Progent's Security Assessment Packages for Enterprise Networks
Network Security Inventory ScanningProgent offers three levels of set-price security assessment packages designed to provide larger enterprises an objective and thorough evaluation of their network security vulnerability. The assessments are performed by Progentís world-class team of certified security engineers using test procedures ranging from relatively friendly to aggressive. All three levels of security assessment include automated scans of services and ports from outside and inside your network firewall, manual analysis of web applications, manual checking of network configurations by a Cisco-certified CCIE engineer, interpretation of scan results by seasoned network security consultants, creation of a concise high-level summary and presentation of an interactive outbrief for your executives, plus a comprehensive technical report and extensive live outbrief for your IT staff. Progent's security engineers are available to help your IT staff with remediation support, and these services, if requested, are billed at Progent's standard consulting rates.

For Progent's standard security assessment packages, Progent's security engineers collect all information about your environment remotely and require temporary access to a computer inside your firewall for hosting a virtual machine from which to conduct internal testing. Progent also presents live, interactive outbriefs online rather than in person. Progent has found that by performing security assessments remotely rather than on site, the client saves money, experiences less disruption, gets faster results, and still receives a comprehensive and actionable security vulnerability evaluation. In situation that require onsite support, Progent can for an added fee provide a team of security engineers to perform testing and outbriefs at your location anywhere in the United States.

Deliverables of Progent's Security Assessment Packages
All levels of Progentís security vulnerability assessment services include deliverables in the form of written reports and interactive verbal presentations. These deliverables are designed to be informative and actionable so that corporate executives have a greater understanding of network security issues and in-house technical staff have a clear roadmap for mitigating any security vulnerabilities uncovered by Progent's assessment tests.

  • Executive Report:
    This summary document includes a statement of accomplishments, a security score card, a list of top outstanding issues, plus high-level guidance and recommendations for mitigation. The Executive Report is brief and is targeted to a technically unsophisticated audience interested mainly in the business implications of Progent's security findings.
  • Executive Outbrief:
    This verbal presentation provides an overview of your companyís security posture and allows executives to interact with the senior engineer from Progentís security team responsible for managing the project. This is an opportunity for executives to drill down into the security issues associated with their network, clarify any questions they have about the observations and recommendations contained in Progent's Executive Report, and obtain a broader perspective of today's worldwide security environment.
  • Technical Report:
    This comprehensive security assessment document includes the rules of engagement, goals, testing methodology, findings, recommendations, risks, suggestions about how to move forward, and relevant raw data collected by Progent. This report is intended for technical personnel who can manage the remediation activity proposed by Progent, and the assessment document provides sufficient detail to allow competent network engineers to implement the recommended fixes without further assistance from Progent. Progent's network consultants are available to help with mitigation work at Progent's standard consulting rates.
  • Technical Outbrief:
    This in-depth technical presentation explains Progentís findings and recommendations to your IT staff. This presentation can last for up to two hours and allows your technical personnel to ask questions and discuss with Progent's security engineers the advantages or pitfalls of various mitigation alternatives and techniques.
Level 1 Package
With the Level 1 Security Assessment package, Progentís engineers look for security vulnerabilities and improperly configured software. Enumeration is accomplished by running external and internal scans of open ports and services. Progent also utilize both open and commercial tools to test web applications for common vulnerabilities such as blind SQL injection, XSS, command injection, unsafe CGIs, etc. Progent also performs a basic manual review of the web application.

Level 2 Package
The Level 2 package includes all Level 1 activity plus verification, exploitation, limited pivoting for expansion, and examination of trusted processes and relationships that may expose attack vectors. Progent also performs web application verification and exploitation, plus a more thorough manual review of web application logic.

Level 3 Package
The Level 3 package is the most aggressive and includes everything in Levels 1 and 2 plus phishing attacks, malicious email, social engineering, MITM attacks, leveraging compromised devices and pillaging them for sensitive data, and physical testing of controls where appropriate. Progent also tests the web application at every user level and extensively reviews web application logic. This service does not include an examination of web application source code.

