Fast and Affordable Security Checkups for Small Businesses
Network Security Inventory ScanningIs your small business network keeping pace with today's security environment? Are you protecting your network assets? How difficult would it be for a hacker to break into your information system, and what steps can you take to prevent it? Progent has developed a fast and affordable way for small businesses to answer these questions without disrupting their network operations.

Progent's Network Security Inventory packages are fixed-price service bundles that rely on advanced network scanning technology and the certified expertise of Progent's security engineers to evaluate the vulnerability of your network and provide recommendations for simple ways you can mitigate your security risk. Progent offers two packages, the External Network Security Inventory and the Internal Network Security Inventory, which assess different aspects of network security exposure and which you can use separately or together. Both packages offer features designed for the needs of small businesses who want to take a more proactive role in making their networks safe from malicious assaults but who don't have the time or the budget to manage an exhaustive enterprise-class network security audit.

Top Features and Benefits of Progent's Security Inventory Packages for Small Business Networks
Progent's Security Inventory packages offer an array of features and benefits especially designed to address today's increasingly hostile security environment in which all business networks operate but also to take into account the financial and operational realties of small companies. Implemented together or separately, Progent's External and Internal security scanning packages help small businesses achieve a high level of network protection at little cost or hassle.

  • Low-cost:
    Progent's Network Security Inventory packages are inexpensive and are offered at a set-price, so you know in advance what it will cost to understand the state of your network security. Potential attack vectors detected by Progent's security scans are typically easy to fix and involve configuration issues with network operating systems, applications, and devices. If you have not regularly utilized security scans in the past, you get a lot of bang for your buck. Generally, a great deal of security risk associated with small business networks can be substantially reduced at very little expense.
  • Fast:
    The scanning, analysis, and reporting processes involved in Progent's Network Security Inventory packages can usually be completed in one business day. This fast turnaround can reduce the window during which your network is exposed to attack by allowing you to move quickly into remediation mode. This also reduces the stressful suspense management may feel not knowing whether information assets are safe, and minimizes the time that your network manager is diverted from other responsibilities. A combination of advanced scanning technology and experienced engineers allow Progent's security team to deliver results quickly and at low cost to the customer.
  • Remote Scanning:
    The scanning phase of Progent's Network Security Inventory packages are managed remotely from a secure Progent site. In the case of the Internal Network Security Inventory package, the scan is itself run from an onsite machine made available by the customer. The setup procedure for external or internal scans can accomplished in minutes, and the collected data is analyzed offsite by Progent's certified security professionals. By utilizing remote tools to conduct the Network Security Inventory packages, Progent saves significant time and money, which in turn allows Progent to offer these packages at prices that small businesses can afford.
  • Proactive:
    Progent's Network Security Inventory packages are not intended to detect and remove viruses or other malware resulting from a successful attack on your network, but to uncover common security gaps before they are exploited by malicious sources. Although larger enterprises routinely utilize third-party consulting firms like Progent to conduct vulnerability scans in order to benefit from an objective risk assessment, small businesses with limited IT budgets and technical expertise often wait until their networks are hacked before getting serious about security. By offering vulnerability scanning packages that are fast, affordable, and effective, Progent makes it a no brainer for small businesses to take the lead in protecting their network assets.
  • Certified Security Engineers:
    Progent's security engineers have been certified by some of the industry's most prestigious standards institutions including the Information Systems Audit and Control Association (ISACA), the International Information Systems Security Certification Consortium (ISC), and the SANS Institute. Progent's security team has worked with major enterprises to assess and enhance network security. With Progent's Network Security Inventory packages, small businesses get the benefit of vulnerability assessments from world-class security professionals without requiring an enterprise-class IT budget.
  • Effective:
    Progent's security engineers are familiar with the sophisticated tools and techniques hackers employ to break into information networks to steal and control resources and data. The majority of these intrusion attempts are based on exploiting security gaps that are surprisingly easy to block. Both of Progent's Network Security Inventory packages address a separate range of potential security vulnerabilities often found in small business IT networks. Either package will provide information to help you enhance your network protection. Using the external and the internal scan packages together will allow you to secure your network even more.
  • Actionable Reporting:
    The data collected from Progent's Network Security Inventory scans are analyzed by a certified engineer on Progent's security team. As part of the package, Progent's security engineer will prepare and send a report that summarizes the results of the vulnerability scan and suggests mitigation procedures that can be performed by Progent, by your in-house IT support staff, or by a competent third-party security consulting firm. Any remedial work requested from Progent will be performed as a separate project for which Progent can provide a time estimate and for which Progent will bill at standard consulting rates.
External Security Inventory Scan
Progent's External Network Security Inventory package tests for the threat levels of the open ports and services on your network that are exposed outside your firewall. These ports and services can include email, web sites, eCommerce applications, remote access tools, or any service that requires or is granted communication with the world beyond your firewall. This is a favorite hunting ground of hackers and, in many small businesses, a rich source of attack vectors.

