Progent's Security Assessment Packages for Enterprise Networks
Network Security Inventory ScanningProgent offers three levels of set-price security assessment packages designed to provide larger enterprises an objective and thorough evaluation of their network security vulnerability. The assessments are performed by Progent's world-class team of certified security engineers using test procedures ranging from relatively friendly to aggressive. All three levels of security assessment include automated scans of services and ports from outside and inside your network firewall, manual analysis of web applications, manual checking of network configurations by a Cisco-certified CCIE engineer, interpretation of scan results by seasoned network security consultants, creation of a concise high-level summary and presentation of an interactive outbrief for your executives, plus a comprehensive technical report and extensive live outbrief for your IT staff. Progent's security engineers are available to help your IT staff with remediation support, and these services, if requested, are billed at Progent's standard consulting rates.

For Progent's standard security assessment packages, Progent's security engineers collect all information about your environment remotely and require temporary access to a computer inside your firewall for hosting a virtual machine from which to conduct internal testing. Progent also presents live, interactive outbriefs online rather than in person. Progent has found that by performing security assessments remotely rather than on site, the client saves money, experiences less disruption, gets faster results, and still receives a comprehensive and actionable security vulnerability evaluation. In situation that require onsite support, Progent can for an added fee provide a team of security engineers to perform testing and outbriefs at your location anywhere in the United States.

Deliverables of Progent's Security Assessment Packages
All levels of Progent's security vulnerability assessment services include deliverables in the form of written reports and interactive verbal presentations. These deliverables are designed to be informative and actionable so that corporate executives have a greater understanding of network security issues and in-house technical staff have a clear roadmap for mitigating any security vulnerabilities uncovered by Progent's assessment tests.

  • Executive Report:
    This summary document includes a statement of accomplishments, a security score card, a list of top outstanding issues, plus high-level guidance and recommendations for mitigation. The Executive Report is brief and is targeted to a technically unsophisticated audience interested mainly in the business implications of Progent's security findings.
  • Executive Outbrief:
    This verbal presentation provides an overview of your company's security posture and allows executives to interact with the senior engineer from Progent's security team responsible for managing the project. This is an opportunity for executives to drill down into the security issues associated with their network, clarify any questions they have about the observations and recommendations contained in Progent's Executive Report, and obtain a broader perspective of today's worldwide security environment.
  • Technical Report:
    This comprehensive security assessment document includes the rules of engagement, goals, testing methodology, findings, recommendations, risks, suggestions about how to move forward, and relevant raw data collected by Progent. This report is intended for technical personnel who can manage the remediation activity proposed by Progent, and the assessment document provides sufficient detail to allow competent network engineers to implement the recommended fixes without further assistance from Progent. Progent's network consultants are available to help with mitigation work at Progent's standard consulting rates.
  • Technical Outbrief:
    This in-depth technical presentation explains Progent's findings and recommendations to your IT staff. This presentation can last for up to two hours and allows your technical personnel to ask questions and discuss with Progent's security engineers the advantages or pitfalls of various mitigation alternatives and techniques.
Level 1 Package
With the Level 1 Security Assessment package, Progent's engineers look for security vulnerabilities and improperly configured software. Enumeration is accomplished by running external and internal scans of open ports and services. Progent also utilize both open and commercial tools to test web applications for common vulnerabilities such as blind SQL injection, XSS, command injection, unsafe CGIs, etc. Progent also performs a basic manual review of the web application.

Level 2 Package
The Level 2 package includes all Level 1 activity plus verification, exploitation, limited pivoting for expansion, and examination of trusted processes and relationships that may expose attack vectors. Progent also performs web application verification and exploitation, plus a more thorough manual review of web application logic.

Level 3 Package
The Level 3 package is the most aggressive and includes everything in Levels 1 and 2 plus phishing attacks, malicious email, social engineering, MITM attacks, leveraging compromised devices and pillaging them for sensitive data, and physical testing of controls where appropriate. Progent also tests the web application at every user level and extensively reviews web application logic. This service does not include an examination of web application source code.

