Progent's Security Assessment Packages for Enterprise Networks
Network Security Inventory ScanningProgent offers three levels of set-price security assessment packages designed to provide larger enterprises an objective and thorough evaluation of their network security vulnerability. The assessments are performed by Progentís world-class team of certified security engineers using test procedures ranging from relatively friendly to aggressive. All three levels of security assessment include automated scans of services and ports from outside and inside your network firewall, manual analysis of web applications, manual checking of network configurations by a Cisco-certified CCIE engineer, interpretation of scan results by seasoned network security consultants, creation of a concise high-level summary and presentation of an interactive outbrief for your executives, plus a comprehensive technical report and extensive live outbrief for your IT staff. Progent's security engineers are available to help your IT staff with remediation support, and these services, if requested, are billed at Progent's standard consulting rates.

For Progent's standard security assessment packages, Progent's security engineers collect all information about your environment remotely and require temporary access to a computer inside your firewall for hosting a virtual machine from which to conduct internal testing. Progent also presents live, interactive outbriefs online rather than in person. Progent has found that by performing security assessments remotely rather than on site, the client saves money, experiences less disruption, gets faster results, and still receives a comprehensive and actionable security vulnerability evaluation. In situation that require onsite support, Progent can for an added fee provide a team of security engineers to perform testing and outbriefs at your location anywhere in the United States.

Deliverables of Progent's Security Assessment Packages
All levels of Progentís security vulnerability assessment services include deliverables in the form of written reports and interactive verbal presentations. These deliverables are designed to be informative and actionable so that corporate executives have a greater understanding of network security issues and in-house technical staff have a clear roadmap for mitigating any security vulnerabilities uncovered by Progent's assessment tests.

  • Executive Report:
    This summary document includes a statement of accomplishments, a security score card, a list of top outstanding issues, plus high-level guidance and recommendations for mitigation. The Executive Report is brief and is targeted to a technically unsophisticated audience interested mainly in the business implications of Progent's security findings.
  • Executive Outbrief:
    This verbal presentation provides an overview of your companyís security posture and allows executives to interact with the senior engineer from Progentís security team responsible for managing the project. This is an opportunity for executives to drill down into the security issues associated with their network, clarify any questions they have about the observations and recommendations contained in Progent's Executive Report, and obtain a broader perspective of today's worldwide security environment.
  • Technical Report:
    This comprehensive security assessment document includes the rules of engagement, goals, testing methodology, findings, recommendations, risks, suggestions about how to move forward, and relevant raw data collected by Progent. This report is intended for technical personnel who can manage the remediation activity proposed by Progent, and the assessment document provides sufficient detail to allow competent network engineers to implement the recommended fixes without further assistance from Progent. Progent's network consultants are available to help with mitigation work at Progent's standard consulting rates.
  • Technical Outbrief:
    This in-depth technical presentation explains Progentís findings and recommendations to your IT staff. This presentation can last for up to two hours and allows your technical personnel to ask questions and discuss with Progent's security engineers the advantages or pitfalls of various mitigation alternatives and techniques.
Level 1 Package
With the Level 1 Security Assessment package, Progentís engineers look for security vulnerabilities and improperly configured software. Enumeration is accomplished by running external and internal scans of open ports and services. Progent also utilize both open and commercial tools to test web applications for common vulnerabilities such as blind SQL injection, XSS, command injection, unsafe CGIs, etc. Progent also performs a basic manual review of the web application.

Level 2 Package
The Level 2 package includes all Level 1 activity plus verification, exploitation, limited pivoting for expansion, and examination of trusted processes and relationships that may expose attack vectors. Progent also performs web application verification and exploitation, plus a more thorough manual review of web application logic.

Level 3 Package
The Level 3 package is the most aggressive and includes everything in Levels 1 and 2 plus phishing attacks, malicious email, social engineering, MITM attacks, leveraging compromised devices and pillaging them for sensitive data, and physical testing of controls where appropriate. Progent also tests the web application at every user level and extensively reviews web application logic. This service does not include an examination of web application source code.

Major Benefits of Progent's Security Assessment Packages for Enterprise Networks
Progent's Security Assessment Packages offer enterprises the advantages associated with a third-party consulting firm with world-class experience and know-how in evaluating the security and mitigating the vulnerabilities of large, sophisticated information networks and web applications. Key characteristics of Progent's security evaluation services include:

  • Objective: Progentís security team offers you an unbiased and professional look at your security vulnerabilities
  • Certified: Progentís security engineers have been awarded the top security certifications in the industry including Cisco CCIE, CISA, CISM, GIAC, and ISSAP
  • Actionable: Progentís analyses and recommendations give you a solid blueprint for better protecting your network assets
  • Effective: Knowledge of todayís security environment and the latest hacking techniques allows Progent's seasoned security consultants to perform thorough testing and make sensible recommendations
  • Budget Friendly: Progent's Security Assessment Packages are competitively priced and, because they are offered at a set fee, contain no surprises and are easy to budget for. If you utilize Progent to assist with remediation work, Progent's knowledge of your specific network environment will reduce the time required to implement and verify fixes, allowing you to keep IT service costs to a minimum.
Download the Enterprise Security Assessment Datasheet
To download a single-page printable datasheet describing Progent's three set-price Security Assessment service packages for enterprises, click:
Enterprise Security Assessment Packages

Additional Network Security Auditing Services Available from Progent
Progent offers a selection of additional security evaluation and enhancement services intended to test your network for security risks, validate your compliance with governmental or industry security requirements, and remediate potential weaknesses in your network protection:

  • Small Business Security Inventory Evaluation Packages
    Progent offers two Security Inventory evaluation packages for small businesses, the External Network Security Inventory and the Internal Network Security Inventory, which assess different aspects of network security vulnerability and which you can use separately or together. Both packages offer features designed to meet the needs of small businesses who want to take a more proactive role in making their networks safe from malicious assaults but who donít have the time or the budget to manage an exhaustive enterprise-class network security audit.
  • Stealth Penetration Testing
    Progent can manage extensive penetration exercises without the knowledge of internal IT managers. Stealth Security Testing uncovers whether existing security monitoring tools such as intrusion detection alerts and event log monitoring are correctly configured and actively monitored. Progent security experts can utilize a number of popular hacker techniques to expand security holes to acquire knowledge of the full network environment and determine how many internal systems can be accessed and exploited. This method of vulnerability checking can expose the full extent of the security gaps of an information system.
  • Security Evaluation Consulting Services
    Progent's expert security audit and compliance testing services can assist your company to validate your procedures and policies and assess your IT infrastructure to allow your company to build the highest level of security into your information system. Progent's certified security engineers can also test your web business applications for security weaknesses and can conduct company-wide audits to confirm your adherence to key security specifications including HIPAA, PCI, and ISO.
Contact Progent for Network Security Auditing
For more information concerning Progent's network security inventory service bundles, telephone Progent at 800-993-9400 or refer to Contact Progent.

© 2002- 2019 Progent Corporation. All rights reserved.

More topics of interest:

An index of content::