Progent's security team will examine the scanned data, produce a report that summarizes and interprets the results, and make suggestions on efficient ways to reduce your exposure to attack. The external scan will not disrupt your ongoing network operations or noticeably impact your system performance. Progent offers this service package at a low set price that covers setup, scanning, analysis, reporting, and recommendations. The set price does not include remediation services which may be suggested. These follow-on services can be performed by any qualified security engineer and are available from Progent at standard consulting rates.

Internal Security Inventory Scan
Many security attacks originate from inside your company firewall and can be the result of careless employees who attach compromised laptops to your network, workers who try to access restricted information or gain unauthorized administration rights, or lurkers in close physical proximity to your wireless access points. Progent's Internal Network Security Inventory package tests for vulnerabilities within your firewall by looking for open ports and services that are not exposed to the outside world but that could be a source of trouble if improperly configured. The internal scan can be executed from any computer inside your security perimeter that you make temporarily available to Progent's security engineer. Progent will remotely download a virtual machine and the required scanning tools to the internal computer you have assigned, launch the scan, and transfer the collected data to a secure Progent site. Progent does not need to make an expensive onsite service call and the time required to install and subsequently remove the scanning software is negligible.

Progent's security engineer managing the Internal Security Inventory Scan will examine the scanned data and create a report that summarizes the results and suggests any mitigation measures that may be required. Progent offers this service package at a low set price that covers setup, scanning, analysis, reporting, and recommendations. The set price does not include remediation services which may be suggested. These follow-on services can be performed by any qualified security engineer and are available from Progent at standard consulting rates.

Download the Security Inventory Scan Datasheet
To download a single-page printable datasheet describing Progent's two set-price Security Inventory Scan service packages for small businesses, click:
Security Inventory Scanning Packages (PDF - 104 KB).

Additional Network Security Auditing Services Available from Progent
Progent offers a variety of additional services designed to check your network for vulnerabilities, verify your compliance with governmental or industry security standards, and mitigate critical gaps in your network's defenses:

  • Enterprise Vulnerability Assessment Service Packages
    Progent can provide a range of set-price enterprise security assessment service packages created for corporations who need to comply with security standards required by state agencies or by customers. Progent's security assessment packages offer larger businesses an opportunity to get an objective opinion about the strength of their network security. For each security inventory or evaluation bundle, Progent engineers with high-level security credentials analyze and report on collected data and provide suggestions for effective improvements. An added-cost option for on-premises security engineers is available throughout United States.
  • Stealth Penetration Testing
    Progent can perform comprehensive network penetration testing without warning in-house network resources. Unannounced Penetration Testing reveals whether in-place security monitoring tools like penetration detection alarms and event log tracking are correctly set up and consistently monitored. Progent security engineers can utilize various hacker techniques to expand attack vectors to acquire an understanding of the full environment and detect how many internal devices can be connected to and compromised. This method of security testing can show the full extent of the security gaps of an IT environment.
  • Security Assessment Consulting Services
    Progent's advanced security audit and compliance testing services can help your company to evaluate your processes and governance policies and check your IT infrastructure to allow you to design the highest level of security into your IT system. Progent's security engineers can also test your web applications for security vulnerability and can conduct company-wide security audits to validate your company's compliance with major security standards including HIPAA, NIST, and ISO.
ProSight Low-Cost Managed Services for Information Assurance
Progent's affordable ProSight portfolio of network monitoring and management services is designed to provide small and mid-size organizations with enterprise-class support and state-of-the-art technology for all aspects of information assurance. Managed services offered by Progent include:
  • ProSight Active Security Monitoring (ASM): Endpoint Protection and Ransomware Recovery
    ProSight Active Security Monitoring is an endpoint protection (EPP) service that incorporates cutting edge behavior analysis tools to guard endpoints as well as physical and virtual servers against modern malware attacks such as ransomware and file-less exploits, which routinely evade legacy signature-based anti-virus tools. ProSight Active Security Monitoring safeguards local and cloud resources and provides a unified platform to automate the complete malware attack lifecycle including protection, infiltration detection, containment, cleanup, and forensics. Key capabilities include one-click rollback using Windows VSS and automatic network-wide immunization against new threats. Read more about Progent's ProSight Active Security Monitoring endpoint protection and ransomware defense.

