Stealth penetration testing is a vital method for allowing organizations to determine how exposed their networks are to real world threats by showing how well corporate security processes, procedures and technologies hold up against authorized but unannounced attacks by veteran security specialists using advanced hacking techniques.

Progentís security experts can perform extensive in-depth penetration testing without the knowledge of internal IT resources. Such testing uncovers whether existing security monitoring tools such as intrusion detection alerts and event log monitoring are correctly set up and actively monitored.

Penetration testing can encompass any or all of the following areas:

  • Running a series of port scanning tools to identify open network access vectors and to identify and characterize a customer's network environment and overall security level.
  • Running a series of exploit identification tools that test all open access vectors against a large database of known vulnerabilities resulting from servers that are not up to date on security patches, out of date firmware/software, poorly configured servers and devices, and default or common installation passwords.
  • Evaluation of wireless network security by attempting on-site access from publicly accessible locations including parking lots, hallways, bathrooms, and physically adjacent spaces or floors. Identification of security methods utilized by wireless infrastructure and running known exploit tools to gain access
  • Attempt to determine remote access capabilities of network and perform exploit and brute force attack methods to gain access through remote access infrastructure.
  • Perform remote office security evaluation and testing, and determine whether remote sites can be used as a vector into the corporate network through VPNs or other private network infrastructure.
  • Performing brute force account and password attacks using a database of over 40 million possible passwords
  • For devices and servers that are successfully penetrated, Progent security experts will manually use assorted hacker techniques to extend such exploit vectors to gain an understanding of the full network environment and see how many internal systems can be accessed and compromised. This type of security testing can expose the full scope of the vulnerability of a network environment.
  • Determination of internal and external network addressing configuration through email beaconing techniques
  • Performing various Denial of Service attacks, coordinated with internal senior management to determine whether it is possible to stop or hinder network productivity. Once proof of impact is reported, such testing can be immediately ceased to avoid impact to actual business productivity.
  • Perform PBX remote access and voice mail security testing
For larger companies, Progent can perform anonymous physical security penetration testing, including attempts to gain unauthorized/unchecked access to physical premises by pretending to be authorized personnel, with proof of success from copying of confidential information and accessing internal network resources behind all perimeter firewalls.

Progent experts can use social engineering techniques and public information to attempt customized password penetration testing utilizing information such as employeesí family member names, birthdates, home addresses, and phone numbers. Progent team members can often quickly uncover this information through Internet online search and public records. Progent can uncover employee names/email addresses through publicly accessible information on the Internet, from PBX voice mail directories, public records filings, marketing materials and press releases, web sites, and receptionist.

Progent will provide a complete report of methods used and vulnerabilities uncovered during stealth penetration testing, along with a detailed list of recommended remediation steps. Progent can then work with internal IT staff to perform an audit and evaluation of the actual security protection, configuration, tools, and processes and help your company develop a comprehensive security plan.

ProSight Low-Cost Managed Services for Information Assurance
Progent's low-cost ProSight portfolio of outsourced network management services is designed to provide small and mid-size businesses with enterprise-class support and cutting-edge technology for all facets of information assurance. Managed services offered by Progent include:

  • ProSight Active Security Monitoring (ASM): Endpoint Protection and Ransomware Defense
    ProSight Active Security Monitoring (ASM) is an endpoint protection solution that utilizes next generation behavior-based analysis technology to defend endpoints and servers and VMs against modern malware assaults such as ransomware and file-less exploits, which routinely escape traditional signature-matching anti-virus tools. ProSight ASM safeguards on-premises and cloud resources and provides a single platform to address the entire threat lifecycle including protection, identification, containment, cleanup, and forensics. Key capabilities include single-click rollback with Windows Volume Shadow Copy Service (VSS) and real-time network-wide immunization against new threats. Learn more about Progent's ProSight Active Security Monitoring endpoint protection and ransomware defense.

