ProSight Active Security Monitoring Services and Ransomware ProtectionProgent's ProSight Active Security Monitoring services incorporate behavior-based detection technology to provide endpoint and server protection from modern malware attacks such as ransomware, which have demonstrated the ability to evade legacy, signature-based anti-virus defenses. ProSight ASM gives small and mid-sized organizations access to the same threat protection platform used by leading enterprises including Walmart, Netflix, Visa, Citi, NASDAQ, Salesforce and others. By delivering real-time threat prevention, detection, removal and recovery in one unified package, ProSight ASM cuts ownership costs, simplifies management, and speeds up recovery. The next-generation endpoint protection (NGEP) technology used by ProSight ASM was rated by Gartner Group as the most visionary Endpoint Protection Platform in the industry.

Progent's ProSight Active Security Monitoring services utilize a low-overhead agent installed on each protected endpoint and server to build a cohesive security grid that responds to threats at machine speed and allows coordinated and decisive incident response featuring:

  • Protection for Windows, Mac OS X and macOS, Linux, iOS and Android endpoints and servers
  • Support for Windows Hyper-V, VMware vSphere, and Citrix XenServer virtual environments
  • Deep system-level monitoring
  • Signature-less machine learning and intelligent automation
  • Behavioral analysis and detection of advanced attacks across all vectors
  • Full remediation with auto-removal of detected attacks
  • Single-click rollback from ransomware and other attacks
  • Automatic, network-wide immunization
  • Real-time visualization of the attack storyline for comprehensive forensics
  • Unified control via a single management console
  • HIPPA and PCI certification
Progent's GIAC-certified information assurance consultants and CISSP-certified cybersecurity and compliance experts have earned the security industry's top certifications including CISSP, CISA, GIAC, CISM and ISSAP. With 20 years of experience providing IT security and compliance solutions to organizations of all sizes, Progent has the skills required to help any business to deploy cutting-edge endpoint protection (EPP) technology effectively and affordably. By partnering with leading information security companies, Progent can offer the ProSight Active Security Monitoring package to small and mid-size businesses for enterprise-class threat protection on a small-business budget.

Progent offers ProSight Active Security Monitoring as a low-cost, flat-rate monthly service. A software-only EPP solution, ProSight ASM requires no special hardware or other costly upfront investment. ProSight ASM can provide protection for both on-premises and cloud-based resources. In the event that you suffer an attack, Progent is qualified to act as your red team to help you use ProSight ASM to contain and remove the threat, assess the damage, rollback your network to a healthy state, and understand the source and spread of the malware.

ProSight Active Security Monitoring and the Modern Threat Landscape
97% of data breaches could have been prevented by current security technology, but some successful attacks are inevitable. Sometimes the crooks win. ProSight Active Security Monitoring is designed around the premise that even with the best security technology, you may eventually suffer a breach. For this reason ProSight ASM not only provides malware blocking based on traditional static, signature-based prevention, but also dynamic detection of malware and exploits that have penetrated your network, fast isolation of infected devices, automatic removal of threats, near real-time immunization of all endpoints, single-click recovery (such as a rollback to a pre-ransomware state), and rich forensics to help you understand and eliminate your vulnerability.

By offering best-of-breed technology for before, during and after an attack, ProSight ASM delivers an end-to-end solution for addressing the realities of the modern security landscape and minimizing or eliminating financial, productivity and reputation loss in case of a breach.

Endpoints are the most vulnerable and most frequently targeted component of an information network. ProSight Active Security Monitoring services offer a single, integrated platform to manage the entire threat lifecycle including protection, detection, response and remediation. Threats addressed by ProSight ASM include:

  • File-based malware such as ransomware, trojans, worms, backdoors and payload-based attacks
  • File-less and memory-only malware with no disk-based indicators
  • Document-based exploits embedded in Office and Adobe files, and macros
  • Phishing and spear phishing emails (which account for over 90+ of successful data breaches)
  • Browser-based attacks rooted in drive-by downloads, Flash, Java, Javascript, VBS, IFrame/HTML5, and plug-ins
  • Live attacks based on scripts like PowerShell, Powersploit, WMI, and VBS
  • Credential-based attacks including credential-scraping, Mimikatz, and tokens
ProSight ASM's Behavior-based Threat Analysis
Traditional anti-virus tools use signature matching as their main defense. A unique file hash, or signature, is generated for each known threat, and potential threats are checked against a continually updated table of signatures. The flaw in this approach is that the speed and volume of new threats far outpace the anti-virus industry's ability to generate and distribute signatures. In contrast, modern behavior analysis looks at the activities of a potential threat and determines whether it behaves abnormally. For example, does it impact a large number of processes? Does it alter the registry? Does it install a keystroke logger? In essence, behavior analysis uses suspicious activities to create a kind of meta signature that can't be changed by a hacker simply by altering a few irrelevant bytes of code to escape detection.

Prevention: Before the Attack
With nation-state intelligence agencies joining the ranks of professional and amateur hackers, new malware is being developed far faster than the ability of anti-virus providers to write new signatures. The limitations of signature-matching endpoint protection has been recognized since around 2012 and its inadequacy is now an accepted tenet of IT security.

ProSight ASM Endpoint Protection Services

Malware production has increased beyond the capacity of traditional signature-based AV technology to block it

ProSight ASM utilizes low-overhead cloud intelligence and reputation services from multiple vendors to filter known malware. Deep file inspection plus dynamic blacklisting and whitelisting help make ProSight ASM a significant improvement over legacy anti-virus platforms, but prevention is only the first line of defense. Advanced exploits, file-less malware and script-based attacks can sneak past signature-matching barriers. For example, so-called "packers" compress code to disguise malware data so it canít be read by security researchers or malware blocking programs.

Detection and Response: During the Attack
The second phase of endpoint protection involves dealing with malware while it is executing. ProSight ASM uses next-generation endpoint protection (NGEP) technology to detect malicious behavior from any malware that gets through the automated blacklisting process. Even in the case of advanced file-less malware such as application and memory-based attacks, the malicious code must perform certain recognizable activities (e.g., creating an executable file without permission) if it is to compromise data. ProSight ASM's lightweight agent watches all activity in each protected endpoint and uses state-of-the-art behavioral threat analysis and full execution context to identify new attacks at inception. When an attack is discovered, ProSight ASM immediately disconnects the affected device from the network to contain the threat. Because the ProSight ASM agent is autonomous, devices stay protected even when they are not connected to the Internet.

Remediation: After the Attack
Once an attack is contained, ProSight ASM begins policy-based mitigation. When you use ProSight ASM in conjunction with Windows Volume Shadow Copy Service, modifications to data made by the malware attack can be rolled back automatically with a single click. ProSight ASM also logs whatever system-level files and settings were changed by the attack and what were remediated. Whenever ProSight ASM detects a new malicious binary, the threat is flagged and all protected agents on the network are immediately immunized against the attack. In addition, the ProSight ASM management console provides in-depth forensics, which include a clear visualization of the attack's progress through the network from inception to termination. This real-time audit trail of what happened during the attack exposes weaknesses that need to be addressed in your security strategy and answers questions like: How did the attack enter our network? Which employee or guest opened the malware file? What did the malware change on our network?

ProSight ASM Attack Storyline

ProSight ASM's management console provides a real-time view of threats from inception to termination

Download the ProSight Active Security Monitoring Datasheet
To download a PDF datasheet describing the key features of ProSight Active Security Monitoring, click:
Progent's ProSight Active Security Monitoring Services Datasheet. (PDF - 89 KB)

Other ProSight Managed Services Available from Progent
In addition to ProSight Active Security Monitoring, Progent's ProSight suite of network management services includes other budget-friendly, flat-rate managed services that address key aspects of your IT network including backup and disaster recovery, network infrastructure monitoring and management, and email content filtering. By partnering with some of the industry's most innovative technology vendors, Progent can offer small and mid-size organizations the benefits of the same advanced technology used by the world's largest enterprises. Managed services offered by Progent include:

  • ProSight Enhanced Security Protection: Physical and Virtual Endpoint Protection and Microsoft Exchange Email Filtering
    ProSight Enhanced Security Protection managed services deliver economical multi-layer security for physical servers and virtual machines, workstations, mobile devices, and Exchange email. ProSight ESP utilizes adaptive security and advanced heuristics for round-the-clock monitoring and responding to cyber threats from all vectors. ProSight ESP provides two-way firewall protection, intrusion alarms, device control, and web filtering via cutting-edge tools packaged within one agent managed from a single control. Progent's data protection and virtualization experts can help you to plan and configure a ProSight ESP environment that addresses your organization's unique requirements and that helps you demonstrate compliance with legal and industry information security regulations. Progent will assist you specify and configure security policies that ProSight ESP will enforce, and Progent will monitor your IT environment and react to alarms that require immediate attention. Progent's consultants can also help you to install and verify a backup and restore solution like ProSight Data Protection Services (DPS) so you can recover rapidly from a potentially disastrous cyber attack such as ransomware. Read more about Progent's ProSight Enhanced Security Protection unified endpoint protection and Exchange email filtering.

  • ProSight Data Protection Services: Managed Backup and Recovery
    ProSight Data Protection Services from Progent offer small and mid-sized businesses an affordable and fully managed service for reliable backup/disaster recovery. For a fixed monthly price, ProSight Data Protection Services automates your backup processes and enables rapid recovery of critical files, apps and virtual machines that have become unavailable or damaged due to hardware breakdowns, software glitches, disasters, human mistakes, or malware attacks such as ransomware. ProSight Data Protection Services can help you protect, recover and restore files, folders, apps, system images/, plus Microsoft Hyper-V and VMware virtual machine images/. Critical data can be protected on the cloud, to an on-promises device, or to both. Progent's backup and recovery specialists can provide advanced support to set up ProSight Data Protection Services to be compliant with regulatory requirements such as HIPPA, FIRPA, PCI and Safe Harbor and, whenever necessary, can help you to restore your critical information. Read more about ProSight Data Protection Services Managed Cloud Backup.

  • ProSight Email Guard: Inbound and Outbound Spam Filtering and Data Leakage Protection
    ProSight Email Guard is Progent's spam and virus filtering service that incorporates the technology of top information security companies to provide web-based control and comprehensive protection for all your email traffic. The powerful structure of Email Guard combines cloud-based filtering with a local gateway appliance to provide complete protection against spam, viruses, Denial of Service (DoS) Attacks, DHAs, and other email-borne threats. The Cloud Protection Layer serves as a first line of defense and blocks most unwanted email from reaching your security perimeter. This decreases your exposure to external attacks and conserves network bandwidth and storage space. Email Guard's on-premises gateway device provides a further level of analysis for incoming email. For outbound email, the local gateway offers anti-virus and anti-spam filtering, DLP, and email encryption. The onsite security gateway can also assist Microsoft Exchange Server to track and safeguard internal email traffic that originates and ends inside your corporate firewall. For more details, see Email Guard spam filtering and data leakage protection.

  • ProSight WAN Watch: Infrastructure Remote Monitoring and Management
    ProSight WAN Watch is an infrastructure management service that makes it easy and affordable for smaller organizations to map, track, enhance and troubleshoot their connectivity appliances like switches, firewalls, and access points plus servers, printers, client computers and other networked devices. Incorporating state-of-the-art RMM technology, WAN Watch makes sure that network maps are always current, captures and displays the configuration information of almost all devices on your network, monitors performance, and sends alerts when problems are detected. By automating complex network management processes, ProSight WAN Watch can cut hours off common tasks like making network diagrams, expanding your network, locating appliances that need important updates, or resolving performance bottlenecks. Find out more about ProSight WAN Watch infrastructure monitoring and management consulting.

  • ProSight LAN Watch: Server and Desktop Remote Monitoring and Management
    ProSight LAN Watch is Progentís server and desktop remote monitoring service that uses state-of-the-art remote monitoring and management (RMM) technology to keep your IT system running efficiently by checking the state of critical assets that power your business network. When ProSight LAN Watch detects a problem, an alert is sent automatically to your specified IT staff and your Progent consultant so all potential problems can be addressed before they can impact productivity. Learn more about ProSight LAN Watch server and desktop monitoring services.