Major Benefits of Progent's Security Assessment Packages for Enterprise Networks
Progent's Security Assessment Packages offer enterprises the advantages associated with a third-party consulting firm with world-class experience and know-how in evaluating the security and mitigating the vulnerabilities of large, sophisticated information networks and web applications. Key characteristics of Progent's security evaluation services include:

  • Objective: Progentís security team offers you an unbiased and professional look at your security vulnerabilities
  • Certified: Progentís security engineers have been awarded the top security certifications in the industry including Cisco CCIE, CISA, CISM, GIAC, and ISSAP
  • Actionable: Progentís analyses and recommendations give you a solid blueprint for better protecting your network assets
  • Effective: Knowledge of todayís security environment and the latest hacking techniques allows Progent's seasoned security consultants to perform thorough testing and make sensible recommendations
  • Budget Friendly: Progent's Security Assessment Packages are competitively priced and, because they are offered at a set fee, contain no surprises and are easy to budget for. If you utilize Progent to assist with remediation work, Progent's knowledge of your specific network environment will reduce the time required to implement and verify fixes, allowing you to keep IT service costs to a minimum.
Download the Enterprise Security Assessment Datasheet
To download a single-page printable datasheet describing Progent's three set-price Security Assessment service packages for enterprises, click:
Enterprise Security Assessment Packages

Additional Network Security Auditing Services Available from Progent
Progent offers a selection of additional security evaluation and enhancement services intended to test your network for security risks, validate your compliance with governmental or industry security requirements, and remediate potential weaknesses in your network protection:

  • Small Business Security Inventory Evaluation Packages
    Progent offers two Security Inventory evaluation packages for small businesses, the External Network Security Inventory and the Internal Network Security Inventory, which assess different aspects of network security vulnerability and which you can use separately or together. Both packages offer features designed to meet the needs of small businesses who want to take a more proactive role in making their networks safe from malicious assaults but who donít have the time or the budget to manage an exhaustive enterprise-class network security audit.
  • Stealth Penetration Testing
    Progent can perform in-depth network penetration exercises without the knowledge of internal network managers. Unannounced Security Testing uncovers whether in-place security monitoring mechanisms such as intrusion detection alerts and event log tracking are correctly set up and actively managed. Progent security engineers can utilize various hacker techniques to expand security holes to gain an understanding of the entire network environment and determine how many internal systems can be accessed and compromised. This type of vulnerability testing can expose the full scope of the security flaws of an IT environment.
  • Network Security Assessment Consulting
    Progent's expert security audit and compliance testing services can help your business to validate your operations and governance policies and assess your network infrastructure to enable your company to design the highest degree of protection into your IT system. Progent's security engineers can also manually check your web business applications for security vulnerability and can conduct corporate-wide security audits to validate your company's adherence to major security standards including HIPAA, FISMA, and ISO.
Contact Progent for Network Security Auditing
To learn additional information concerning Progent's network security inventory packages, call Progent at 800-993-9400 or go to Contact Progent.

© 2002- 2019 Progent Corporation. All rights reserved.

More topics of interest:

An index of content::