Major Benefits of Progent's Security Assessment Packages for Enterprise Networks
Progent's Security Assessment Packages offer enterprises the advantages associated with a third-party consulting firm with world-class experience and know-how in evaluating the security and mitigating the vulnerabilities of large, sophisticated information networks and web applications. Key characteristics of Progent's security evaluation services include:

  • Objective: Progent's security team offers you an unbiased and professional look at your security vulnerabilities
  • Certified: Progent's security engineers have been awarded the top security certifications in the industry including Cisco CCIE, CISA, CISM, GIAC, and ISSAP
  • Actionable: Progent's analyses and recommendations give you a solid blueprint for better protecting your network assets
  • Effective: Knowledge of today's security environment and the latest hacking techniques allows Progent's seasoned security consultants to perform thorough testing and make sensible recommendations
  • Budget Friendly: Progent's Security Assessment Packages are competitively priced and, because they are offered at a set fee, contain no surprises and are easy to budget for. If you utilize Progent to assist with remediation work, Progent's knowledge of your specific network environment will reduce the time required to implement and verify fixes, allowing you to keep IT service costs to a minimum.
Download the Enterprise Security Assessment Datasheet
To download a single-page printable datasheet describing Progent's three set-price Security Assessment service packages for enterprises, click:
Enterprise Security Assessment Packages

Additional Network Security Auditing Services Available from Progent
Progent offers a selection of additional security evaluation and enhancement services intended to test your network for security risks, validate your compliance with governmental or industry security requirements, and remediate potential weaknesses in your network protection:

  • Small Business Security Inventory Evaluation Packages
    Progent offers two Security Inventory evaluation packages for small businesses, the External Network Security Inventory and the Internal Network Security Inventory, which assess different aspects of network security vulnerability and which you can use separately or together. Both packages offer features designed to meet the needs of small businesses who want to take a more proactive role in making their networks safe from malicious assaults but who don't have the time or the budget to manage an exhaustive enterprise-class network security audit.
  • Stealth Penetration Testing
    Progent can manage comprehensive network penetration testing without warning internal IT managers. Stealth Penetration Testing uncovers whether in-place network security monitoring tools like penetration detection alerts and event log monitoring are properly configured and actively monitored. Progent security experts can utilize various popular hacker techniques to expand security holes to acquire an understanding of the full environment and detect how many internal systems can be connected to and compromised. This type of vulnerability testing can show the full scope of the security gaps of an information system.
  • Security Evaluation Consulting
    Progent's expert security assessment and compliance consulting support services can assist your company to validate your operations and policies and check your network infrastructure to enable you to design the maximum degree of protection into your information system. Progent's certified security engineers can also manually check your web applications for security weaknesses and can conduct company-wide audits to confirm your adherence to key security standards including HIPAA, FISMA, NIST, PCI, and ISO.
Contact Progent for Network Security Auditing
If you're trying to find additional information about Progent's computer security inventory scanning offerings, phone Progent at 800-993-9400 or visit Contact Progent.

Ransomware 24x7 Hot Line: Call 800-462-8800
Progent's Ransomware 24x7 Hot Line is intended to assist you to carry out the time-critical first step in responding to a ransomware assault by stopping the bleeding. Progent's online ransomware engineer can assist you to identify and quarantine breached devices and guard clean resources from being compromised. If your network has been penetrated by any version of ransomware, don't panic. Get immediate help by calling Progent's Ransomware Hot Line at 800-462-8800. For more information, see Progent's Ransomware 24x7 Hot Line.