  • ProSight Virtual Hosting: Hosted Virtual Machines at Progent's World-class Data Center
    With Progent's ProSight Virtual Hosting service, a small or mid-size business can have its critical servers and applications hosted in a protected fault tolerant data center on a high-performance virtual host configured and maintained by Progent's network support experts. Under the ProSight Virtual Hosting model, the customer retains ownership of the data, the operating system platforms, and the applications. Since the system is virtualized, it can be moved immediately to a different hosting environment without requiring a time-consuming and technically risky reinstallation process. With ProSight Virtual Hosting, you are not locked into a single hosting provider. Learn more about ProSight Virtual Hosting services.

  • ProSight IT Asset Management: Network Documentation Management
    Progent's ProSight IT Asset Management service is a cloud-based IT documentation management service that allows you to capture, update, retrieve and protect data related to your IT infrastructure, procedures, applications, and services. You can instantly find passwords or serial numbers and be alerted automatically about impending expirations of SSLs ,domains or warranties. By cleaning up and organizing your network documentation, you can save as much as half of time spent trying to find critical information about your network. ProSight IT Asset Management includes a common repository for holding and collaborating on all documents related to managing your network infrastructure such as standard operating procedures and How-To's. ProSight IT Asset Management also supports a high level of automation for collecting and relating IT information. Whether youíre planning improvements, doing maintenance, or reacting to a crisis, ProSight IT Asset Management gets you the data you require when you need it. Learn more about Progent's ProSight IT Asset Management service.
Download Progent's 10 Benefits of Managed IT Services White Paper
To view a white paper explaining why managed services are quickly replacing the old break/fix model of network support for small and mid-size businesses, click:
10 Benefits of Managed IT Services. (PDF - 710 KB)

ProSight Network Audits
Progent's ProSight Network Audits are a quick and affordable way for small and medium-size organizations to get an unbiased assessment of the health of their information system. Based on some of the top remote monitoring and management platforms in the industry, and overseen by Progent's certified group of IT professionals, ProSight Network Audits help you see how well the configuration of your core network assets conform to industry best practices. Both the Basic and Advanced options for ProSight Network Audit services are available at a budget-friendly, one-time cost and deliver immediate ROI like a more manageable Active Directory system. Both also come with one year of cutting-edge remote network monitoring and management. Benefits can include simpler network management, improved compliance with government and industry security regulations, more efficient utilization of IT assets, faster problem resolution, more dependable backup and restore, and increased uptime. See more about ProSight Network Audits IT infrastructure review.

The ProSight Ransomware Preparedness Report Service
The ProSight Ransomware Preparedness Report is a low-cost service centered on a brief phone interview with a Progent information assurance consultant. The interview is designed to evaluate your organization's preparedness to defend against ransomware or recover quickly after an assault by a ransomware variant such as Ryuk, WannaCry, MongoLock, or Hermes. Progent will work with you directly to collect information about your existing security profile and backup/recovery procedures, and Progent will then deliver a custom Basic Security and Best Practices Report detailing how you can apply best practices to build a cost-effective security and backup/recovery environment that reduces your vulnerability to a ransomware attack and meets your company's needs. For more information, visit Progent's ProSight Ransomware Preparedness Report.

The Progent Advantage
Progent's team of more than 100 consulting professionals includes certified experts in every aspect of information technology related to small and mid-size businesses. With this breadth of expertise, Progent can be your one-stop source for integrating a comprehensive security solution that delivers immediate business value. In addition to the endpoint protection provided by ProSight Active Security Monitoring, Progent offers other managed services and specially-priced service packages designed to help small and mid-size businesses to deploy, validate, and manage networks that feature enterprise-class information assurance and low total cost of ownership (TCO).

Besides the ProSight suite of ongoing network management services, Progent offers specially priced one-time service bundles to help organizations of any size to achieve and demonstrate compliance with regulatory and industry security standards. These value-priced services include security vulnerability assessment and stealth penetration testing. Progent also offers expert disaster recovery planning consulting and business continuity planning consulting to help ensure you can return to operations quickly in case of a catastrophic failure due to a natural disaster, fire, cyber attack, human error, equipment breakdown, or any other foreseeable disruptive event.

