Fast and Affordable Security Checkups for Small Businesses
Network Security Inventory ScanningIs your small business network keeping pace with today's security environment? Are you protecting your network assets? How difficult would it be for a hacker to break into your information system, and what steps can you take to prevent it? Progent has developed a fast and affordable way for small businesses to answer these questions without disrupting their network operations.

Progent's Network Security Inventory packages are fixed-price service bundles that rely on advanced network scanning technology and the certified expertise of Progent's security engineers to evaluate the vulnerability of your network and provide recommendations for simple ways you can mitigate your security risk. Progent offers two packages, the External Network Security Inventory and the Internal Network Security Inventory, which assess different aspects of network security exposure and which you can use separately or together. Both packages offer features designed for the needs of small businesses who want to take a more proactive role in making their networks safe from malicious assaults but who donít have the time or the budget to manage an exhaustive enterprise-class network security audit.

Top Features and Benefits of Progent's Security Inventory Packages for Small Business Networks
Progent's Security Inventory packages offer an array of features and benefits especially designed to address today's increasingly hostile security environment in which all business networks operate but also to take into account the financial and operational realties of small companies. Implemented together or separately, Progent's External and Internal security scanning packages help small businesses achieve a high level of network protection at little cost or hassle.

  • Low-cost:
    Progent's Network Security Inventory packages are inexpensive and are offered at a set-price, so you know in advance what it will cost to understand the state of your network security. Potential attack vectors detected by Progent's security scans are typically easy to fix and involve configuration issues with network operating systems, applications, and devices. If you have not regularly utilized security scans in the past, you get a lot of bang for your buck. Generally, a great deal of security risk associated with small business networks can be substantially reduced at very little expense.
  • Fast:
    The scanning, analysis, and reporting processes involved in Progent's Network Security Inventory packages can usually be completed in one business day. This fast turnaround can reduce the window during which your network is exposed to attack by allowing you to move quickly into remediation mode. This also reduces the stressful suspense management may feel not knowing whether information assets are safe, and minimizes the time that your network manager is diverted from other responsibilities. A combination of advanced scanning technology and experienced engineers allow Progent's security team to deliver results quickly and at low cost to the customer.
  • Remote Scanning:
    The scanning phase of Progent's Network Security Inventory packages are managed remotely from a secure Progent site. In the case of the Internal Network Security Inventory package, the scan is itself run from an onsite machine made available by the customer. The setup procedure for external or internal scans can accomplished in minutes, and the collected data is analyzed offsite by Progent's certified security professionals. By utilizing remote tools to conduct the Network Security Inventory packages, Progent saves significant time and money, which in turn allows Progent to offer these packages at prices that small businesses can afford.
  • Proactive:
    Progent's Network Security Inventory packages are not intended to detect and remove viruses or other malware resulting from a successful attack on your network, but to uncover common security gaps before they are exploited by malicious sources. Although larger enterprises routinely utilize third-party consulting firms like Progent to conduct vulnerability scans in order to benefit from an objective risk assessment, small businesses with limited IT budgets and technical expertise often wait until their networks are hacked before getting serious about security. By offering vulnerability scanning packages that are fast, affordable, and effective, Progent makes it a no brainer for small businesses to take the lead in protecting their network assets.
  • Certified Security Engineers:
    Progent's security engineers have been certified by some of the industry's most prestigious standards institutions including the Information Systems Audit and Control Association (ISACA), the International Information Systems Security Certification Consortium (ISC), and the SANS Institute. Progent's security team has worked with major enterprises to assess and enhance network security. With Progent's Network Security Inventory packages, small businesses get the benefit of vulnerability assessments from world-class security professionals without requiring an enterprise-class IT budget.
  • Effective:
    Progent's security engineers are familiar with the sophisticated tools and techniques hackers employ to break into information networks to steal and control resources and data. The majority of these intrusion attempts are based on exploiting security gaps that are surprisingly easy to block. Both of Progent's Network Security Inventory packages address a separate range of potential security vulnerabilities often found in small business IT networks. Either package will provide information to help you enhance your network protection. Using the external and the internal scan packages together will allow you to secure your network even more.
  • Actionable Reporting:
    The data collected from Progent's Network Security Inventory scans are analyzed by a certified engineer on Progent's security team. As part of the package, Progent's security engineer will prepare and send a report that summarizes the results of the vulnerability scan and suggests mitigation procedures that can be performed by Progent, by your in-house IT support staff, or by a competent third-party security consulting firm. Any remedial work requested from Progent will be performed as a separate project for which Progent can provide a time estimate and for which Progent will bill at standard consulting rates.
External Security Inventory Scan
Progent's External Network Security Inventory package tests for the threat levels of the open ports and services on your network that are exposed outside your firewall. These ports and services can include email, web sites, eCommerce applications, remote access tools, or any service that requires or is granted communication with the world beyond your firewall. This is a favorite hunting ground of hackers and, in many small businesses, a rich source of attack vectors.