Azure enterprise hybrid cloud solutions Consultancy Microsoft Azure cloud integration Contract Development
BlackBerry BES Server Small Business Computer Consulting Firms BlackBerry Enterprise Server Consultancy Firm St Louis Forest Park
BlackBerry Email Computer Consulting Firms Network Consultation for BlackBerry BPS
BlackBerry Professional Software Small Office Computer Consulting Services BlackBerry Smartphone Small Office IT Consulting Services in Portland, OR
Cisco Experts Madison Outsourcing Services Madison System Repair
Cisco IT Consultant Global Consultancy Firms
Cisco Network Support Companies Cisco Small Business Computer Consultants
Cisco and Microsoft Certified Expert San Diego Install San Diego, CA Management
Cisco and Microsoft Small Business IT Outsourcing Server Migration Specialists for Walnut Creek
Computer Firms for Microsoft SQL 2008 Design Consultant for SQL Server 2014 Montgomery Mobile
Computer Security Vulnerability Evaluation Specialists in Oakland, CA Network Design and Configuration for SQL Server 2012
Computer Setup Cisco Installer Westwood,
Consultant Services in Portland, Oregon Jobs for Cisco CCIE Network Support in Pittsburgh International Airport PIT
Consultant for Web Application Security Evaluation West Virginia Cisco Small Business Computer Consulting Firms
Consulting san Jose - Santa Clara - Milpitas Microsoft SharePoint Server Specialists
Cybersecurity Organizations for Security CISSP Network Security Auditor Anaheim, CA
Dallas, TX Computer Companies Dallas, TX Migration Help
Debian Linux, Sun Solaris, UNIX Consultant Services Red Hat Linux, Sun Solaris, UNIX Support and Integration in Ontario Rialto Hesperia Chino
Engineer for Cisco ASA Firewall IPS Cisco ASA Firewall VPN On-site Support
Engineer for Excel 2003 Excel and SQL Server Consultant
Exchange Server 2003 Technical Support Support and Help
Exchange Server 2010 Small Business IT Consulting Firms Microsoft Exchange 2016 IT Outsourcing Companies Oklahoma City, OK
Firewall Technical Support Services Consultant in Kansas
Freelancing Job for Microsoft Engineer Job Opportunity for ISSAP Engineer
IT Consulting for Pinole San Pablo Outsource IT in Northern California
Information Risk Evaluation Technology Professional in Sacramento, CA Small Business Outsourcing for Microsoft Exchange
Information Technology Manager for Cisco Cisco Consultancy Firm
Internal Security Inventory Consultancy Minneapolis, MN Cisco Tech Services
Internal Security Inventory Consultancy in Louisville, KY Garland, Texas Computer Network Consulting company
Jacksonville, Florida Consult for Network Security Assessment Cisco Technology Support
Jacksonville, Miami, Orlando Support Company Florida - Jacksonville, FL, Miami, FL, Saint Petersburg, FL, Orlando, FL Network Support
Live Online PowerPoint Instruction Live Online Office 365 Training Network Setup
Mandrake Linux, Sun Solaris, UNIX Technology Consulting Ubuntu Linux, Solaris, UNIX Network Consultants in Scottsdale Arizona
MiamiBeach Computer Consultancy MiamiBeach, Florida Network Consultants
Microsoft Certified Remote Consultant Jobs CISSP Consultant Virtual Office Job Lancaster County Nebraska
Microsoft Exchange 2016 Information Technology Outsourcing Group Exchange 2010 Server Network Service Mt Vernon
Microsoft Exchange Consulting Organization Exchange Server 2010 Security Consulting Firm Oakland, CA
Microsoft MCA Support Subcontractor Job Subcontractor Minneapolis, MN
Microsoft MCDST Consultant Home Based Jobs Microsoft MCSA Engineer Employment Opportunities in Citrus Heights, Sacramento County
Microsoft Windows Network Consulting Group Microsoft Windows Tech Support
Microsoft Windows Networking Consultancy Services Microsoft Windows Network Consulting Service
Network Security Evaluation Specialists Walnut Creek Microsoft MCA Engineer Part-Time Job in Sedgwick County Kansas
Online Consulting for Cisco Cisco Small Office IT Consulting Services in Montana
Onsite Computer Services IT Technical Support Company for Microsoft Exchange 2016
Onsite Technical Support for BlackBerry Smartphone Global BlackBerry Enterprise Server Networking Organization Upper East Side, New York
Phone Support for BlackBerry Desktop Manager BlackBerry Email Network Consulting Companies Port of New Orleans
Portland, Oregon Small Business Computer Consultant Consolidation for Oregon - Portland, OR, Salem, OR, Eugene, OR, Gresham, OR
Red Hat Linux, Solaris, UNIX Information Technology Consulting Redhat Linux, Solaris, UNIX Setup and Support
Redhat Linux, Solaris, UNIX Support and Integration Debian Linux, Sun Solaris, UNIX Professionals
Remote Support Services for Microsoft SharePoint Server 2013 SharePoint Support and Help Rochester
Scottsdale Information Technology Outsourcing Cisco and Microsoft Certified Expert Scottsdale Network Specialists
Security Consultant for Security Security Security Group in Rhode Island
Security Security Contractor Security Security Companies
Security Vulnerability Assessment Technology Professional Jersey City, NJ St Louis, MO SharePoint 2013 Specialists
Security Vulnerability Evaluation Professional in Grand Rapids, Michigan Linux Help and Support
Server Consultant Technical Support Outsource for Microsoft Windows Server 2019
SharePoint 2013 Computer Consultant Network Consulting for SharePoint Server 2007
SharePoint Server 2007 Integration SharePoint Technical Consultant Lincoln, NE
SharePoint Server 2010 Professional SharePoint Server Technical Consultant in San Francisco California
Stanislaus County Information Technology Consultant Hughson Network Installations
Support Services Denver, CO, Colorado Springs, CO, Aurora, CO, Lakewood, CO Support
Technical Support Organizations for Microsoft Windows Server 2016 Windows Server 2012 R2 Computer Consultancy Firms Oklahoma City Shawnee
Technology Professional for Computer Security Assessment in Newark, New Jersey Exchange Server 2010 Providers
Telecommuter Job for Microsoft MCSA Consultant Microsoft MCDST Consultant Job Openings Rohnert Park, CA
Troubleshooting for Microsoft SharePoint Remote Support Services for SharePoint Server Louisville, Jefferson County
UNIX Online Consulting On-site Support for Solaris in Virginia
Washington Online Support Services Seattle, WA, Spokane, WA, Tacoma, WA Computer Network Support Companies
Web Application Security Testing Consultant Services Information Technology Support
Web Application Security Testing Specialists Local Security Consulting Firm
Windows 8.1 DirectAccess Information Technology Outsourcing Firm Services
Windows Server 2016 Software Consultant Windows Server 2016 Recovery Services in Nashville Tennessee
wireless VoIP phone integration Engineer Wi-Fi VoIP phone integration Network Consultant