Stealth penetration testing is a vital method for allowing organizations to determine how exposed their networks are to real world threats by showing how well corporate security processes, procedures and technologies hold up against authorized but unannounced attacks by veteran security specialists using advanced hacking techniques.

Progent’s security experts can perform extensive in-depth penetration testing without the knowledge of internal IT resources. Such testing uncovers whether existing security monitoring tools such as intrusion detection alerts and event log monitoring are correctly set up and actively monitored.

Penetration testing can encompass any or all of the following areas:

  • Running a series of port scanning tools to identify open network access vectors and to identify and characterize a customer's network environment and overall security level.
  • Running a series of exploit identification tools that test all open access vectors against a large database of known vulnerabilities resulting from servers that are not up to date on security patches, out of date firmware/software, poorly configured servers and devices, and default or common installation passwords.
  • Evaluation of wireless network security by attempting on-site access from publicly accessible locations including parking lots, hallways, bathrooms, and physically adjacent spaces or floors. Identification of security methods utilized by wireless infrastructure and running known exploit tools to gain access
  • Attempt to determine remote access capabilities of network and perform exploit and brute force attack methods to gain access through remote access infrastructure.
  • Perform remote office security evaluation and testing, and determine whether remote sites can be used as a vector into the corporate network through VPNs or other private network infrastructure.
  • Performing brute force account and password attacks using a database of over 40 million possible passwords
  • For devices and servers that are successfully penetrated, Progent security experts will manually use assorted hacker techniques to extend such exploit vectors to gain an understanding of the full network environment and see how many internal systems can be accessed and compromised. This type of security testing can expose the full scope of the vulnerability of a network environment.
  • Determination of internal and external network addressing configuration through email beaconing techniques
  • Performing various Denial of Service attacks, coordinated with internal senior management to determine whether it is possible to stop or hinder network productivity. Once proof of impact is reported, such testing can be immediately ceased to avoid impact to actual business productivity.
  • Perform PBX remote access and voice mail security testing
For larger companies, Progent can perform anonymous physical security penetration testing, including attempts to gain unauthorized/unchecked access to physical premises by pretending to be authorized personnel, with proof of success from copying of confidential information and accessing internal network resources behind all perimeter firewalls.

Progent experts can use social engineering techniques and public information to attempt customized password penetration testing utilizing information such as employees’ family member names, birthdates, home addresses, and phone numbers. Progent team members can often quickly uncover this information through Internet online search and public records. Progent can uncover employee names/email addresses through publicly accessible information on the Internet, from PBX voice mail directories, public records filings, marketing materials and press releases, web sites, and receptionist.

Progent will provide a complete report of methods used and vulnerabilities uncovered during stealth penetration testing, along with a detailed list of recommended remediation steps. Progent can then work with internal IT staff to perform an audit and evaluation of the actual security protection, configuration, tools, and processes and help your company develop a comprehensive security plan.

ProSight Flat-rate Managed Services for Information Assurance
Progent's value-priced ProSight line of managed services is intended to provide small and mid-size organizations with enterprise-class support and state-of-the-art technology for all facets of information assurance and compliance. Managed services offered by Progent include:

  • ProSight Active Security Monitoring (ASM): Next Generation Endpoint Protection and Ransomware Recovery
    Progent's ProSight Active Security Monitoring is an endpoint protection (EPP) service that incorporates next generation behavior-based machine learning technology to guard endpoint devices and physical and virtual servers against modern malware attacks like ransomware and file-less exploits, which easily escape legacy signature-matching anti-virus tools. ProSight ASM protects local and cloud-based resources and offers a unified platform to manage the complete threat progression including filtering, detection, containment, remediation, and post-attack forensics. Top features include one-click rollback using Windows Volume Shadow Copy Service (VSS) and automatic network-wide immunization against newly discovered attacks. Learn more about Progent's ProSight Active Security Monitoring endpoint protection and ransomware recovery.

  • ProSight Enhanced Security Protection (ESP): Unified Physical and Virtual Endpoint Security
    Progent's ProSight Enhanced Security Protection managed services offer ultra-affordable multi-layer security for physical servers and virtual machines, desktops, mobile devices, and Exchange Server. ProSight ESP uses contextual security and advanced heuristics for round-the-clock monitoring and responding to security assaults from all vectors. ProSight ESP provides firewall protection, intrusion alarms, endpoint management, and web filtering via leading-edge tools packaged within a single agent accessible from a single console. Progent's security and virtualization experts can assist you to plan and configure a ProSight ESP environment that addresses your organization's specific needs and that helps you achieve and demonstrate compliance with government and industry data security regulations. Progent will assist you define and configure security policies that ProSight ESP will enforce, and Progent will monitor your network and respond to alerts that require urgent action. Progent can also assist your company to set up and verify a backup and disaster recovery solution like ProSight Data Protection Services (DPS) so you can get back in business quickly from a potentially disastrous security attack such as ransomware. Read more about Progent's ProSight Enhanced Security Protection (ESP) unified physical and virtual endpoint protection and Microsoft Exchange email filtering.