  • ProSight Enhanced Security Protection: Unified Endpoint Protection
    Progent's ProSight Enhanced Security Protection (ESP) services deliver affordable in-depth security for physical servers and VMs, desktops, smartphones, and Exchange email. ProSight ESP utilizes adaptive security and modern behavior analysis for continuously monitoring and reacting to security assaults from all attack vectors. ProSight ESP delivers two-way firewall protection, intrusion alarms, device management, and web filtering through leading-edge technologies packaged within a single agent accessible from a unified console. Progent's security and virtualization experts can help your business to design and implement a ProSight ESP deployment that meets your company's unique needs and that helps you prove compliance with government and industry information security standards. Progent will help you specify and implement policies that ProSight ESP will manage, and Progent will monitor your IT environment and respond to alerts that call for urgent attention. Progent can also assist you to set up and test a backup and restore system such as ProSight Data Protection Services (DPS) so you can recover quickly from a potentially disastrous security attack like ransomware. Learn more about Progent's ProSight Enhanced Security Protection (ESP) unified endpoint protection and Exchange filtering.

  • ProSight Data Protection Services: Managed Backup and Recovery
    ProSight Data Protection Services offer small and medium-sized organizations an affordable end-to-end service for secure backup/disaster recovery. For a low monthly cost, ProSight Data Protection Services automates and monitors your backup activities and allows fast recovery of vital files, applications and virtual machines that have become lost or damaged due to component breakdowns, software bugs, disasters, human error, or malicious attacks like ransomware. ProSight Data Protection Services can help you back up, retrieve and restore files, folders, apps, system images/, plus Hyper-V and VMware images/. Critical data can be backed up on the cloud, to a local device, or to both. Progent's BDR specialists can deliver advanced support to set up ProSight DPS to to comply with regulatory requirements like HIPPA, FINRA, and PCI and, when necessary, can assist you to restore your critical information. Learn more about ProSight DPS Managed Cloud Backup and Recovery.

  • ProSight Email Guard: Inbound and Outbound Spam Filtering, Data Leakage Protection and Content Filtering
    ProSight Email Guard is Progent's email security platform that incorporates the technology of leading data security vendors to deliver web-based management and world-class security for your email traffic. The hybrid architecture of Progent's Email Guard managed service combines cloud-based filtering with a local security gateway appliance to offer complete protection against spam, viruses, Dos Attacks, DHAs, and other email-based malware. The cloud filter serves as a first line of defense and keeps most unwanted email from making it to your security perimeter. This reduces your vulnerability to inbound attacks and saves system bandwidth and storage space. Email Guard's onsite gateway device adds a further level of analysis for incoming email. For outbound email, the on-premises gateway offers anti-virus and anti-spam protection, protection against data leaks, and email encryption. The local security gateway can also help Microsoft Exchange Server to monitor and protect internal email that originates and ends inside your corporate firewall. Find out more about Progent's ProSight Email Guard spam filtering, virus defense, content filtering and data loss prevention.

  • ProSight WAN Watch: Infrastructure Remote Monitoring and Management
    Progentís ProSight WAN Watch is an infrastructure monitoring and management service that makes it simple and inexpensive for smaller organizations to map, track, reconfigure and debug their connectivity appliances like switches, firewalls, and wireless controllers plus servers, client computers and other devices. Using cutting-edge RMM technology, WAN Watch ensures that network diagrams are always updated, captures and displays the configuration of almost all devices on your network, monitors performance, and generates alerts when issues are detected. By automating time-consuming management and troubleshooting processes, ProSight WAN Watch can cut hours off ordinary chores like making network diagrams, expanding your network, finding devices that require critical software patches, or isolating performance issues. Find out more details about ProSight WAN Watch infrastructure management services.

  • ProSight LAN Watch: Server and Desktop Remote Monitoring and Management
    ProSight LAN Watch is Progentís server and desktop monitoring managed service that incorporates advanced remote monitoring and management (RMM) techniques to help keep your network running at peak levels by checking the health of vital computers that power your business network. When ProSight LAN Watch detects a problem, an alarm is transmitted immediately to your designated IT personnel and your Progent engineering consultant so that all looming problems can be resolved before they have a chance to disrupt your network Learn more about ProSight LAN Watch server and desktop remote monitoring consulting.