An index of content::

  • 24 Hour SQL Server 2019 Consulting Organization St Louis, MO Network Support Technician Microsoft SQL Server 2016 St Louis Missouri, USA
  • 24-Hour Windows Server 2008 R2 Online Technical Support 24x7 Network Consulting Windows Server 2008 R2
  • Cybersecurity Vulnerability Evaluation Engineers
  • 24x7x365 Network Security Bulletins Protection 24 Hour Critical Security Bulletins Firewall Support

  • Live Online PowerPoint Classes
    Online Microsoft Publisher Training Server Integrators

    Progent offers live remote training for popular desktop apps and operating systems including Office and Microsoft 365 Excel, Word, Publisher and Visio plus Acrobat Writer, Adobe Photoshop, Crystal Reports, and Windows 10 and 8.1. Online instruction provides the benefits of conventional in-person seminars, including instant communication between clients and trainers, but eliminates the costs of transportation and the challenge of trying to synchronize the availability of many trainees. Offered to individuals or classes of all sizes, Progent's live online training permits the trainer to run the class from a remote office and the clients can be dispersed throughout an office or across the country. Live online learning supports powerful learning mechanisms such as virtual white boards, electronic hand-raising, and collaborative applications. Sessions can be brief and targeted to specialized topics or longer in duration and broader in scope.

  • 24x7x365 Offsite Workforce Newark Consulting - Collaboration Systems Expertise Newark, NJ At Home Workforce Consulting Services near Newark - Collaboration Technology Consulting Experts Newark, United States
  • After Hours Remote Workforce Springfield Consulting Experts - Data Protection Technology Consulting Services Springfield Massachusetts Teleworkers Expertise in Springfield - Backup/Recovery Technology Guidance Springfield Chicopee Westfield
  • At Home Workers Parsippany Consultants - Collaboration Systems Consulting Services Parsippany-Wayne, New Jersey, U.S.A. Best Parsippany Remote Workers Collaboration Technology Guidance Parsippany-Fairfield, New Jersey

  • Information Technology Consulting Mac Email client for Exchange
    Consultants Microsoft Outlook for Mac

    Exchange Servers and Macintosh workstations can work together efficiently. Progent's Mac and Microsoft certified experts can show you how to set up Microsoft Entourage and Exchange so your Apple Macintosh users can work closely with teammates who use Outlook. With Exchange and Entourage 2008 or 2004 for Mac, Exchange and Mac software can coexist, enabling Mac users to receive and send email, examine the GAL, copy addresses, synchronize appointments, and alert people to conferences via your Microsoft Exchange account. Progent will make sure that your Microsoft Server is properly configured and that WebDAV and Outlook Web Access are working. Progent also can provide specialized onsite Entourage education.

  • Automated Desktop Inventory Help and Support 24-7 Consultant Services Server and Desktop Monitoring and Reporting
  • Cisco On-Call Services Forsyth County North Carolina Cisco Information Technology Consulting Firms Winston-Salem
  • Citrus Heights Outsourcing Small Business Network Consulting Firms Roseville
  • Contract Job Microsoft MCTS Support Fort Wayne, Allen County Security Engineer Telecommuting Job Fort Wayne International Airport FWA
  • Cybersecurity Team Security São Paulo CISSP Firewall Network Install
  • Exchange 2010 Server IT Consultants Allentown, PA 24x7 Exchange Server 2016 Consulting Team Allentown, Lehigh County
  • Fayette County Kentucky Consulting for Lexington-Fayette IT Service Companies After Hours Consulting Support for Lexington-Fayette IT Service Companies Lexington, Fayette County, America
  • 24/7 Security Evaluation Engineer
  • Immediate Sioux Falls DopplePaymer Ransomware Rollback Sioux Falls Ryuk Crypto-Ransomware Business-Recovery Sioux Falls
  • 24 Hour Web Application Security Evaluation Professionals
  • Indianapolis Remote Workforce Help Desk Augmentation Consulting Indianapolis Indianapolis, America Offsite Workforce Indianapolis Consultants - Call Desk Outsourcing Consulting Experts
  • Largest Networking Services West Virginia West Virginia Network Recovery
  • Midtown Manhattan-Upper West Side, NY Midtown Manhattan Ransomware Settlement Negotiation Expertise Midtown Manhattan Crypto-Ransomware Settlement Expertise
  • Norfolk Microsoft Dynamics GP (Great Plains) Customization Support Services Norfolk Virginia Norfolk Norfolk Microsoft Dynamics GP (Great Plains) Reporting Consultants
  • One Hour of Free Consulting Technology Professional Special Offer for Small Businesses Consulting Services
  • Pittsburgh International Airport PIT Pittsburgh Specialists for Network Service Firms Consulting Experts for IT Service Providers in Pittsburgh - Transparent Temporary Support Staff Assistance Allegheny County Pennsylvania
  • Ransomware System Rebuild Springfield, MA, USA Locky Ransomware Hot Line Springfield Massachusetts