  • ProSight Enhanced Security Protection (ESP): Unified Endpoint Security
    Progent's ProSight Enhanced Security Protection (ESP) services offer affordable multi-layer security for physical servers and VMs, desktops, mobile devices, and Exchange email. ProSight ESP uses adaptive security and advanced machine learning for continuously monitoring and responding to security assaults from all vectors. ProSight ESP provides two-way firewall protection, intrusion alarms, endpoint control, and web filtering through cutting-edge technologies packaged within one agent managed from a single console. Progent's security and virtualization experts can help your business to design and configure a ProSight ESP environment that addresses your organization's unique requirements and that helps you achieve and demonstrate compliance with legal and industry information security regulations. Progent will assist you specify and configure security policies that ProSight ESP will manage, and Progent will monitor your IT environment and react to alerts that call for immediate action. Progent can also assist your company to install and test a backup and disaster recovery solution such as ProSight Data Protection Services so you can recover rapidly from a potentially disastrous security attack such as ransomware. Learn more about Progent's ProSight Enhanced Security Protection (ESP) unified endpoint protection and Exchange filtering.

  • ProSight Data Protection Services: Managed Cloud Backup and Recovery
    ProSight Data Protection Services from Progent offer small and mid-sized organizations a low cost and fully managed service for reliable backup/disaster recovery. Available at a low monthly price, ProSight Data Protection Services automates your backup processes and enables rapid restoration of critical files, applications and virtual machines that have become lost or corrupted as a result of component failures, software glitches, natural disasters, human mistakes, or malware attacks such as ransomware. ProSight DPS can help you back up, retrieve and restore files, folders, apps, system images, as well as Microsoft Hyper-V and VMware images/. Important data can be backed up on the cloud, to a local storage device, or to both. Progent's cloud backup specialists can provide advanced support to configure ProSight DPS to be compliant with regulatory standards like HIPAA, FIRPA, PCI and Safe Harbor and, whenever needed, can help you to recover your business-critical data. Find out more about ProSight DPS Managed Backup and Recovery.

  • ProSight Email Guard: Inbound and Outbound Spam Filtering, Data Leakage Protection and Content Filtering
    ProSight Email Guard is Progent's email filtering and encryption platform that incorporates the services and infrastructure of top data security companies to provide centralized control and world-class security for all your inbound and outbound email. The hybrid architecture of Progent's Email Guard combines cloud-based filtering with a local gateway appliance to offer advanced defense against spam, viruses, Denial of Service (DoS) Attacks, Directory Harvest Attacks (DHAs), and other email-based threats. Email Guard's Cloud Protection Layer serves as a preliminary barricade and blocks most threats from making it to your security perimeter. This decreases your vulnerability to inbound threats and conserves system bandwidth and storage. Email Guard's on-premises security gateway appliance adds a further level of inspection for inbound email. For outbound email, the local gateway provides anti-virus and anti-spam protection, protection against data leaks, and email encryption. The on-premises gateway can also assist Microsoft Exchange Server to track and protect internal email that stays within your corporate firewall. Learn more about Progent's ProSight Email Guard spam filtering, virus blocking, content filtering and data loss prevention.