  • ProSight DPS: Managed Backup and Recovery
    ProSight Data Protection Services provide small and medium-sized organizations an affordable end-to-end service for secure backup/disaster recovery (BDR). For a low monthly price, ProSight Data Protection Services automates your backup activities and allows rapid restoration of critical data, apps and VMs that have become lost or corrupted due to hardware breakdowns, software bugs, disasters, human mistakes, or malicious attacks like ransomware. ProSight DPS can help you back up, recover and restore files, folders, apps, system images/, plus Hyper-V and VMware virtual machine images/. Important data can be backed up on the cloud, to a local device, or to both. Progent's BDR specialists can provide advanced expertise to configure ProSight Data Protection Services to to comply with regulatory requirements such as HIPPA, FIRPA, PCI and Safe Harbor and, whenever needed, can assist you to restore your critical information. Read more about ProSight DPS Managed Cloud Backup.

  • ProSight Email Guard: Spam Filtering, Data Leakage Protection and Email Encryption
    ProSight Email Guard is Progent's email filtering and encryption platform that uses the technology of leading data security vendors to deliver web-based control and comprehensive protection for your email traffic. The hybrid structure of Email Guard integrates cloud-based filtering with an on-premises security gateway device to offer advanced defense against spam, viruses, Denial of Service (DoS) Attacks, Directory Harvest Attacks, and other email-borne malware. Email Guard's Cloud Protection Layer serves as a preliminary barricade and keeps the vast majority of unwanted email from reaching your security perimeter. This decreases your exposure to external threats and saves system bandwidth and storage. Email Guard's onsite gateway device adds a deeper layer of inspection for inbound email. For outbound email, the on-premises security gateway provides AV and anti-spam protection, DLP, and encryption. The local gateway can also help Microsoft Exchange Server to track and protect internal email that stays within your security perimeter. Find out more about Progent's ProSight Email Guard spam filtering, virus defense, content filtering and data leakage protection.

  • ProSight WAN Watch: Infrastructure Remote Monitoring and Management
    ProSight WAN Watch is a network infrastructure monitoring and management service that makes it easy and inexpensive for smaller organizations to map, monitor, reconfigure and debug their connectivity appliances like switches, firewalls, and access points as well as servers, printers, endpoints and other devices. Incorporating cutting-edge Remote Monitoring and Management (RMM) technology, ProSight WAN Watch makes sure that network maps are always current, captures and manages the configuration information of almost all devices on your network, tracks performance, and generates alerts when potential issues are detected. By automating time-consuming management activities, ProSight WAN Watch can cut hours off ordinary chores like making network diagrams, expanding your network, locating appliances that need important updates, or isolating performance issues. Learn more details about ProSight WAN Watch infrastructure monitoring and management services.

  • ProSight LAN Watch: Server and Desktop Monitoring
    ProSight LAN Watch is Progent’s server and desktop remote monitoring service that incorporates advanced remote monitoring and management techniques to help keep your IT system running at peak levels by tracking the state of critical computers that power your information system. When ProSight LAN Watch detects an issue, an alert is sent immediately to your specified IT management staff and your assigned Progent engineering consultant so all looming problems can be resolved before they can impact productivity Learn more about ProSight LAN Watch server and desktop monitoring consulting.

  • ProSight Virtual Hosting: Hosted Virtual Machines at Progent's World-class Data Center
    With Progent's ProSight Virtual Hosting service, a small or mid-size business can have its key servers and applications hosted in a secure fault tolerant data center on a fast virtual machine host configured and maintained by Progent's network support professionals. Under the ProSight Virtual Hosting service model, the client retains ownership of the data, the operating system platforms, and the apps. Since the environment is virtualized, it can be ported immediately to an alternate hardware solution without a time-consuming and difficult configuration procedure. With ProSight Virtual Hosting, your business is not locked into a single hosting provider. Learn more about ProSight Virtual Hosting services.