  • Progent Management Information Technology Outsourcing Companies
    Progent Management Team Technology Consulting

    Progent's management team includes industry professionals with years of experience providing computer consulting, troubleshooting, and long-term IT planning to organizations ranging in size from startups to global enterprises. Great support requires great people, and Progent has assembled a management team able to provide customers with the best service value in the industry.

  • Remote Help Desk Small Office Computer Consultant Cedar Rapids Iowa Cedar Rapids, IA Small Business Network Information Technology Management
  • Security Evaluation Engineer
  • Remote Offsite Workforce Consulting Services in Florianópolis - Endpoint Management Systems Consulting Experts Florianópolis Florianópolis Remote Workers Endpoint Management Solutions Guidance Florianópolis
  • SQL Server 2012 Design Consultant Virginia Beach South Hampton Roads, United States Microsoft SQL 2014 Technology Consulting Virginia Beach
  • SharePoint Server 2007 Support and Help Cabo Frio Cabo Frio Microsoft SharePoint 2010 Specialists
  • Small Business IT Outsourcing Company Mission Viejo, California Mission Viejo, California Information Technology Outsourcing Companies
  • Solaris Outsourcing Technical Support Linux Specialist
  • South Hampton Roads IT Staff Temps for Network Support Groups Chesapeake Staffing Support South Hampton Roads
  • Southlake Consulting Experts for Southlake Computer Support Organizations Southlake Consulting Expertise for IT Service Firms Southlake-Grand Prairie, TX

  • Consulting SentinelOne Endpoint Protection
    SentinelOne Endpoint Protection Engineers

    Progent is a dealer and integrator for SentinelOne's Singularity product line, a subscription-based, cloud-centric threat management solution that incorporates AI software and advanced services to deliver cutting-edge endpoint detection and response.

  • Tacoma Conti Crypto-Ransomware Rollback Olympia, Washington Tacoma Lockbit Crypto-Ransomware Recovery SeaTac Airport SEA

  • Microsoft Exchange 2003 Information Technology Consulting
    Microsoft Exchange Upgrade Configuration

    Progent's Microsoft certified support team can show you how to design and deploy an efficient in-place Microsoft Exchange 2003 migration plan that avoids network downtime, simplifies ongoing service demands, and makes your Exchange 2003 Server easy to administer. For complicated multiple server or multi-site upgrades, Progent offers the experience to complete your move rapidly and economically. Progent's Microsoft Exchange 2003 help, troubleshooting, and consulting services include expertise with the configuration of outside vendor enhancements of Microsoft Exchange 2003 Server that are best aligned to your business needs.

  • Tech Support For Small Business Midtown Manhattan, New York NYC Midtown Manhattan Computer Network Consulting
  • Cybersecurity Vulnerability Evaluation Professional
  • Technology Consulting Services Small Company 24 Hour Small Company Configuration

  • Mac Virus Recovery IT Consulting
    Mac Disaster Recovery Online Troubleshooting

    Progent's CISM-certified security consultants can show you how to protect your Apple Mac environment through professional support offerings such as performing security audits, clean up after virus and worm attacks, configuring firewalls, implementing safe off-site and mobile access, deploying monitoring programs for defense against viruses, spam, and directory harvest attacks, and creating a company-wide security plan adapted for the particular goals of your business network.


    © 2002-2023 Progent Corporation. All rights reserved.