ProSight Active Security Monitoring Services and Ransomware DefenseProgent's ProSight Active Security Monitoring services feature behavior-analysis technology to provide advanced protection for endpoints and servers. This modern approach to malware defense addresses the new wave of cyber attacks, like ransomware, which easily avoid detection by traditional signature-based anti-virus (AV) techniques. ProSight ASM gives small and mid-sized companies the benefits of the same AV technology deployed by some of the world's largest enterprises including Walmart, Netflix, Visa, Citi, NASDAQ, and Salesforce. By providing real-time malware blocking, detection, mitigation, recovery and forensics in a single integrated platform, ProSight ASM lowers total cost of ownership, streamlines management, and expedites recovery. The next-generation endpoint protection (NGEP) engine incorporated in ProSight ASM was ranked by Gartner Group as the industry's "most visionary Endpoint Protection Platform."

Progent's ProSight Active Security Monitoring services rely on a low-profile software agent running on every protected device in order to create an active security grid that reacts to potential malware in real time and orchestrates unified defense featuring:

  • Real-time protection for Microsoft Windows, Mac, Linux, iOS and Android devices
  • Support for VMs powered by Hyper-V, VMware vSphere, and Citrix XenServer virtualization platforms
  • In-depth OS-level monitoring
  • Signature-less heuristics and extensive automation
  • Modern behavioral analysis
  • Detection of new generation attacks from all vectors
  • Automated post-attack remediation
  • Single-click rollback to last safe state after ransomware attack
  • Instant and automatic immunization across the entire device grid
  • Real-time visualization of an attack's progression through your network
  • Comprehensive forensics for identifying vulnerabilities
  • Centralized web-accessible management console
  • HIPPA and PCI compliant
ProSight Active Security Monitoring is available as an affordable fixed-cost monthly service, requires no special hardware, and protects onsite, mobile, and cloud-based resources. In case you experience a successful cyber attack, Progent can provide the services of CISSP-certified cybersecurity experts to work as your red team to help you utilize ProSight ASM's advanced tools to contain the intrusion, remove the malware from all affected devices, evaluate the damage, rollback your system to the last known healthy state, and document the source of the attack and its storyline within your network.

ProSight Active Security Monitoring and Today's Threat Landscape
Over 97% of successful malware attacks could have been blocked by modern security tools. But the industry has come to realize that, unfortunately, some attacks will succeed despite the best defenses. The modern security landscape is too filled with bad actors, including state-sponsored cyber criminals, for any enterprise to be entirely safe. With this in mind, ProSight Active Security Monitoring is designed not just to prevent malware from gaining access to your network, but also to react decisively to any detected penetration. This includes immediate isolation of compromised devices, automatic threat removal, machine-speed immunization of all endpoints via device-resident agents, single-click restore to a safe state, and comprehensive forensics to show you how to bolster your security profile to foil future attacks. By delivering leading-edge protection during all phases of a cyber attack, ProSight ASM provides a comprehensive solution for dealing with the increasingly dire security landscape and avoiding the financial and reputation loss associated with a major security breach.

Endpoints such as desktops, notebooks and smartphones are the most susceptible and most commonly attacked elements of an IT network. ProSight Active Security Monitoring services offer a unified endpoint protection (EPP) platform to handle the complete lifecycle of a cyber attack including blocking, identification, remediation, restoration and analytics. Threats managed by ProSight ASM include:

  • File-based attacks like ransomware, trojans, worms, backdoors and payload-based attacks
  • File-less and memory-only attacks without disk-based indicators
  • Document-based attacks incorporated within macros and Office and Adobe files
  • Phishing and spear phishing email-based attacks (which are responsible for more than 90+ of security breaches)
  • Web browser-based attacks embedded in drive-by downloads, Flash, Java, Javascript, VBS, IFrame/HTML5, and plug-ins
  • Live attacks based on scripts like PowerShell, Powersploit, WMI, and VBS
  • Credential-based attacks such as credential-scraping, Mimikatz, and tokens
ProSight ASM's Behavior-based Threat Detection
Older-generation anti-virus (AV) software uses so-called "signature matching" as its primary mechanism for malware detection. With this technique, a distinct file hash, known as a signature, is calculated for every familiar threat. AV programs continually compare incoming data against ever-expanding signature tables, and block anything with a tell-tale signature. The problem with this technique is that new threats are now being generated much faster than AV labs can create and publish signatures. Next-generation AV platforms supplement traditional signature matching with behavior analysis. This technology examines the actions of a possible threat and decides whether the behavior is normal and safe or abnormal and potentially dangerous. For example, does the code in question impact an unusually large number of processes? Does it modify the registry? Does it log keystrokes? Basically, behavior analysis focuses on suspicious activities rather than on a signature, which a hacker can easily nullify just by changing a few inconsequential bytes of malware code.