  • ProSight Virtual Hosting: Hosted VMs at Progent's World-class Data Center
    With Progent's ProSight Virtual Hosting service, a small business can have its key servers and applications hosted in a protected fault tolerant data center on a fast virtual host configured and managed by Progent's network support professionals. With the ProSight Virtual Hosting model, the client retains ownership of the data, the OS software, and the applications. Because the system is virtualized, it can be moved easily to a different hardware solution without requiring a lengthy and difficult reinstallation process. With ProSight Virtual Hosting, you are not tied a single hosting service. Learn more details about ProSight Virtual Hosting services.

  • ProSight IT Asset Management: Network Infrastructure Documentation Management
    ProSight IT Asset Management service is a cloud-based IT documentation management service that makes it easy to capture, maintain, find and protect data about your network infrastructure, procedures, applications, and services. You can instantly locate passwords or serial numbers and be warned about impending expirations of SSLs or warranties. By cleaning up and organizing your IT documentation, you can save as much as 50% of time spent searching for critical information about your network. ProSight IT Asset Management features a centralized repository for storing and sharing all documents required for managing your business network like standard operating procedures (SOPs) and How-To's. ProSight IT Asset Management also supports a high level of automation for collecting and associating IT information. Whether youíre planning enhancements, performing maintenance, or reacting to an emergency, ProSight IT Asset Management delivers the knowledge you need when you need it. Find out more about ProSight IT Asset Management service.
ProSight Network Audits
Progent's ProSight Network Audits are a quick and affordable alternative for small and medium-size organizations to get an objective evaluation of the overall health of their network. Powered by some of the leading remote monitoring and management (RMM) tools available, and overseen by Progent's world-class group of IT professionals, ProSight Network Audits help you see how closely the configuration of your core network assets adhere to industry leading practices. The Basic and Advanced options for ProSight Network Audit services are offered at a low, one-time cost and provide immediate ROI such as a cleaner Active Directory environment. Both versions also include a year of cutting-edge remote network monitoring and management. Advantages can include simpler network management, improved compliance with information security requirements, higher utilization of IT assets, quicker problem resolution, more dependable backup and recovery, and increased uptime. Read more information about Progent's ProSight Network Audits network infrastructure assessment.

The ProSight Ransomware Preparedness Report Service
The ProSight Ransomware Preparedness Report is a low-cost service built around a brief phone discussion with a Progent information assurance expert. The fact-finding interview is intended to help evaluate your organization's preparedness either to block or recover quickly after an attack by a ransomware strain such as Ryuk, WannaCry, NotPetya, or Locky. Progent will work with you directly to collect information concerning your current security profile and backup platform, and Progent will then deliver a written Basic Security and Best Practices Report describing how you can follow best practices to build a cost-effective AV and backup/recovery environment that meets your business requirements. For details, see Progent's ProSight Ransomware Preparedness Report Service.

Contact Progent for Penetration Testing Consulting
If you want network security expertise, call Progent at 800-993-9400 or visit Contact Progent.
















© 2002- 2019 Progent Corporation. All rights reserved.



More topics of interest:


An index of content::