Progent's security team will examine the scanned data, produce a report that summarizes and interprets the results, and make suggestions on efficient ways to reduce your exposure to attack. The external scan will not disrupt your ongoing network operations or noticeably impact your system performance. Progent offers this service package at a low set price that covers setup, scanning, analysis, reporting, and recommendations. The set price does not include remediation services which may be suggested. These follow-on services can be performed by any qualified security engineer and are available from Progent at standard consulting rates.

Internal Security Inventory Scan
Many security attacks originate from inside your company firewall and can be the result of careless employees who attach compromised laptops to your network, workers who try to access restricted information or gain unauthorized administration rights, or lurkers in close physical proximity to your wireless access points. Progent's Internal Network Security Inventory package tests for vulnerabilities within your firewall by looking for open ports and services that are not exposed to the outside world but that could be a source of trouble if improperly configured. The internal scan can be executed from any computer inside your security perimeter that you make temporarily available to Progent's security engineer. Progent will remotely download a virtual machine and the required scanning tools to the internal computer you have assigned, launch the scan, and transfer the collected data to a secure Progent site. Progent does not need to make an expensive onsite service call and the time required to install and subsequently remove the scanning software is negligible.

Progent's security engineer managing the Internal Security Inventory Scan will examine the scanned data and create a report that summarizes the results and suggests any mitigation measures that may be required. Progent offers this service package at a low set price that covers setup, scanning, analysis, reporting, and recommendations. The set price does not include remediation services which may be suggested. These follow-on services can be performed by any qualified security engineer and are available from Progent at standard consulting rates.

Download the Security Inventory Scan Datasheet
To download a single-page printable datasheet describing Progent's two set-price Security Inventory Scan service packages for small businesses, click:
Security Inventory Scanning Packages (PDF - 104 KB).

Additional Network Security Auditing Services Available from Progent
Progent offers a variety of additional services designed to check your network for vulnerabilities, verify your compliance with governmental or industry security standards, and mitigate critical gaps in your network's defenses:

  • Enterprise Vulnerability Assessment Service Packages
    Progent can provide a range of set-price enterprise security assessment service packages created for corporations who need to comply with security standards required by state agencies or by customers. Progent's security assessment packages offer larger businesses an opportunity to get an objective opinion about the strength of their network security. For each security inventory or evaluation bundle, Progent engineers with high-level security credentials analyze and report on collected data and provide suggestions for effective improvements. An added-cost option for on-premises security engineers is available throughout United States.
  • Unannounced Penetration Testing
    Progent can perform comprehensive penetration exercises without warning in-house IT resources. Stealth Security Testing reveals whether in-place network security monitoring mechanisms such as penetration detection alarms and event log monitoring are properly configured and consistently monitored. Progent security experts can use various hacker tools to extend security holes to acquire an understanding of the entire network and detect how many internal systems can be connected to and exploited. This type of vulnerability checking can expose the entire extent of the security gaps of a network.
  • Security Evaluation Consulting
    Progent's advanced network security assessment and compliance testing support services can help your business to evaluate your operations and governance policies and assess your IT environment to allow you to build the highest degree of protection into your IT system. Progent's security engineers can also test your web-based applications for security weaknesses and can perform company-wide audits to validate your compliance with key security specifications including HIPAA, PCI, and ISO.
ProSight Low-Cost Managed Services for Information Assurance
Progent's value-priced ProSight series of network monitoring and management services is intended to provide small and mid-size businesses with enterprise-class support and cutting-edge technology for all aspects of information assurance and compliance. ProSight managed services offered by Progent include:
  • ProSight Active Security Monitoring (ASM): Next Generation Endpoint Protection and Ransomware Recovery
    ProSight Active Security Monitoring is an endpoint protection (EPP) solution that utilizes next generation behavior analysis tools to guard endpoint devices and physical and virtual servers against modern malware assaults such as ransomware and file-less exploits, which easily get by traditional signature-based anti-virus tools. ProSight ASM protects on-premises and cloud-based resources and provides a single platform to address the complete malware attack lifecycle including protection, detection, mitigation, cleanup, and forensics. Top capabilities include single-click rollback using Windows Volume Shadow Copy Service and automatic network-wide immunization against new attacks. Read more about Progent's ProSight Active Security Monitoring next-generation endpoint protection and ransomware defense.

  • ProSight Enhanced Security Protection (ESP): Unified Physical and Virtual Endpoint Protection
    ProSight Enhanced Security Protection (ESP) services offer economical in-depth protection for physical servers and VMs, workstations, smartphones, and Microsoft Exchange. ProSight ESP utilizes adaptive security and advanced machine learning for round-the-clock monitoring and reacting to security assaults from all vectors. ProSight ESP offers firewall protection, intrusion alerts, device control, and web filtering through leading-edge tools packaged within one agent accessible from a single control. Progent's security and virtualization experts can assist you to design and configure a ProSight ESP environment that meets your organization's unique requirements and that helps you demonstrate compliance with government and industry data security standards. Progent will help you define and configure security policies that ProSight ESP will manage, and Progent will monitor your network and react to alarms that call for urgent attention. Progent can also assist you to set up and test a backup and disaster recovery system like ProSight Data Protection Services so you can get back in business rapidly from a potentially disastrous security attack such as ransomware. Read more about Progent's ProSight Enhanced Security Protection unified physical and virtual endpoint security and Microsoft Exchange filtering.

  • ProSight DPS: Managed Backup and Recovery
    ProSight Data Protection Services from Progent offer small and mid-sized businesses an affordable and fully managed service for reliable backup/disaster recovery. Available at a fixed monthly price, ProSight DPS automates and monitors your backup activities and enables rapid restoration of vital data, applications and VMs that have become lost or damaged as a result of component failures, software glitches, natural disasters, human error, or malicious attacks such as ransomware. ProSight Data Protection Services can help you protect, retrieve and restore files, folders, apps, system images/, plus Microsoft Hyper-V and VMware images/. Important data can be protected on the cloud, to a local device, or to both. Progent's cloud backup specialists can deliver advanced expertise to set up ProSight Data Protection Services to comply with regulatory standards such as HIPPA, FIRPA, PCI and Safe Harbor and, when needed, can assist you to restore your business-critical information. Learn more about ProSight DPS Managed Backup and Recovery.

  • ProSight Email Guard: Inbound and Outbound Spam Filtering, Data Leakage Protection and Content Filtering
    ProSight Email Guard is Progent's email security platform that incorporates the technology of top information security vendors to deliver web-based management and world-class security for your inbound and outbound email. The powerful structure of Progent's Email Guard managed service combines a Cloud Protection Layer with a local security gateway appliance to offer advanced protection against spam, viruses, Denial of Service (DoS) Attacks, Directory Harvest Attacks, and other email-based malware. Email Guard's cloud filter serves as a preliminary barricade and keeps most unwanted email from reaching your network firewall. This decreases your exposure to inbound threats and saves system bandwidth and storage. Email Guard's onsite security gateway appliance provides a further level of analysis for inbound email. For outbound email, the on-premises security gateway provides anti-virus and anti-spam filtering, DLP, and encryption. The on-premises gateway can also help Microsoft Exchange Server to track and protect internal email that stays within your security perimeter. Find out more about Progent's ProSight Email Guard spam filtering, virus blocking, content filtering and data loss protection.