Prevention: Prior to the Attack
New threats are being manufactured fast enough to overwhelm the capacity of signature-based AV platform providers. The industry has broadly recognized the shortcomings of signature-matching EPP since 2012. Since then things have grown worse quickly enough to quality as a crisis.

ProSight ASM Endpoint Protection Services

Malware production has increased far faster than signature-based AV technology can respond

ProSight ASM uses intelligent cloud-based resources and reputation services from major vendors to block known threats. This combined with deep file inspection and dynamic blacklisting and whitelisting give ProSight ASM an advantage over traditional AV products. However, prevention is only the first stage of modern AV defense. Sophisticated exploits, file-less and script-based attacks routinely slip by signature-matching systems. As an example, malware packers compress attack code to camouflage malicious software so security researchers and AV software are unable to recognize the threat.

Detection and Response: During the Attack
The second part of the EPP lifecycle involves reacting to a cyber attack while the malicious code is executing. ProSight ASM uses next-generation endpoint protection technology to spot malicious activity caused by any threat that breaks through the first line of defense. In order to compromise data, even file-less threats like a memory-based attack perform recognizable activities such as creating an executable file without permission. ProSight ASM's compact agent monitors activity in every protected endpoint device and uses advanced behavioral threat analysis and full execution context to detect new attacks as soon as they start. When an attack is identified, ProSight ASM at once isolates the impacted endpoint from the network to contain the damage. Since the ProSight ASM agent operates autonomously, endpoints remain secured even when they are disconnected from the Internet.

Remediation: After the Attack
After containing an attack, ProSight ASM starts the mitigation phase of protection. When ProSight ASM is integrated with Windows Volume Shadow Copy Service (Windows VSS), changes to data caused by a cyber attack can be automatically rolled back to a trusted state with one click. ProSight ASM also logs any system-level files and settings that were altered by the attack and what files were fixed. Whenever ProSight ASM uncovers a new malware binary, the code is flagged and all devices on the network that are protected by agents are immunized against the new attack. Also, the ProSight ASM management console offers extensive forensics such as an intuitive visualization of the attack's storyline across the network from beginning to end. This audit trail of how an attack progressed through the network helps you assess the damage and highlights vulnerabilities in policies or work habits that should be corrected to avoid future breaches.

ProSight ASM Attack Storyline

ProSight ASM's management console provides a real-time storyline of a threat's path through the network

Download the ProSight Active Security Monitoring Services Datasheet
To view or download a datasheet describing the key features of ProSight Active Security Monitoring, click:
Progent's ProSight Active Security Monitoring Services Datasheet. (PDF - 89 KB)

Additional ProSight Managed Services Available from Progent
In addition to ProSight Active Security Monitoring, Progent's ProSight family of network management services includes other affordable, fixed-price managed services that allow you to outsource key aspects of IT network management including backup and disaster recovery, network infrastructure monitoring and management, email content filtering, VM hosting, and IT documentation management. By partnering with some of the industry's leading technology vendors, Progent can offer small and mid-size businesses the benefits of the same advanced technology used by the world's largest enterprises. Managed services offered by Progent include:

  • ProSight Enhanced Security Protection (ESP): Endpoint Security and Microsoft Exchange Email Filtering
    ProSight Enhanced Security Protection managed services offer economical in-depth protection for physical servers and VMs, workstations, mobile devices, and Exchange email. ProSight ESP utilizes adaptive security and advanced heuristics for round-the-clock monitoring and reacting to cyber assaults from all vectors. ProSight ESP offers firewall protection, penetration alerts, endpoint control, and web filtering through leading-edge tools incorporated within a single agent accessible from a single console. Progent's data protection and virtualization experts can help your business to plan and implement a ProSight ESP deployment that meets your company's specific requirements and that allows you achieve and demonstrate compliance with legal and industry information security standards. Progent will assist you specify and configure policies that ProSight ESP will manage, and Progent will monitor your network and react to alarms that require immediate action. Progent can also help your company to set up and verify a backup and restore solution such as ProSight Data Protection Services so you can get back in business rapidly from a potentially disastrous cyber attack like ransomware. Learn more about Progent's ProSight Enhanced Security Protection (ESP) unified physical and virtual endpoint security and Microsoft Exchange filtering.

  • ProSight Data Protection Services: Managed Backup and Disaster Recovery
    ProSight Data Protection Services from Progent provide small and medium-sized organizations a low cost and fully managed service for secure backup/disaster recovery (BDR). For a fixed monthly cost, ProSight Data Protection Services automates your backup activities and allows fast recovery of critical files, apps and VMs that have become lost or damaged due to hardware breakdowns, software bugs, natural disasters, human error, or malicious attacks like ransomware. ProSight Data Protection Services can help you back up, retrieve and restore files, folders, applications, system images/, plus Hyper-V and VMware virtual machine images/. Critical data can be protected on the cloud, to a local storage device, or mirrored to both. Progent's backup and recovery specialists can provide advanced support to configure ProSight Data Protection Services to to comply with government and industry regulatory requirements like HIPPA, FIRPA, PCI and Safe Harbor and, whenever necessary, can assist you to recover your critical information. Learn more about ProSight Data Protection Services Managed Cloud Backup.

  • ProSight Email Guard: Inbound and Outbound Spam Filtering and Data Leakage Protection
    ProSight Email Guard is Progent's spam filtering service that incorporates the technology of top data security vendors to provide web-based control and world-class protection for your email traffic. The powerful architecture of Progent's Email Guard managed service combines cloud-based filtering with a local gateway device to provide advanced defense against spam, viruses, Dos Attacks, Directory Harvest Attacks (DHAs), and other email-based malware. Email Guard's cloud filter acts as a first line of defense and keeps the vast majority of unwanted email from reaching your network firewall. This decreases your vulnerability to inbound threats and saves system bandwidth and storage space. Email Guard's onsite gateway appliance adds a further level of analysis for inbound email. For outbound email, the onsite security gateway offers AV and anti-spam filtering, DLP, and email encryption. The local security gateway can also assist Exchange Server to track and protect internal email that stays inside your security perimeter. For more details, see ProSight Email Guard spam and content filtering.

  • ProSight WAN Watch: Network Infrastructure Management
    Progentís ProSight WAN Watch is a network infrastructure management service that makes it simple and inexpensive for small and mid-sized organizations to diagram, monitor, optimize and debug their connectivity hardware such as routers, firewalls, and wireless controllers plus servers, printers, client computers and other networked devices. Incorporating state-of-the-art RMM technology, WAN Watch ensures that infrastructure topology maps are always current, captures and manages the configuration information of almost all devices on your network, monitors performance, and sends notices when issues are detected. By automating tedious management and troubleshooting activities, ProSight WAN Watch can knock hours off ordinary chores such as network mapping, reconfiguring your network, locating devices that require important updates, or resolving performance bottlenecks. Find out more details about ProSight WAN Watch network infrastructure management services.

  • ProSight LAN Watch: Server and Desktop Monitoring and Management
    ProSight LAN Watch is Progentís server and desktop monitoring managed service that uses advanced remote monitoring and management technology to help keep your IT system operating at peak levels by tracking the health of critical assets that drive your information system. When ProSight LAN Watch detects a problem, an alarm is sent immediately to your specified IT management staff and your Progent engineering consultant so all potential problems can be resolved before they have a chance to disrupt your network. Find out more details about ProSight LAN Watch server and desktop remote monitoring services.

