Company
  • Maine Network Help Connecticut IT Outsourcing Firm
  • Manhattan Beach Immediate Manhattan Beach CryptoLocker Repair Manhattan Beach CryptoLocker Removal Manhattan Beach-El Segundo, California
  • Maricopa County Arizona 24-7 Telecommuters Expertise near me in Scottsdale - Collaboration Solutions Guidance At Home Workforce Scottsdale Consultants - Collaboration Systems Assistance
  • Microsoft Expert Services Exchange Server 2010 Migration Immediate Exchange 2003 to Exchange 2010 Upgrade Specialists
  • Microsoft Project Server My Sites Engineer Microsoft Project Server 2013 Support Services
  • Microsoft Remote Support Career Cisco CCVP Consultant Job Openings Hialeah South Florida
  • Microsoft SQL Server Information Technology Consulting Companies MS SQL Server Integration Firm
  • Network Consulting Firm Long Beach-Lakewood Long Beach, California Network Manager
  • Network Designers Exchange Server 2016 Sacramento - Citrus Heights Exchange Server 2013 Outsourcing Companies Davis CA

  • macOS Remote Engineers
    Consultant Services Mac Phone-based

    Progent offers nationwide online help and troubleshooting services for businesses that run Apple Mac OS X environments or whose information systems include a mix of Mac with Microsoft Windows technology. Progent's engineers offer Apple macOS and Mac OS X clients a range of services including desktop assistance, migration to the latest version of Mac OS X from earlier versions of Mac, plus expertise with Apple macOS and OS X application software. Progent's specialists in Apple technology can also help you with iPhone and Apple iPad synchronization and troubleshooting, or moving to iCloud. Remote network consulting provides optimum return for your IT budget by extending user efficiency and shortening the time charged for network repair services. Advanced remote support tools and experienced technicians and consultants combine to enable Progent to handle the majority of network issues without wasting time and money by going to your site. In the vast majority of cases your IT issues can be dealt with by telephone or via a combination of phone help and remote access. Progent can offer the services of Cisco certified CCIE infrastructure engineers and CISM premier security professionals to assist you with the toughest system issues.

  • Networking Outsourcing IT Support Amarillo Texas Microsoft Network Configuration Amarillo Bishop Hills
  • Novato, Larkspur BlackBerry BES Server Computer Tech Designers BlackBerry BPS San Rafael Marin County

  • 24x7x365 ProSight infrastructure documentation management Professionals
    ProSight password management Engineers

    Progent's ProSight IT Asset Management is an IT infrastructure documentation management service that makes it easy to create, update, retrieve and safeguard data related to your IT infrastructure, processes, business apps, and services. You can quickly find passwords or IP addresses and be alerted about upcoming expirations of SSL certificates or domains. By updating and managing your IT documentation, you can save up to 50% of the time spent searching for vital information about your network. ProSight IT Asset Management includes a common repository for storing and sharing all documents related to managing your business network such as standard operating procedures and self-service instructions. ProSight IT Asset Management also supports advanced automation for collecting and associating IT information. Whether youíre planning improvements, doing regular maintenance, or reacting to a crisis, ProSight IT Asset Management gets you the knowledge you require the instant you need it.

  • Palo Alto-Mountain View Small Business Network Support Palo Alto-Mountain View Computer Network Support Group
  • Pasadena, California Onsite Technical Support Small Office Network Consultant Pasadena-Altadena
  • Security Consultants Emergency Phone Support Midland Texas Midland Urgent Network IT Consulting

  • Nebraska Small Office IT Support
    Server Installation Wyoming

    Progentís Technical Response Center offers national remote support for Windows and Cisco-based small business information networks. Progent's Microsoft and Cisco-Premier service engineers provide telephone help and online secure network connection to isolate and resolve technical problems rapidly and affordably. The breadth of IT expertise represented by Progent's staff of nationwide service professionals makes it possible to escalate even the most difficult network issues to appropriate specialists as required.

  • Small Office IT Consulting Burlingame San Mateo Network Designers
  • Sonoma County Server Troubleshoot Expert Server Help Sonoma County

  • Microsoft System Center Operations Manager On-site Technical Support
    Consultant System Center MOM

    Progent's Microsoft-certified consulting experts have more than 10 years of experience designing, deploying, optimizing and troubleshooting Microsoft SCOM environments and can provide companies of any size advanced remote or onsite consulting support for System Center 2012 Operations Manager. Progent can assist you to plan a topology for Microsoft SCOM 2012 servers that provides the performance and availability required to monitor your datacenter effectively, whether your infrastructure are on-premises, cloud-based, or a mixed solution. Progent's SCOM consultants can also assist you to install and customize SCOM 2012 management packs according to best practices for monitoring network fabric and Microsoft and 3rd-party applications and services. In addition, Progent can deliver responsive remote or onsite troubleshooting to help you to remediate critical issues detected by SCOM 2012.

  • Web Application Security Assessment Consultants
  • Support Services Apple OS X Tiger Macintosh OSX Outsourcing
  • Top Ranked Train Adobe After Effects Digidesign Pro Tools Class
  • Urgent SQL Server 2019 IT Technical Support Company Reno, NV Microsoft SQL Server Small Business IT Support Firms Washoe County Nevada
  • West Virginia Outsourcing Services Charleston West Virginia Computer Consulting Company
  • Windows Server 2016 Tech Outsourcing Winston-Salem Piedmont Triad Windows Server 2016 Information Technology Installation Service Winston-Salem Piedmont Triad
  • Windows Small Business IT Outsourcing Services Los Angeles, San Diego, Long Beach, Santa Ana, Anaheim, Riverside, Bakersfield, CA Windows Technician Los Angeles, San Diego, Long Beach, Santa Ana, Anaheim, Riverside, Bakersfield, CA

  • © 2002-2020 Progent Corporation. All rights reserved.