  • ProSight WAN Watch: Network Infrastructure Management
    ProSight WAN Watch is a network infrastructure management service that makes it easy and affordable for smaller businesses to map, monitor, enhance and debug their connectivity hardware such as routers, firewalls, and wireless controllers as well as servers, printers, client computers and other devices. Incorporating cutting-edge Remote Monitoring and Management technology, WAN Watch ensures that infrastructure topology maps are always updated, copies and displays the configuration information of almost all devices connected to your network, monitors performance, and generates notices when problems are discovered. By automating tedious management processes, WAN Watch can cut hours off common chores like making network diagrams, reconfiguring your network, locating devices that need important software patches, or resolving performance issues. Find out more details about ProSight WAN Watch infrastructure monitoring and management consulting.

  • ProSight LAN Watch: Server and Desktop Monitoring
    ProSight LAN Watch is Progentís server and desktop remote monitoring service that uses advanced remote monitoring and management techniques to help keep your IT system operating at peak levels by checking the health of critical assets that power your information system. When ProSight LAN Watch detects an issue, an alarm is sent immediately to your specified IT management staff and your assigned Progent consultant so any potential problems can be addressed before they have a chance to disrupt productivity Find out more details about ProSight LAN Watch server and desktop remote monitoring consulting.

  • ProSight Virtual Hosting: Hosted VMs at Progent's World-class Data Center
    With Progent's ProSight Virtual Hosting service, a small organization can have its critical servers and apps hosted in a secure fault tolerant data center on a high-performance virtual host set up and maintained by Progent's network support experts. Under Progent's ProSight Virtual Hosting model, the client retains ownership of the data, the operating system software, and the apps. Because the system is virtualized, it can be ported immediately to a different hardware solution without a time-consuming and difficult reinstallation procedure. With ProSight Virtual Hosting, your business is not locked into one hosting service. Find out more about ProSight Virtual Hosting services.

  • ProSight IT Asset Management: Network Documentation Management
    Progent's ProSight IT Asset Management service is a cloud-based IT documentation management service that allows you to create, update, find and safeguard data about your network infrastructure, procedures, applications, and services. You can instantly locate passwords or serial numbers and be warned about upcoming expirations of SSL certificates or warranties. By updating and organizing your IT documentation, you can eliminate as much as 50% of time thrown away trying to find vital information about your IT network. ProSight IT Asset Management includes a centralized location for holding and sharing all documents related to managing your network infrastructure like recommended procedures and self-service instructions. ProSight IT Asset Management also supports a high level of automation for collecting and relating IT information. Whether youíre making enhancements, doing regular maintenance, or responding to a crisis, ProSight IT Asset Management delivers the information you require the instant you need it. Learn more details about Progent's ProSight IT Asset Management service.
ProSight Network Audits
Progent's ProSight Network Audits offer a quick and low-cost alternative for small and medium-size organizations to obtain an objective evaluation of the overall health of their network. Powered by some of the top remote monitoring and management (RMM) tools available, and supervised by Progent's world-class group of IT experts, ProSight Network Audits show you how closely the configuration of your essential infrastructure assets adhere to leading practices. Both the Basic and Advanced options for ProSight Network Audit services are offered at a budget-friendly, one-time cost and deliver immediate ROI such as a cleaner Active Directory (AD) system. Both also come with one year of advanced remote network monitoring and management (RMM). Benefits can include simpler management, improved compliance with data security standards, more efficient utilization of network assets, quicker troubleshooting, more dependable backup and restore, and higher availability. Learn more information about Progent's ProSight Network Audits network infrastructure review.

Progent's ProSight Ransomware Preparedness Report
The ProSight Ransomware Preparedness Report is an affordable service based on a phone discussion with a Progent information assurance consultant. The fact-finding interview is designed to evaluate your organization's ability either to stop or recover rapidly following an attack by a ransomware variant like Ryuk, WannaCry, NotPetya, or Locky. Progent will consult with you directly to gather information about your current AV defense and backup platform, and Progent will then deliver a written Basic Security and Best Practices Report document describing how you can follow industry best practices to deploy an efficient AV and backup system that aligns with your business requirements. For more information, refer to The ProSight Ransomware Preparedness Report Service.