  • ProSight WAN Watch: Network Infrastructure Management
    Progentís ProSight WAN Watch is a network infrastructure monitoring and management service that makes it easy and inexpensive for smaller businesses to map out, monitor, optimize and debug their connectivity hardware such as switches, firewalls, and wireless controllers plus servers, printers, endpoints and other devices. Using cutting-edge RMM technology, WAN Watch ensures that infrastructure topology diagrams are kept current, captures and displays the configuration of almost all devices connected to your network, monitors performance, and generates notices when problems are detected. By automating complex management processes, WAN Watch can cut hours off common chores like making network diagrams, reconfiguring your network, locating appliances that require important software patches, or resolving performance issues. Find out more details about ProSight WAN Watch infrastructure management services.

  • ProSight LAN Watch: Server and Desktop Remote Monitoring and Management
    ProSight LAN Watch is Progentís server and desktop remote monitoring service that incorporates state-of-the-art remote monitoring and management (RMM) techniques to help keep your IT system running efficiently by tracking the health of vital assets that power your information system. When ProSight LAN Watch detects a problem, an alarm is transmitted automatically to your specified IT management personnel and your assigned Progent engineering consultant so all looming issues can be resolved before they can impact your network Learn more about ProSight LAN Watch server and desktop monitoring consulting.

  • ProSight Virtual Hosting: Hosted Virtual Machines at Progent's World-class Data Center
    With ProSight Virtual Hosting service, a small business can have its critical servers and applications hosted in a secure Tier III data center on a fast virtual host configured and maintained by Progent's IT support experts. With the ProSight Virtual Hosting service model, the customer retains ownership of the data, the OS platforms, and the applications. Because the environment is virtualized, it can be ported easily to an alternate hosting environment without a time-consuming and technically risky reinstallation process. With ProSight Virtual Hosting, you are not locked into one hosting provider. Find out more details about ProSight Virtual Hosting services.

  • ProSight IT Asset Management: Network Infrastructure Documentation Management
    Progent's ProSight IT Asset Management service is a cloud-based IT documentation management service that allows you to capture, update, find and protect information related to your network infrastructure, processes, business apps, and services. You can instantly locate passwords or IP addresses and be alerted about upcoming expirations of SSLs or warranties. By cleaning up and managing your IT infrastructure documentation, you can eliminate up to 50% of time spent looking for critical information about your IT network. ProSight IT Asset Management includes a centralized repository for holding and sharing all documents related to managing your network infrastructure like standard operating procedures (SOPs) and self-service instructions. ProSight IT Asset Management also offers advanced automation for collecting and relating IT information. Whether youíre making improvements, performing regular maintenance, or responding to a crisis, ProSight IT Asset Management gets you the information you need the instant you need it. Learn more about Progent's ProSight IT Asset Management service.
ProSight Network Audits
Progent's ProSight Network Audits offer a fast and affordable way for small and mid-size businesses to get an objective assessment of the overall health of their information system. Powered by a selection of the leading remote monitoring and management tools in the industry, and supervised by Progent's world-class group of information technology experts, ProSight Network Audits help you see how closely the configuration of your essential infrastructure assets conform to leading practices. The Basic and Advanced versions of ProSight Network Audit services are offered at a low, one-time cost and deliver instant benefits like a cleaner Active Directory system. Both versions also include one year of advanced remote network monitoring and management. Advantages can include easier network management, improved compliance with data security standards, more efficient utilization of network resources, faster problem resolution, more reliable backup and restore, and less downtime. See more about Progent's ProSight Network Audits IT infrastructure review.