  • ProSight IT Asset Management: Network Infrastructure Documentation Management
    Progent's ProSight IT Asset Management service is a cloud-based IT documentation management service that allows you to create, update, find and protect data related to your IT infrastructure, procedures, applications, and services. You can instantly locate passwords or IP addresses and be alerted about upcoming expirations of SSL certificates ,domains or warranties. By updating and managing your IT infrastructure documentation, you can eliminate up to 50% of time wasted looking for vital information about your IT network. ProSight IT Asset Management features a centralized location for holding and sharing all documents required for managing your network infrastructure like standard operating procedures (SOPs) and self-service instructions. ProSight IT Asset Management also offers advanced automation for gathering and associating IT data. Whether you’re planning improvements, doing maintenance, or responding to a crisis, ProSight IT Asset Management gets you the knowledge you need the instant you need it. Learn more about Progent's ProSight IT Asset Management service.
ProSight Network Audits
Progent's ProSight Network Audits offer a quick and low-cost alternative for small and mid-size businesses to get an objective evaluation of the health of their information system. Powered by a selection of the top remote monitoring and management (RMM) platforms available, and overseen by Progent's certified group of information technology professionals, ProSight Network Audits help you see how closely the configuration of your core network assets adhere to leading practices. The Basic and Advanced options for ProSight Network Audit services are available at a budget-friendly, one-time cost and provide immediate benefits like a more manageable Active Directory system. Both versions also come with one year of advanced remote network monitoring and management (RMM). Advantages can include easier network management, better compliance with data security regulations, more efficient utilization of network assets, quicker problem resolution, more dependable backup and recovery, and higher availability. See more about Progent's ProSight Network Audits network infrastructure assessment.

Progent's ProSight Ransomware Preparedness Report Service
The ProSight Ransomware Preparedness Report service is a low-cost service based on a brief phone discussion with a Progent backup/recovery consultant. The fact-finding interview is intended to help evaluate your company's ability to stop or recover rapidly following an attack by a ransomware variant like Ryuk, WannaCry, MongoLock, or Locky. Progent will work with you personally to gather information about your existing AV defense and backup/recovery platform, and Progent will then produce a written Basic Security and Best Practices Report detailing how you can follow industry best practices to deploy a cost-effective security and backup/recovery environment that aligns with your company's requirements. For additional information, visit The ProSight Ransomware Preparedness Report.

Contact Progent for Penetration Testing Consulting
If you need network security consulting expertise, phone Progent at 800-993-9400 or refer to Contact Progent.
















© 2002- 2019 Progent Corporation. All rights reserved.



More topics of interest:


An index of content::