  • ProSight Virtual Hosting: Hosted Virtual Machines at Progent's Tier III Data Center
    With ProSight Virtual Hosting service, a small organization can have its key servers and applications hosted in a secure Tier III data center on a high-performance virtual machine host configured and managed by Progent's IT support professionals. With the ProSight Virtual Hosting service model, the client retains ownership of the data, the operating system software, and the apps. Since the system is virtualized, it can be moved immediately to a different hosting solution without requiring a lengthy and technically risky configuration process. With ProSight Virtual Hosting, your business is not locked into a single hosting service. Learn more about ProSight Virtual Hosting services.

  • ProSight IT Asset Management: Network Documentation Management
    Progent's ProSight IT Asset Management service is an IT infrastructure documentation management service that allows you to create, maintain, find and protect information related to your network infrastructure, procedures, applications, and services. You can quickly locate passwords or IP addresses and be warned about impending expirations of SSLs or domains. By updating and managing your IT infrastructure documentation, you can save up to 50% of time thrown away looking for critical information about your IT network. ProSight IT Asset Management includes a centralized location for holding and collaborating on all documents related to managing your network infrastructure such as standard operating procedures and How-To's. ProSight IT Asset Management also offers a high level of automation for collecting and associating IT data. Whether youíre planning improvements, performing regular maintenance, or reacting to a crisis, ProSight IT Asset Management delivers the knowledge you require as soon as you need it. Read more about Progent's ProSight IT Asset Management service.
Download Progent's 10 Benefits of Managed IT Services White Paper
To view a white paper explaining why managed services are quickly replacing the old break/fix model of IT support outsourcing for small and mid-size companies, click:
10 Benefits of Managed IT Services. (PDF - 710 KB)

ProSight Network Audits
Progent's ProSight Network Audits offer a quick and low-cost way for small and mid-size businesses to get an objective evaluation of the health of their IT system. Powered by some of the top remote monitoring and management tools in the industry, and supervised by Progent's world-class team of information technology experts, ProSight Network Audits help you see how well the deployment of your core network assets conform to industry leading practices. Both the Basic and Advanced options for ProSight Network Audit services are offered at a budget-friendly, one-time cost and deliver immediate ROI such as a cleaner Active Directory system. Both versions also come with one year of cutting-edge remote network monitoring and management (RMM). Benefits can include simpler management, better compliance with government and industry security standards, higher utilization of network assets, faster troubleshooting, more dependable backup and restore, and less downtime. Read more information about Progent's ProSight Network Audits IT infrastructure review.

Progent's ProSight Ransomware Preparedness Report Service
The ProSight Ransomware Preparedness Report is an affordable service centered on a brief interview with a Progent information assurance expert. The interview is designed to help assess your company's ability to block ransomware or recover rapidly after an attack by a ransomware strain like Ryuk, WannaCry, NotPetya, or Locky. Progent will work with you directly to gather information concerning your current AV defense and backup system, and Progent will then deliver a custom Basic Security and Best Practices Report document describing how you can apply best practices to build an efficient security and backup/recovery system that minimizes your vulnerability to a ransomware attack and meets your business requirements. For details, see The ProSight Ransomware Preparedness Report.

The Progent Edge
Progent's roster of over 100 IT consultants includes experts who have earned certifications in all facets of network technology associated with small and mid-size businesses. This broad scope of skills positions Progent to be your single point of contact with technology vendors and a reliable source of guidance and troubleshooting know-how to help you manage your business network. Progent has built an especially strong team of data security specialists who can help you protect your information and maximize the business value of your network. Besides the endpoint security offered by ProSight Active Security Monitoring, Progent provides additional managed services and value-priced service packages intended to assist small and mid-size organizations to build and manage networks that deliver enterprise-class security and compliance on a small-business budget.

Progent offers expert support for all endpoints, servers and VMs protected by ProSight Active Security Monitoring. Expertise offered by Progent includes Windows 10 configuration, Linux integration, Mac OS X and macOS support, iPhone and iPad management, Android integration, Windows Server 2019 migration consulting, Windows Hyper-V support, and VMware vSphere planning and support. To implement the single-click rollback feature of ProSight Active Security Monitoring, Progent's Windows Server consultants can assist you to configure Windows Volume Shadow Copy Service. In addition, Progent offers remote and on-premises support from certified Cisco CCIE network infrastructure consultants to help you design, secure, or troubleshoot your infrastructure. If your network makes use of public cloud services, Progent can provide the expertise of Microsoft Azure consultants and Amazon AWS consultants to help you build and manage hybrid networking solutions that seamlessly integrate local and cloud-based resources.