Progent has expertise in all the endpoints, servers and virtual machines that can be protected by ProSight Active Security Monitoring and offers services that include Windows 10 integration, Linux support, Mac OS X and macOS consulting, iPhone and iPad configuration, Android integration, Windows Server 2019 migration consulting, Hyper-V virtualization support, and VMware vSphere consulting. For single-click or manual rollback capability, Progent's Windows Server consultants can help you set up Windows Volume Shadow Copy Service (VSS). Progent can also provide online and onsite access to certified Cisco CCIE consultants to help you plan, protect or troubleshoot your network infrastructure. If your network incorporates cloud resources, Progent offers the guidance of Microsoft Azure consultants and Amazon AWS experts.

Contact Progent about ProSight Active Security Monitoring Services
To find out more about how Progent can help you set up an affordable, fully managed endpoint security solution with ProSight Active Security Monitoring, call 1-800-993-9400 or visit Contact Progent.
















© 2002- 2019 Progent Corporation. All rights reserved.



More topics of interest:


An index of content::

Active Directory Onsite Technical Support Remote Support Services for Active Directory
Arlington, TX Computer Outsourcing Consultants On Site service
CISSP Consultant Work At Home Job Top Rated Microsoft MCTS Remote Consultant Positions Montgomery
Cisco Small Business Computer Consulting Firms Technology Consultancy Firm for Cisco in Colorado Springs, El Paso County
Computer Support Consultant Help Desk IT Consulting Hampton, VA
Contract Jobs for Microsoft MCTS Consulting Kern County California Freelancing Jobs
Data Recovery for Florida - Jacksonville, FL, Miami, FL, Saint Petersburg, FL, Orlando, FL Florida Server Troubleshoot Expert
Debian Linux, Sun Solaris, UNIX Network Consultant Gentoo Linux, Sun Solaris, UNIX Technology Consulting in San Diego
Firewall Security Contractors Cybersecurity Tech Services in El Paso, TX
Kansas Small Office Server Support Cisco Certified Network Design and Configuration for Wichita, KS
Microsoft Expert Consulting Services for UNIX, Windows Onsite Technical Support
Microsoft MCA Remote Consulting Open Positions MCSE Consulting Subcontractor in Rochester
Microsoft MCITP Remote Consultant Subcontractor San Diego California Microsoft MCA Consulting Full-Time Job
Microsoft MCSA Consultant Positions Microsoft MCTS Engineer Subcontractor Job
Microsoft SQL Server 2016 IT Consultant Microsoft SQL Server 2012 Computer Consulting Company Little Italy
Microsoft SharePoint Server 2010 On-site Support SharePoint Server 2007 Network Consultants
Microsoft SharePoint Server Network Consulting Largest SharePoint 2013 Computer Consulting Phoenix, Maricopa County
Monterey Network Design and Configuration Monterey County Small Business Computer Consulting Company in California
Newark Networking Firms Information Technology Management for Fremont California
Online Consulting for Solaris Remote Sun Solaris Online Consultancy
Online Support Services SharePoint Server 2013 IT Consultants El Paso County Texas
ProSight Behavior-based Antivirus Consultant in San Antonio, Texas Firewall Technical Support Services in Akron Canton
ProSight Behavior-based Antivirus Specialists Solaris Online Technical Support Boston, New England, Massachusetts
ProSight Phishing Defense Engineers in Corpus Christi, TX Windows Server 2012 Information Technology Consultants
ProSight Phishing Protection Consultant Microsoft and Cisco Information Technology Consultant Clarksville, Montgomery County
Professional for ProSight Ransomware Defense Cotati Network Management Services in Northern California
Small Business IT Consultant for Maryland Maryland Computer Installation
St. Paul, Minnesota ProSight Ransomware Protection Consultancy Raleigh, NC Network Consulting Group
Windows Server 2012 Configuration Worldwide Windows Server 2016 Troubleshoot in Silicon Valley, California