Albuquerque, NM Online Troubleshooting Albuquerque, NM Computer Network Support Companies
Atlanta, Augusta, Columbus, GA Consultants Consultancy Services Group for Georgia
Atlanta, Fulton & Dekalb County, Georgia Computer Consulting Companies Atlanta Georgia Services
Bay Area Providers San Francisco Server Install
Birmingham Alabama Server Consulting Emergency Alabama Technology Consultants
Birmingham Online Troubleshooting Birmingham, AL Small Business IT Consulting Company
BlackBerry Exchange Help and Support BlackBerry Synchronization Specialist
BlackBerry Professional Software Network Design and Consulting Computer Service for RIM BlackBerry in Houston Downtown
BlackBerry Redirector Setup Minneapolis, MN BlackBerry BES Server Software Consultant
BlackBerry Smartphone Network Support Consultant IT Outsource in Jacksonville
Broadway, VA Penetration Testing Information systems Security Outsourcing Cisco Setup Service Boise, ID
CISSP Firewall Configuration Evaluation for Firewall Burlington, VT
CISSP Security Team Idaho Security Firewall Audit
California Software Outsourcing Consultant Los Angeles, San Diego, Long Beach, Santa Ana, Anaheim, Riverside, Bakersfield, CA Small Office IT Outsourcing
Castroville Networking Firm Monterey County Manage California
Cisco CCIE Technical Support Firms Microsoft Computer Computer Network Support Group
Cisco Computer Network Firms Cisco IT Solution Providers Tacoma Olympia
Cisco Computer Service Companies Onsite Support
Cisco Consulting Organization Cisco Small Business Computer Consulting Firms in Virginia Beach
Cisco Small Business IT Consulting Firms Cisco Computer Network Firms in Colorado
Cisco and Microsoft Certified Experts Vermont - Burlington, VT, Rutland, VT, Montpelier, VT Computer Network Consulting company Vermont Support Consultants
Cisco and Microsoft Software Consulting Firm Small Business Computer Consultants for San Mateo Northern California
Citrix Live Migration Technology Professional Engineer
Computer Consultancy Firms for Remote Help Desk Microsoft Windows Computer Consulting Group
Computer Help Seattle, Washington Small Business IT Outsourcing
Computer Outsourcing Consultant for Microsoft Exchange Exchange 2003 Server Migration Companies Orlando-Kissimmee
Computer Service Providers for Microsoft Exchange 2016 Small Office Server Support
Configuration Oregon Outsourcing Company
Consultancies Networking Group for Exchange
Consultant Services Specialist for Microsoft SharePoint 2010 Rochester, Monroe County
Consultants for Stealth Penetration Testing Server Consulting for Long Beach, California
Consulting Services for Debian Linux, Solaris, UNIX IT Consulting
Cybersecurity Firm for Penetration Testing Firewall Network Intrusion Penetration Testing LA
Davis Networking Specialist Designers
Debian Linux, Solaris, UNIX IT Services Support Pittsburgh, PA
Des Moines, Iowa Network Specialist Des Moines, IA Networking Firms
Exchange 2013 Collaboration Troubleshooting Microsoft Exchange Professional
Exchange 2016 Networking Help Exchange 2016 Server Migration Specialists Jacksonville, FL
Exchange Server 2007 Computer Consultancy Companies Microsoft Exchange 2016 Software Support in Lexington-Fayette Kentucky
Help Center for Exchange 2016 Exchange Server 2013 Networking Organization
Help Desk Network Consulting Firm Small Business Computer Consultants for Microsoft Network
ISSAP Consultant Work From Home Job Microsoft MCA Support Freelancing Jobs Scottsdale
Information Technology Consultant Cisco Computer Consultancy Detroit, MI, Grand Rapids, MI, Warren, MI, Lansing, MI
Information Technology Support for SQL Server 2012 SQL 2012 Network Management Tacoma Olympia
Integration Specialist for Cisco Information Technology Outsourcing Companies for Cisco in Georgia - Atlanta, GA, Augusta, GA, Columbus, GA, Savannah, GA
Los Angeles Online Troubleshooting Computer Support for Los Angeles, California
Microsoft Computer Technical Support Network Assessments
Microsoft MCTS Consultant Home Based Virtual Office Microsoft MCP Remote Engineer Remote Support Job in Greensboro Winston-Salem High Point
Microsoft MCTS Support Job Openings CISSP Engineer Employment
Microsoft SQL Server 2008 Professional Microsoft Expert Troubleshooting for SQL Server 2005
Microsoft SharePoint Server 2013 On-site Support SharePoint Server 2010 Integration Services Honolulu, Waikiki
Microsoft SharePoint Server Computer Consultants Microsoft SharePoint Server 2007 Setup and Support Oakland California
Microsoft and Cisco Stealth Penetration Testing Security Tech Services in Mesa, Arizona Microsoft Exchange Server 2007 Consultants in Albuquerque
Napa County Penetration Testing Network Security Auditing Network Security Test for Firewall
Nebraska Computer Service Companies Omaha, NE Consultant
Network Providers City of Washington Cisco Specialists
Network Security Consultant for Microsoft Exchange 2016 Exchange Server 2007 Computer Setup in Bay Area CA
New York City, Buffalo, Rochester, Syracuse, Yonkers, Albany Support Firms New York Information Technology Consultant
Online Consulting for BlackBerry Smartphone Chesapeake, VA Solutions Provider
Outsourcing Technology Small Business Computer Consulting
Part Time Job for Microsoft MCDBA Remote Consulting Boston, Suffolk County MCSE MCSA MCDBA MCIPT MCA Engineer Work At Home Job
Penetration Testing Consultant in Portland, OR Modesto Computer Support Company in California
Penetration Testing Cybersecurity Consultancies California District of Columbia Firewall Security Consultant