The ProSight Ransomware Preparedness Report Service
Progent's ProSight Ransomware Preparedness Report service is a low-cost service built around a brief phone interview with a Progent information assurance consultant. The fact-finding interview is intended to assess your company's ability to block or recover quickly following an assault by a ransomware strain such as Ryuk, WannaCry, MongoLock, or Locky. Progent will consult with you directly to collect information about your existing AV defense and backup/recovery system, and Progent will then produce a custom Basic Security and Best Practices Report describing how you can apply best practices to deploy an efficient AV and backup environment that meets your company's requirements. For more information, see Progent's ProSight Ransomware Preparedness Report.

Contact Progent for Network Security Auditing
To learn additional information about Progent's computer security inventory scanning packages, telephone Progent at 800-993-9400 or refer to Contact Progent.
















© 2002- 2019 Progent Corporation. All rights reserved.



More topics of interest:


An index of content::

Arlington, Texas IT Consulting National Maintenance
BlackBerry Computer Network Companies Outsourcing Company for BlackBerry Software
BlackBerry Wireless Computer Specialists Orlando, FL BlackBerry Enterprise Server Security Consulting Company
Blackberry Specialists Wireless Online Troubleshooting
CISSP Certified Expert Arkansas Information Technology Outsourcing Companies Cisco Certified Arkansas Software Consultants
CISSP Consultant Job Contract Jobs St Paul, Ramsey County
CISSP Consulting Services Firewall Computer Security Specialist
CISSP Network Security Test Security Information Technology Consulting
Cisco CCIE Storage Networking Support Contractor Job CISSP Consultant Remote Support Jobs
Cisco IT Consulting Network Service for Cisco in Pittsburgh Pennsylvania
Cisco Problem Resolution Cisco Computer Consulting Group Baton Rouge, LA
Cisco Small Office IT Consulting Services Dallas County Cisco Networking Help
Computer Support Company for Exchange 2007 Exchange 2007 Network Help
Consultancy for Security Scan Illinois Microsoft MCTS Support Subcontractor
Consultants for External Security Scan San Rafael, California Tech Consulting
Cybersecurity Companies for Security Firewall Testing in Toledo Ohio
Detroit, Grand Rapids, Warren, MI Networking Specialist Michigan Designers
Emeryville Design Company California Microsoft Certified Expert Consulting Services Firm
Engineer in Livermore, CA Gentoo Linux, Sun Solaris, UNIX Support and Integration in Detroit
Exchange 2003 Server Information Technology Integrators Exchange Technician in Bakersfield
Exchange 2016 IT Solution Providers Exchange Server 2013 Information Technology Installation Service in Nashville, Davidson County
Exchange Network Integration Microsoft Exchange Engineers
External Security Inventory Technology Professional New Orleans New York City, Buffalo, Rochester, Syracuse, Yonkers, Albany On-site IT Support
External Security Scan Technology Professional in Glendale, Arizona Cisco CCDP Network Consulting Part-Time Jobs
Florida Solution Providers Florida Computer Support Company
Fremont Online Troubleshooting Fremont Information Technology Consulting Firms in California
Hyper-V 2016 Management Setup and Support Consultants for Windows Hyper-V 2016 Shielded VMs
IT Consultant for Solaris Redhat On-site Technical Support Ohio
IT Consultants for Microsoft Exchange 2010 Dallas County Texas Exchange Server 2013 Computer Help
IT Consulting Firm Cisco Security Consulting Firm Hialeah
Integration Services for Microsoft SharePoint Server 2013 SharePoint Server 2007 Integration Services Silicon Valley, CA
Internal Security Inventory Specialist Brooklyn Worldwide Microsoft Engineer Telecommuter Jobs
Internal Security Scan Professional SQL 2012 Server Setup
Irving, Texas Engineers for External Network Security Inventory Microsoft and Cisco Technical Support in Ann Arbor Flint
Jabber Contact Search Technical Support Integration Services for Jabber and Expressway