Other Affor5dable Service Packages Available from Progent
In addition to the ProSight suite of network management services, Progent offers affordable, one-time service packages to assist small and mid-size companies to verify compliance with internal or regulatory security requirements. These low-cost services include security vulnerability evaluation and penetration testing. Progent can also provide high-level disaster recovery planning consulting and business continuity planning consulting to help make sure you can resume your business activity as soon as possible following a catastrophe.

Contact Progent about ProSight Active Security Monitoring Services
To find out more about how Progent can help you set up an affordable, fully managed endpoint security solution with ProSight Active Security Monitoring, call 1-800-993-9400 or visit Contact Progent.
















© 2002- 2019 Progent Corporation. All rights reserved.



More topics of interest:


An index of content::

CISA Certified Security Expert Computer Companies Technical Support
CISSP Cybersecurity Company CISSP Security Firms in Louisville, KY
Cisco IT Service Provider Cisco Small Business Computer Consultants in Virginia
Cisco Onsite Computer Services Cisco Network Consulting Experts
Computer Outsourcing for San Jose Northern California Network Security Consulting for Santa Clara County
Computer Tech for RIM BlackBerry BlackBerry Enterprise Server Migration Company in San Diego County California
Consult for System Center MOM Remote Consulting
Exchange 2010 Server Network Management Exchange Server 2010 Software Consultants
Expert for Cisco Cisco Network Consulting Service in Downey
Firewall Cybersecurity Contractors Compliance Audit
Information Technology Consulting Companies Aptos Information Technology Outsourcing Firm California
Information Technology Outsourcing Firm CISA Certified Security Expert Tech Outsourcing for Sioux Falls South Dakota
Linux RedHat Online Specialist Linux Phone-based Server Integrators
Louisiana Specialists Cisco Design Firm in Los Angeles California
Microsoft Certified Expert SharePoint Remote Support Services SPS 2010 Computer Consulting
Microsoft SQL 2014 Consultancy Microsoft SQL Server 2016 System Consultant
Network Health Reports Engineer Technology Professional
New York, NY Tech Support Outsource Award Winning Tech Outsourcing
On-site Support in Sonoma County Contra Costa County Technical Consultant
ProSight Endpoint Security Remote Support SF Bay Area Remote Help Desk Network Engineers
Professionals for Linux Sioux Falls, SD, Rapid City, SD, Aberdeen, SD, CITY4, SD Sun Solaris Professional
Red Hat Linux, Sun Solaris, UNIX Specialist Suse Linux, Solaris, UNIX Onsite Technical Support Wayne County Michigan
Redhat Onsite Technical Support Onsite Technical Support Georgia
Remote Endpoint Virus Immunization Technical Support Augusta-Richmond County Tennessee Small Business Networking
SQL Server 2012 Technical Support Companies SQL Server 2012 Repairing
Saratoga IT Solution Providers Silicon valley System Repair
Small Business Computer Consulting for New York Server Consultant
Small Business IT Support Firm California Microsoft Expert Tech Support Outsource for Bay Area
South Dakota Computer Consulting Group South Dakota Computer Tech
Specialist Idaho Help Desk Computer Network Consultants in Lowell, MA
Specialists Microsoft SQL Server 2017 Technology Consultancy Firm
Sun Solaris On-site Support Linux Online Consulting in Missouri
Support and Help for Slackware Linux, Solaris, UNIX Specialists for Gentoo Linux, Sun Solaris, UNIX
Virus Recovery Support Fargo, Cass County, North Dakota IT Consulting Firm
Virus Rollback Engineer in Redwood Shores, CA Massachusetts Small Office Network Consultant
Wireless LAN Site Survey Consultants Computer Consultants for Remote Wireless Site Survey
Wisconsin Systems Support Wisconsin Computer Consultant
ransomware prevention Specialists MongoLock ransomware protection and recovery Consulting