Contact Progent for Network Security Auditing
For additional information concerning Progent's network security inventory scanning offerings, phone Progent at 800-993-9400 or visit Contact Progent.



An index of content::

  • 24-Hour Network Administration BlackBerry Email Mission Viejo, CA BlackBerry Wireless IT Management Mission Viejo

  • Smartphone Computer Engineer
    Activesync Specialists

    Progentís consultants offer experience in a variety of technologies related to mobile connectivity including network topology, wireless data synchronization, wireless protection, mobile email, Microsoft Windows Mobile, RIM Blackberry, and mobile software development. Progent's Microsoft certified professionals can save your organization work and expense by using their wireless experience to show you how to select and configure mobile access technologies that fit the needs of your company. Progent can also tune your network architecture so that mobile PDAs work better.

  • 24/7 Hialeah Ransomware Cleanup Consulting Hialeah Florida Hialeah Florida Hialeah Ransomware Removal
  • Emergency Consult Cybersecurity Scan
  • Addison-Richardson, Texas Largest Consulting Expertise for IT Support Organizations nearby Addison - Transparent Temporary IT Support Expansion Consulting Expertise for Addison Network Service Companies Addison
  • At Home Workers Baltimore Consultants - Setup Assistance Baltimore Downtown Port of Baltimore Baltimore At Home Workers Infrastructure Expertise
  • Internal Security Inventory Consult
  • At Home Workers Parsippany Consulting and Support Services - Management Systems Consulting and Support Services Parsippany, New Jersey Parsippany Teleworkers Endpoint Management Solutions Consultants Parsippany-Fairfield, New Jersey, United States
  • Aurora, IL Aurora NotPetya CryptoLocker Assessment and Removal Aurora Crypto-Ransomware Removal Services
  • BlackBerry Desktop Manager On Site service Sonoma CA Computer Specialists BlackBerry Enterprise Server Petaluma Sonoma County
  • Cuyahoga County Ohio Cisco IT Consulting Firms Computer Support Companies Cisco Cleveland Public Square

  • Check Point 15000 Firewalls Cybersecurity Consultancies
    Check Point ZoneAlarm IT Services

    Progent's Check Point firewall consultants can help you plan, configure, and manage firewall environments built around Check Point Next Generation firewalls and Check Point's subscription-based SandBlast security services. Progent can also assist you support legacy Check Point firewalls or upgrade efficiently to Check Point's modern firewalls.

  • Data Protection Manager 2016 Storage Spaces Direct Remote Troubleshooting DPM 2016 Computer Consulting
  • Development Firms Amazon Marketplace Web Service integration Microsoft Amazon MWS development Reports
  • Exchange Server 2013 Integration Exchange 2013 Upgrade Support and Setup
  • Forensics Services CISSP Security Contractors Firewall
  • Freelance eCommerce Consultants Position From Home Job Independent ERP Consultant
  • Hayward Alameda County Expertise for Hayward Computer Support Companies Hayward Alameda County Hayward Consulting Expertise for Network Service Firms
  • Integration SharePoint Server 2007 Schaumburg-Wheeling Remote Technical Support Microsoft SharePoint Schaumburg, Illinois, United States
  • Largest Small Business Specialist Albuquerque, New Mexico Networking Services Albuquerque-Bernalillo County
  • Microsoft SQL Server IT Consulting Companies Support Group SQL 2012 Barueri, State of Sao Paulo
  • Offsite Workforce Expertise near me in Sacramento - Network Security Systems Guidance Teleworkers Sacramento Assistance - Cybersecurity Systems Consulting Experts Sacramento - Carmichael
  • On-Call Services Exchange 2019 Silicon Valley Setup Service Microsoft Exchange 2010 Fremont Alameda County
  • ProSight Hosting for Virtual Servers Consulting Services Immediate Private Clouds for Small Businesses Consultant Services
  • SQL Server Replication Consult MS SQL Protecting

  • OS X Architecture Technical Consultant
    OS X Connectivity Specialist

    Progent's Apple Mac networking consultants can assist you with a broad range of system infrastructure areas including network architecture, off-site and mobile access, internetwork communication, security, and emerging technologies including Voice over IP and fast wireless connectivity. For business networks based exclusively on Apple Mac OS X or for systems incorporating a mix of Mac, Linux and Windows based servers and desktops, Progent has the knowledge and size to deal with the complexity of planning, integrating, and maintaining a system infrastructure that is robust, safe, productive and aligned with your business objectives. Progent can show you how to deploy Appleís Xserve enterprise servers, Xserve RAID fault-tolerant storage systems, and Apple's Xsan SAN systems. Progent can also provide skilled professionals to support Cisco routers and switches.