Linux Network Engineer Independent Linux Technical Support New York City, Buffalo, Rochester, NY
Linux Technical Support Services Computer Consultants for Solaris Iowa
Louisville, KY Computer Setup Network Architect
Lync Server 2010 Consultancy Computer Consultant
MCSE Expert Certified San Jose Administration Northern California Cisco and Microsoft Certified Network Installation
Microsoft MCTS Engineer Subcontractor Jobs Contract Job Opportunities Detroit
Microsoft SharePoint Server 2013 Integration SharePoint Server Remote Troubleshooting in Harris County Texas
Microsoft SharePoint Server 2013 Support and Setup SharePoint Server 2010 Support Outsourcing in Buffalo New York
Microsoft and Cisco Certified Expert Berkeley Network Help California Oakland Support services
Milpitas IT Outsourcing Fremont IT Consulting Group
Monitoring and Reporting Specialists Microsoft Operations Manager Professional
Network Consultants for Red Hat Linux, Sun Solaris, UNIX Redhat Linux, Sun Solaris, UNIX Consulting in Grand Rapids, MI
Network Security Auditing for Firewall Firewall Security Audits
Network Security Inventory Professionals Bay Area Troubleshooting in California
Network Security Scan Professional Firewall Firewall Configure
New Orleans Computer Outsourcing Consultant New Orleans, Louisiana Consultants
Ohio Solution Provider Columbus, Cleveland, Cincinnati, Toledo, Akron, Dayton Information Technology Consulting Company
Online Support for Microsoft SharePoint 2013 Boston Massachusetts Local SharePoint Server 2010 Computer Consultant
Oregon Network Consulting Services CISM Security Security Oregon Software Security Consultant
Outsourcing Firm Microsoft Exchange Server 2007 Repair
Professional in Sacramento County Linux Remote Consulting
Recovery Services for Windows Computer Support Firms for Windows 2019 Server in Raleigh Durham Cary
Redhat Linux, Solaris, UNIX Setup and Support Debian Linux, Solaris, UNIX Online Consulting in Chicago Downtown
Scottsdale Support Specialist Remote Scottsdale Network Repair Service
Security Audit Services for Firewall Security Security Firms Southern California Riverside
Security Consultants for Microsoft Windows Server 2016 Charlotte, Mecklenburg County Migration Firm
Security Consulting Services Microsoft SQL Server 2016 Information Technology Consulting Companies in Wichita Airport ICT
Server Administration Consultant Services Dallas - Irving Texas
SharePoint Remote Support Services Microsoft SharePoint 2010 Help and Support Huntington Beach, Orange County
SharePoint Server 2007 Consultants Greensboro Winston-Salem High Point Consultant Services for SharePoint Server 2013
Sioux Falls, Minnehaha County, South Dakota Consultancy Services Group South Dakota Outsourcing IT Support
Small Business Network Information Technology Outsourcing Help Desk IT Technical Support Company
Small Business Small Business IT Consulting Companies Best Support Team
Software Security Consultant for Microsoft Windows Server 2019 Windows Server 2012 Technology Consulting in Georgia
Technology Consulting for Network Support Help Desk Microsoft Help Desk Consultants
Toledo, Ohio Consultancy for Security Scan SharePoint 2013 IT Consultant in Anchorage Alaska
UNIX Setup and Support Linux Support Services in South Dakota
Ubuntu Linux, Solaris, UNIX Online Help Suse Linux, Sun Solaris, UNIX Technology Consulting Services
Unified Communications Manager Computer Consulting Troubleshooting
Virtual Office Job Microsoft MCDBA Consulting Freelancing Job New Orleans Louisiana
WLAN Site Survey IT Services 802.11x Wi-Fi Site Survey Support and Integration
Windows Server 2012 R2 Migration Companies Windows Server 2012 Network Designers Cleveland, OH
Winston-Salem, NC Network Security Inventory Consultants Riverbank Networking Specialist
Wireless Security Inventory Consultants Grand Rapids Microsoft MCTS Consulting Employment Opportunities
Wireless Security Scan Consultancy Louisville, Kentucky Microsoft and Cisco Designers in Santa Clara County California
Yolo County Support Team Yolo County System Consulting