802.11ac Wi-Fi Network Computer Consultant CISM Security Security Troubleshooting for Wi-Fi Network
Assessment Remote SQL 2014 Information Systems Firms
Audit Security Consulting for CISSP Arlington, Dallas, Fort Worth
BlackBerry BPS Consulting Services Firm RIM BlackBerry Business Computer Server Companies in Baltimore Maryland
BlackBerry Desktop Manager Technology Consultants Security Consulting Firm for RIM BlackBerry in Olympia, Washington
BlackBerry Email Small Business IT Outsourcing Companies BlackBerry Smartphone Support Consultants Oakland California
BlackBerry Exchange Consulting Services Firm BlackBerry Exchange Small Business IT Consulting Firms
Boston Implementation Boston, MA Small Business Outsourcing IT
Branch Office Integration Services Network Engineer for Remote Office
CISSP Consulting Career Network Security Consulting Job Openings
CISSP Cybersecurity Organization Firewall Security Consultants
CISSP Security Consulting CISSP Firewall Configuration in Lancaster County Nebraska
CISSP Security Firms CISSP Network Security Audit
CISSP Security Team Firewall Compliance Audit
CISSP information Systems Audit Firewall Security Consultant in Bronx
CentOS Linux, Sun Solaris, UNIX On-site Technical Support Redhat Linux, Sun Solaris, UNIX Remote Troubleshooting Indianapolis Indiana
Chief Information Officer Online Consulting IT Services for CIO
Cincinnati Information Technology Manager Cincinnati, OH Small Business IT Outsourcing Companies
Cisco ASA Configuration Engineer Cisco firewall IPS Online Consulting
Cisco CCIE CCNA CCDP CCNP CCIP CCSP CCVP Network Consulting Positions CISM Consulting Subcontractor Job
Cisco CCVP Consultant Freelance Jobs Microsoft MCA Remote Consulting Full-Time Jobs in DC
Cisco Designer Small Business Outsourcing IT for Cisco in Tulsa Green Country
Cisco Service Providers Global Integration Firm for Cisco
Cisco Solution Provider Network Management for Cisco
Cisco Support Consultant Cisco Network Support in Birmingham International Airport BHM
Cisco Technical Consultants Computer Consulting Company for Cisco Minnesota
Citrus Heights Information Technology Manager California Fair Oaks Small Business Outsourcing
Computer Consultant Computer Consultancy Firms for Sacramento California
Computer Consulting Firms for SQL Server 2016 Microsoft SQL 2008 Computer Support Companies Garland Texas
Computer Consulting Group Integration Company for Cisco
Computer Security Specialist in South Carolina Software Consulting Services for Microsoft Computer in New Haven County Connecticut
Computer Service for SQL Server 2012 SQL Server 2012 Network Support Consulting
Computer Support For Small Offices for Palo Alto Remote Technical Support for Mountain View California
Consulting Ubuntu Linux, Sun Solaris, UNIX Computer Consultants Joliet, Illinois
Consulting Services CentOS Linux, Sun Solaris, UNIX Technology Consulting Services Bakersfield California
Consulting Services for Linux Setup and Support for Sun Solaris in Boise City, Pocatello, Idaho Falls, ID
Consulting Services for Security Penetration Testing Dallas, TX Jacksonville Florida Consulting Service
Contract Jobs for CISA Consultant Contractor Job in Lower Manhattan, Financial District, NYC
Cybersecurity Team El Paso South Florida Security Security Companies
Cybersecurity Tech Services for Firewall Harlem, New York City CISSP Computer Security Specialist
Denver Design Denver Consulting Service
Dynamics GP Great Plains Software Network Engineer Integration Services for Dynamics GP/Great Plains
Emergency Phone Support Small Business Computer Consultant Microsoft Windows Networking Firm Carrollton, TX
Exchange 2003 Server Network Consulting Service Exchange Server 2013 Integration Firms in Pierce County Washington
Exchange 2016 Network Support Outsourcing IT for Microsoft Exchange San Diego California
Exchange Server 2007 Implementation Computer Consulting Services
Firewall Cybersecurity Group West Village, New York, NYC Auditor
Firewall Security Contractor Washington District of Columbia Protection for Security
Freelancing Job Subcontractor for Microsoft Remote Consulting in Staten Island, NYC
Gentoo Linux, Solaris, UNIX Integration Support Online Technical Support for Slackware Linux, Sun Solaris, UNIX Westchase, Houston
Georgia IT Manager Atlanta Georgia Consultants
Gilroy Computer Consultancy Firms Business Computer Server Companies for Morgan Hill California
Home Based Virtual Office for Microsoft MCDBA Consultant Network Security Engineer Telecommuting Jobs Tacoma Washington