  • Scottsdale Work from Home Employees Expertise near me in Scottsdale - IP Voice Solutions Consultants Work at Home Employees Scottsdale Guidance - IP Voice Technology Expertise Scottsdale Arizona
  • Security Technology Consulting West Palm Beach-Jupiter, FL CISSP Technical Support Services West Palm Beach-Palm Beach Gardens, FL
  • Slackware Linux, Sun Solaris, UNIX Consultant Services Raleigh Fedora Linux, Sun Solaris, UNIX Information Technology Consulting
  • Small Business Network Management Outsourcing Consultant Services Small Business Managed Services Services
  • Small Business Network Specialists Network Consulting Organization Small Business
  • Technology Consulting Cisco Coconut Grove Experts Cisco
  • Network Security Scan Specialists
  • Teleworker Securtity Network Consultant Mississauga, ON Remote Teleworker Securtity Security Consultancy Toronto

  • Urgent Disaster Recovery Test Lab Specialists
    24 Hour NLB Test Lab Professional

    The Progent Test and Training Lab located at the QTS Internet Data Center can be used for piloting mission-critical applications, developing efficient system upgrade methodologies, evaluating and tuning performance, designing or verifying business continuity strategies, resolving compatibility problems, and establishing training systems for new technologies. For Progent customers who lack sufficient in-house resources to configure effective test systems, the lab reduces capital costs and engineering risk while keeping critical network projects on schedule.

  • Specialist Information Risk Evaluation
  • Urgent Network IT Consulting Companies Jackson, Hinds County IT Outsourcing Consultancy Services Company Jackson, MS
  • Urgent San Juan Crypto Removal Help Puerto Rico San Juan WannaCry Crypto Detection and Remediation San Juan-Caribbean

  • Sun Solaris Remote Engineer
    UNIX Online System Consultants

    Progent offers national online help and consulting services for companies who run Solaris environments or whose information systems include a combination of Solaris and Microsoft Windows technology. Remote technical support provides maximum return for your information technology budget by protecting user efficiency and shortening the time charged for network repair services. Advanced online support utilities and skilled technicians and engineers allow Progent to solve the majority of IT issues without wasting time and money by traveling to your site. In most of situations your IT problems can be remediated over the phone or through a combination of phone help and remote access. Progent can make available Cisco certified CCIE infrastructure engineers and CISM and CISSP premier security professionals to help you with the most difficult system issues.

  • Work at Home Employees Consulting Services nearby Uniondale - Connectivity Solutions Consultants Uniondale-Hauppauge Work at Home Employees Uniondale Consulting and Support Services - Connectivity Consulting and Support Services
  • Work from Home Employees Consulting - Washington - Video Conferencing Solutions Consulting Services Washington District of Columbia Teleworkers Consulting Experts in Washington - Video Conferencing Solutions Expertise Ronald Reagan Washington Airport DCA
  • Yonkers, New York System Consulting Yonkers-New Rochelle Consultancy Services

  • SCCM 2016 Software Inventory Help and Support
    24x7 SCCM 2016 and Windows Server 2016 Support and Setup

    Configuration Manager 2016 automates application and device deployment across multiple sites, centralizes compliance settings control, keeps track of network assets, protects against company data leakage, provides health reporting, allows safe end-user self service, and delivers a common point of control for managing multi-operating system ecosystems running on-premises, cloud, or hybrid deployment architectures. Progent's Microsoft-certified SCCM 2016 consultants and Azure cloud experts can assist businesses of any size with any aspect of designing, installing, using and repairing a SCCM 2016 solution for local, cloud-based, or hybrid environments.


    © 2002-2021 Progent Corporation. All rights reserved.