Penetration Testing Security Audit Services San Jose, CA Fort Worth Texas Exchange Small Office IT Outsourcing
Penetration Testing Security Consultants Los Altos Software Consultants Torrance
Penetration Testing Security Services Plano, Texas Windows 2016 Server Network Security Consultants
Penetration Testing Testing in Berkeley, California Design Company for Boise City, ID
Pittsburgh, PA Computer Consultancy Group Pittsburgh Assessment
Private Cloud Hosting for Virtual Data Centers Consultant Specialists
ProSight Email Spyware Protection Consultancy Email Anti-fraud Intelligence Consultants
Redhat Linux, Solaris, UNIX Online Troubleshooting Remote Technical Support for Redhat Linux, Solaris, UNIX in Norfolk Virginia Beach
Remote Access Technical Consultant Emergency Cisco Certified Experts VPN Help and Support
Remote Office Support and Setup Support and Help
Roseville Manager Rocklin IT Solution Providers California
SQL 2012 Information Technology Consulting Firms Install for SQL Server Phoenix
SQL Server 2012 Network Architect Microsoft SQL 2008 Information Systems Firms Cupertino, CA
SQL Server 2012 Network Help SQL Server 2012 Consultancy Services
San Jose Solutions Provider Emergency Cisco Certified Expert San Jose Solution Providers
Security Consultants Security Auditing for Security in Wayne County Michigan
Security Consulting Group for Cisco CCIE Microsoft and Apple Maintenance Memphis, TN
Security Firm for Juniper Routers Technology Consulting Services for Juniper Technology
Security Firms for Penetration Testing Sacramento, CA Augusta, GA Small Business IT Consulting Group
Security Organization for Security Security Forensics Services in Bridgeport, New Haven, Hartford, CT
Security Penetration Testing Consulting Services in San Francisco Networking Network Consulting Service in Killeen Texas
Security Penetration Testing Network Consultants in New York, NY Microsoft Windows Network Consulting Experts Santa Clarita Calabasas San Fernando
Security Penetration Testing Network Security Auditing Networking Help City of Washington
Security Penetration Testing Protecting Los Altos, California South Dakota - Sioux Falls, SD, Rapid City, SD, Aberdeen, SD Auditing for CISSP
Security Penetration Testing Security Group Small Office IT Outsourcing Long Beach, Los Angeles County
Security Penetration Testing Security Organizations in Berlin, CT UNIX Network Consultants in Oklahoma - Oklahoma City, OK, Tulsa, OK, Norman, OK, Lawton, OK
Security Services for CISSP Cybersecurity Firm for Firewall Norfolk Virginia Beach
Security Tech Services Security Secure Fort Wayne
Server Migration Specialists System Recovery in California
Services for Dynamics GP 2015 Web Client Microsoft Dynamics GP 2015 App Development Professional
SharePoint 2013 Consulting Technical Support for Microsoft SharePoint Server 2010 in Aurora
SharePoint Server 2010 Remote Support Services SharePoint 2010 Information Technology Consulting in Denver Colorado
SharePoint Server IT Consulting Configuration in Winston-Salem
Small Business Network Support Specialist Pueblo County Microsoft and Cisco Support Consultant
Small Office Computer Consulting Services for Microsoft Exchange Small Business Outsourcing Huntington Beach California
Small Office IT Outsourcing Cisco Support Outsourcing Services in Detroit, Wayne County
Solaris Information Technology Consulting Solaris Consultants Colorado
Sonoma County Networking Consultants Award Winning Microsoft Certified Expert Rohnert Park Network Engineer in California
Sonoma County Small Business IT Support Firm California Consulting Organization
Stealth Penetration Testing Cybersecurity Companies in Rolling Meadows, IL Red Hat Linux, Sun Solaris, UNIX Network Consultant Portland International Airport PDX
Stealth Penetration Testing Firewall Setup Cisco Solution Providers in Newark New Jersey
Stealth Penetration Testing Security Auditing Microsoft MCDST Consultant Freelance Jobs Stockton California
Stealth Penetration Testing Security Firms Network Security Consulting for East Bay California
Stealth Penetration Testing Security Services Cisco Computer Network Specialists Baltimore Maryland
Stealth Penetration Testing Technology Consulting Services Cottonwood, AZ West Virginia - Charleston, WV, Huntington, WV, Morgantown, WV, Parkersburg, WV Remote Technical Support
Stealth Penetration Testing Technology Consulting South Lake Tahoe, CA Microsoft Network Network Support Consulting in Rodeo, Hercules, CA
Subcontractor Job for Cisco CCIE Voice Support ISSAP Consulting Open Positions in City of Washington
Support Outsourcing Services New York, NY Systems Engineer
Suse Linux, Sun Solaris, UNIX Onsite Technical Support Fedora Linux, Solaris, UNIX Support and Help Mesa
Tech Outsourcing for Windows 2016 San Francisco, CA Windows Server 2012 R2 Computer Network Consulting
Technical Support Companies Outsourcing Firm for Aurora, CO
Technology Consulting Services for Penetration Testing Plano, Texas Computer Consultancy Group for Microsoft Exchange Server 2013 in Columbus Ohio
VMware Site Recovery Manager and NetApp Technology Professional VMware VCDX Professional
Windows 2016 Server Computer Companies Computer Network Support Company for Windows in Burlingame, CA
Windows Server 2012 Consulting Organization San Diego, CA Largest Windows Network Help
Windows Server 2016 Network Support Consulting Windows Server 2016 Remote Consulting Jackson County Missouri
Windows Server 2016 Support Firms Windows Server 2016 Assessment Los Angeles
Wisconsin Online Support Cisco Experts Upgrading for Wisconsin