Information Technology Consultant Cisco Network Design Dallas - Irving Texas
Information Technology Consulting Remote Troubleshooting in Louisiana
Information Technology Outsourcing Group for Exchange 2003 Server Computer Consulting for Microsoft Exchange 2010 in Denver Aurora
Linux Network Consultant Redhat IT Consultant Baltimore, MD, Baltimore-Washington DC , MD, Columbia, MD, Bethesda, MD
Livermore Network Support Consulting Northern California San Ramon Technical Support Firm
Los Angeles California Integration Firms Los Angeles, San Diego, Long Beach, Santa Ana, Anaheim, Riverside, Bakersfield, CA Integration Company
Los Angeles, California Professionals Los Angeles, California Solution Providers
Los Gatos Network Security Consulting Santa Clara Software Consulting Services in California
MCSE Consultant Contract Job Opportunities Network Engineer Part-Time Jobs
MCSE Expert Certified Software Support Network Consulting Service for New York, NY
Marin County Support Firms Microsoft and Cisco Certified Novato Network Design
Microsoft Exchange 2013 Remote Troubleshooting Exchange 2013 Project Planning Online Support Services
Microsoft Exchange Server 2013 Small Business Computer Consultants Computer Support Consultants for Microsoft Exchange 2016 in Plano, TX
Microsoft ISA Server 2006 Specialists Internet Security and Acceleration Server 2006 Computer Engineer
Microsoft MCITP Consulting Jobs Cisco CCIE Service Provider Network Engineer Subcontractor Norfolk Chesapeake
Microsoft Migrations Long Beach, California Onsite Technical Support
Microsoft SharePoint Server 2007 Help and Support Support and Setup for SharePoint Server Mobile County Alabama
Microsoft SharePoint Server Professional Microsoft SharePoint Server 2010 Online Technical Support Austin, TX
Microsoft Virtual Server 2005 Consultant Consultancy
Microsoft Windows Server 2016 Consultancy Services Group San Diego California Consulting Firm for Windows Server 2016
Microsoft and Cisco Certified Networking Firms Chicago, Illinois Experts
Monterey County On-Call Services Network Security Consulting for Monterey County in California
Network Consultant for Firewall CISSP Technology Consulting
Network Design and Consulting Cisco Certified Experts Fort Worth Computer System Consultant
Network Security Consulting Position Microsoft MCA Consultant Contract Jobs in Hialeah Florida
Network Security Test for Stealth Penetration Testing Milwaukee, Wisconsin Telecommuter Job Virginia Beach Norfolk Newport News
Network Support Consultants for Massachusetts Support Outsourcing Services
Network Support for BlackBerry Exchange BlackBerry Desktop Manager Integration Group
New Jersey - Newark, NJ, Jersey City, NJ, Paterson, NJ, Elizabeth, NJ Network Solutions New Jersey Engineer
New York - New York City, NY, Buffalo, NY, Rochester, NY, Syracuse, NY Consulting Tech Consulting
New York IT Technical Support Company Consultant Services for New York
On-site Support for Exchange Microsoft Exchange 2016 Computer Consultancy Firms in Wichita, Sedgwick County
Online Help for Word Microsoft CRM Troubleshooting
Online Support Services SharePoint Professional in Cincinnati, Hamilton County
Open Positions Work From Home Job for Cisco CCVP Network Support Anchorage Alaska
Openings for Computer Consulting MCSE Consultant Position
Oracle database administration Professionals Design for MySQL RDBMS
Oregon Support Company Oregon Network Consulting Services
Penetration Testing Consulting Services in Buffalo, NY Computer Network Providers for SQL 2012 Pittsburgh
Penetration Testing Cybersecurity Companies in Minnesota Largest Crocket Outsourced IT Management Services California
Penetration Testing Network Intrusion Penetration Testing in Jersey City, NJ Windows 2008 Server Network Consulting Companies in Chicago O'Hare International ORD
Penetration Testing Security Audits Los Gatos Network Consult Northern California
Penetration Testing Security Contractor Los Angeles, CA Network Providers
Peninsula Network Engineer California Network Consulting Firm for San Mateo
Philadelphia Pennsylvania Remote Support Services Software Support for Pennsylvania
Pleasanton Small Business IT Outsourcing Firm Expert in California
Remote Support Services for BlackBerry Smartphone Online Troubleshooting
Repairing IT Consulting Companies for BlackBerry Software in Scottsdale Tempe Paradise Valley
SCCM Reporting Online Troubleshooting SCCM Mobile Device Management Technology Consulting Services