Alameda Information Technology Installation Service Software Consultant for Oakland in Northern California
Anaheim, CA Networking Consultancy Services Information Technology Consulting for Anaheim
CISM Consultant Remote Support Jobs Network Support Telecommuter Jobs Chesapeake Hampton Roads
Charlotte, North Carolina Consolidation Charlotte, North Carolina Technical Consultants
Cisco Assessment Cisco System Consultant Cicero, IL
Cisco CCIP Engineer Employment Opportunities Remote Support Job
Cisco Certified Expert Software Outsourcing Consultant for Contra Costa County California Concord IT Consulting Group
Cisco Computer Consultation Computer Consultants for Cisco
Cisco Computer Help Cisco Security Consultants in Alaska - Anchorage, AK, Juneau, AK, Fairbanks, AK, Ketchikan, AK
Cisco Computer Network Support Group Orlando, FL Cisco Information Technology Support
Cisco Consulting Firms Cisco Small Office Computer Consulting Services
Cisco Network Help Cisco Integration Company Corpus Christi
Cisco Support Outsourcing Technical Consultant for Cisco in Madison Wisconsin
Cisco Tech Services New Mexico - Albuquerque, NM, Las Cruces, NM, Santa Fe, NM, Rio Rancho, NM Cisco System Consultants
Compliance Audit Consultant Miami-Dade County
Configuration for UNIX Remote Technical Support for Linux in Oklahoma
Consultancy Services Company for BlackBerry BPS Jersey City, NJ BlackBerry Professional Software Technical Support Outsource
Consulting Microsoft SharePoint Server 2007 Technology Consulting in Dallas, TX
Contact Center Consulting Global Network Support Help Desk Remote Support Services
Cybersecurity Group for Firewall CISSP Cybersecurity Group Indianapolis Indiana
Cybersecurity Organizations Security Firm in Irving, TX
Debian Linux, Sun Solaris, UNIX Troubleshooting Adams County Colorado Remote Support Services
East Bay Computer Network Support Company Berkeley Support Consultant California
El Paso Computer Security Vulnerability Evaluation Consultancy Microsoft Windows Server 2016 Remote Support Services
Exchange 2000 Server Integration Services Microsoft Exchange Upgrade Technical Consultant
Exchange 2007 Small Business IT Outsourcing Firm Exchange Server 2010 Networking Specialist in San Francisco Bay Area
Exchange 2007 Software Support Durham North Carolina Exchange 2007 Integration Consultant
Firewall Cybersecurity Companies Security Security Team Des Moines Iowa
Firewall Cybersecurity Organization Austin, Texas Consultants
GIAC Networking Organization Cisco Certified Design Associate (CCDA) Server Support
Guru for Windows Server 2016 Migration Consultants for Windows Server 2016 Ada County Idaho
Help Desk Computer Consulting Company Network Companies for Remote Help Desk Pueblo
IT Consultant Debian Linux, Sun Solaris, UNIX Remote Support Services Chicago West Side
IT Service Providers Small Business IT Consultant for Cisco Virginia - Virginia Beach, VA, Norfolk, VA, Chesapeake, VA, Richmond, VA
Information Technology Consultants for Cisco Urgent Migration Companies for Cisco in Richmond, VA
Information Technology Outsourcing Company for Hosting Colocation Center Network Specialists in Tribeca
Installer Consulting Team
Internal Security Inventory Consulting Microsoft Windows 2008 Technical Firms
Internal Security Inventory Services Alabama - Birmingham, AL, Montgomery, AL, Mobile, AL, Huntsville, AL Computer Network Firms
MS SQL Consulting Services Microsoft SQL Server Consulting Services
Microsoft Exchange 2010 Technicians Boston Security Consulting Firm for Exchange 2007
Microsoft Exchange 2016 Implementation Consulting Companies Worldwide Microsoft Exchange Computer Network Consultant
Microsoft Experts Santa Cruz County Computer Service Providers California Small Office IT Support for Capitola
Microsoft Lync Server Instant Messaging Computer Engineer Microsoft Lync Presence Engineer
Microsoft SQL Server 2012 Onsite Support Orange County Florida SQL Server Network Solutions
Microsoft SQL Server 2016 Technology Consulting SQL Server 2012 Recovery Services
Microsoft SharePoint 2010 Support and Integration Washington District of Columbia Professional for Microsoft SharePoint Server 2013
Microsoft and Cisco Certified Remote Troubleshooting Florida Support Organizations
Microsoft and Cisco IT Outsourcing Companies Henderson Boulder City Mesquite Windows Security Small Business Network Consultant
Network Consultant CISSP Security Firm
Network Consultant for Redhat National Online Help for Linux Virginia
Network Consulting for Cisco Cisco Security Consulting Services Phoenix, AZ
Network Performance Troubleshooting Computer Consultant Emergency Network Performance Analysis Network Engineer
Network Security Assessment Services in Campbell, CA Best Support Consultant in Phoenix, Maricopa County
Network Security Audit Security Security Tech Services in NYC
Network Security Test Security Forensics Services Glenview, IL
Networking Group for Windows 2016 Windows Server 2012 Remote Support in Dallas - Irving Texas
New Jersey - Newark, NJ, Jersey City, NJ, Paterson, NJ, Elizabeth, NJ Computer Networking New Jersey Small Office Network Consultant
New York Computer Network Support Company Nationwide New York, NY Design Companies
New York Software Consulting Firm Cisco Certified Expert New York Network Design Consultant
Nexus 7000 Switch Support and Integration Nexus 5600 Switch Support
Online Help South Carolina Solution Providers
ProSight Spam Filtering Professionals Consultant for ProSight Email Spoofing Protection
Remote Help Desk Computer Consultant Migration Help for Remote Help Desk Glendale, AZ
Remote Technical Support for UNIX Linux Technology Consulting in Columbia, South Carolina
SQL Server 2016 Server Consultant Microsoft SQL 2014 Contractor Phoenix - Paradise Valley - Tempe
Sausalito Security Consultants Marin County Computer Specialist
Security Audits for Firewall Firewall Firewall Network Install Orlando, FL
Security Certification for Firewall CISSP Security Consultants in Alabama
Security Consulting Companies for Cisco Cisco Consolidate in San Diego, CA
Security Consulting Firm Metroplex Server Consultant for Windows Server 2012 R2
Security Cybersecurity Contractor Firewall Network Consultants Vermont
Security Firewall Audit Consultants Phoenix Arizona
Security Vulnerability Assessment Services South Dakota Information Technology Manager in Pittsburgh International Airport PIT
Security Vulnerability Evaluation Consultant Services in Wayne, NJ Security Consulting Company for Help Desk in Beaumont Texas
Service for Cisco Network Admin Companies Georgetown
SharePoint Computer Consultant Troubleshooting for SharePoint Server 2007
Support Ubuntu Linux, Sun Solaris, UNIX Professionals
Support Outsourcing Linux On-site Support Salt Lake City, Utah
Urgent Network Small Office Computer Consulting Services Technical Support Firms in Dayton
VPN Troubleshooting VPN Technical Support
Web Application Security Testing Consulting Emeryville Computer Network Support
Wireless Security Inventory Consult System Support Northern California
Wireless Security Inventory Services New Hampshire ISSAP Consulting Openings Louisville
Yonkers, NY Online Technical Support Yonkers, New York Technical Support Organization