SCDPM 2012 Migration Network Engineer Help and Support
SQL Server 2016 Computer Consulting Firms SQL 2012 IT Specialists
SQL Server 2016 Computer Support Firms SQL 2012 Computer Networking in King County Washington
SQL Server IT Outsourcing Group Professionals for Microsoft SQL Server 2016
Sacramento Small Business Server Support Microsoft Expert Sacramento County Small Office Network Consulting California
San Lorenzo Server Setup Hayward Small Business Computer Consultant California
San Mateo County Migration Companies Global MS Certified San Carlos Online Support Services in California
Security Auditor Security Secure in Shreveport Louisiana
Security Company for Security CISSP Security Consulting
Security Consultancies for Security Penetration Testing South Dakota Security Cybersecurity Firms in Bridgeport, New Haven, Hartford, CT
Security Consultancies in The Woodlands, TX Daly City, CA SharePoint 2013 Outsourcing
Security Consulting CISSP Security Team
Security Penetration Testing Consulting Colorado Springs, CO Cisco Computer Consultancy
Security Penetration Testing Cybersecurity Consultancy Spokane Davis Systems Consultant
Security Penetration Testing Network Consultant Colorado Global Ubuntu Linux, Sun Solaris, UNIX Computer Consultant in Kansas City International Airport MCI
Security Penetration Testing Network Security Auditor Computer Support Firms
Security Penetration Testing Protection Microsoft SharePoint Server 2013 Technical Support Services
Security Penetration Testing Protection Contra Costa County System Support
Security Penetration Testing Security Contractors Sausalito, CA Cisco Network Installations in Irving, TX
Security Penetration Testing Security Tech Services BlackBerry Email Small Office Computer Consulting Brooklyn
Server Migration Specialists for Microsoft and Apple Windows Security Help in Flint, MI
SharePoint Server 2007 Configuration Orlando, FL SharePoint Server 2010 Configuration
SharePoint Server 2007 Specialist SharePoint Server 2010 IT Consulting Anchorage Alaska
Small Business IT Consultants for Microsoft SQL 2008 SQL Server 2012 Small Office IT Outsourcing in Monroe County New York
Small Business Networking for Los Angeles, California Designer
Small Office Network Consultants Seattle, WA Cisco Configure
Solaris Online Help UNIX Professional Wichita, Overland Park, Kansas City, KS
South San Francisco Computer System Consultant Northern California Daly City Technology Providers
Stealth Penetration Testing Cybersecurity Organizations in Oklahoma Monterey County Computer Consultancy Northern California
Stealth Penetration Testing Cybersecurity Team in Anchorage Windows 2016 Server Support Organization Milwaukee County Wisconsin
Stealth Penetration Testing Network Security Evaluation in Cottonwood, AZ Help Desk System Consultants West Covina
Stealth Penetration Testing Security Consulting Toledo, Ohio Los Angeles, San Diego, Long Beach, Santa Ana, Anaheim, Riverside, Bakersfield, CA Network Assessments
Stealth Penetration Testing Security Organization Columbia, SC Cisco Computer Network Consultant
Stealth Penetration Testing Technology Consulting Auditing for CISSP Washington DC
Support Group Detroit, MI Information Technology Manager
Support Help Desk Technology Consulting Services Technical Support Services
Support Services Gentoo Linux, Solaris, UNIX Remote Technical Support
Tech for BlackBerry Wireless BlackBerry Specialist Boston
Technology Consultants for Glendale, AZ Information Technology Outsourcing Companies for Glendale, Arizona
Upgrade Microsoft and Apple Small Business IT Outsourcing Group Adams County Colorado
Urgent Security Penetration Testing Compliance Audit Lexington-Fayette, Kentucky BlackBerry Exchange Computer Services Wichita
Virtual HelpDesk IT Services Remote Consulting for Support Help Desk
Washington, District of Columbia Information Technology Outsource Management
Windows 2016 Server Repair Support Specialist
Windows Server 2008 Consultant Services Windows Server 2008 Consultant Services
Windows Server 2012 IT Service Providers Small Business Networking
Windows Server 2016 Network Consulting Group Cincinnati, OH Windows Server 2016 Network Design and Configuration
Windows Server 2016 On-site Support Columbus Ohio Microsoft Windows 2008 Migration Support
Windows Server 2016 Service Providers Windows 2008 Server Migration Consultants Louisville, KY
Wireless Case Study Case Study for Proxim Tsunami Wireless
Wireless Security Scan Specialist Consultancy for External Security Inventory