ProSight Duo Access Security
Progent's ProSight Duo family of managed services integrates industry-leading access security technology from Duo, a Cisco Systems subsidiary, to deliver multi-factor ID validation services. Two-factor authentication is one of the pillars of zero-trust cybersecurity design. 2FA uses separate channel identity confirmation to provide an additional layer of security on top of traditional passwords. This blocks the most frequent causes of cybersecurity break-ins like phishing, social engineering, and stolen credentials.
Duo's one-tap Mobile Push app simplifies identity validation
Duo's push technology saves time and distraction by permitting users to verify who they are simply by touching "Approve" on the authentication prompt on their own iOS or Android smartphone or watch. This one-tap procedure does away with the necessity to open an email or text message and copy a security code by hand.
Progent's ProSight Duo line includes three subscription services that progressively add features. ProSight Duo MFA allows you to implement Duo's 2FA technology to guard all applications while offering basic access controls, unified management, and fast provisioning. ProSight Duo Access provides all the features of ProSight Duo MFA and adds adaptive ID validation controls and endpoint health monitoring. ProSight Duo Beyond adds the ability to differentiate corporate as distinct from personal devices, deny access to suspect devices, and allow users safe and seamless access to internal apps. Progent is a Duo Managed Service Provider and can help you to design, deploy and maintain an advanced identity authentication system that provides the highest level of security without disrupting your users.
Two-factor Authentication
The overwhelming majority of cybersecurity breaches exploit compromised passwords. Every service offering in Progent's ProSight Duo suite of access security products can eliminate your risky dependence on password protection by supporting two-factor authentication. With 2FA implemented, when you sign into a protected online account and enter your password you are requested to verify who you are by means of a device that you have exclusive ownership of and that runs on a different ("out-of-band") channel. A broad assortment of devices can be used as this additional means of ID validation such as an iOS or Android smartphone or wearable, a token, a landline phone, etc. You can enroll multiple verification devices.
ProSight Duo 2FA provides an additional level of security
Once you confirm who you are via your validation device, you are allowed to run your app or utilize your VPN or remote desktop service. With the Duo Mobile app's push notification feature enabled, you can simply tap "Approve" on your supported phone or smart watch. This streamlines the sign-on experience by making the authentication procedure nearly instantaneous. For other authentication devices, such as a token, you can transcribe a temporary passcode.
Plans Available with ProSight Duo Managed Services
Progent's ProSight Duo line of subscription managed service plans consist of ProSight Duo MFA, ProSight Duo Access, and ProSight Duo Beyond. Progent's network security consultants can help your business to decide which version of ProSight Duo is the best fit for your requirements.
ProSight Duo MFA Features:
- 2FA authentication
- Duo Mobile to push one-tap ID validation for smartphones and watches
- ID verification through a U2F USB device or biometrics
- Traditional two-factor authentication via a passcode on a token, mobile device, or provided by a network administrator
- Self-enrollment and management
- Dashboard displaying all managed devices accessing secured apps
- Access policy enforcement based on application, user group
- Cloud-based SSO for all applications via an MFA-protected dashboard
ProSight Duo Access Features:
- All the features of ProSight Duo
- Unified Endpoint Visibility displays each networked device, not simply managed endpoints
- Flag and monitor unhealthy endpoints
- Duo Device Health application for notebooks and PCs
- Security health visibility for mobile devices
- Access policy enforcement driven by location
- Blocking options for anonymous communication networks such as The Onion Router (Tor)
- Detection of suspicious or problem networks
- Health-based policy decisions for laptops, PCs and computers
- Advise users at sigh-on to bring up to date their software and cybersecurity settings
ProSight Duo Beyond Features:
- All of the capabilities included with ProSight Duo Access
- Identification of company-owned vs. BYOD notebooks, PCs and mobile devices
- Identification of 3rd-party agents such as AV running on endpoints
- Protected access to on-premises websites/apps and SSH (Secure Shell) servers without requiring VPN credential management
- Verification of both user and device trust
- Limit device access to apps determined by enrollment in endpoint management systems
- Limit mobile access to apps based on membership in mobile device management systems (MDMs)
Read ProSight Duo Access Security Services Datasheet
For a datasheet describing the major features of ProSight Duo Two-factor Authentication Service Plans, select:
ProSight Duo access security service plans datasheet. (PDF - 335 KB)
Download Importance of Deploying Modern Password Management Technology White Paper
To view or download a white paper about the importance of deploying modern password management technology, click:
Importance of Using Advanced Password Management Tools White Paper. (PDF - 2.3 MB)
How Progent Can Assist You to Create an MFA System with ProSight Duo
Progent can help you to design, deploy, maintain and troubleshoot a two-factor authentication solution built on ProSight Duo technology. Progent can also assist you to integrate ProSight Duo 2FA services into a cohesive, company-wide security system by delivering expert support for all aspects of modern security tools and services for any mix of cloud, on-premises, work-from-home, and mobile environments.
Progent's Cisco-certified CCIE network engineers can assist you to set up and debug your Cisco Firepower firewalls, Catalyst switches, VPN devices, and other infrastructure to support Cisco Duo's secure access services. Progent's authorized Azure integration experts, AWS configuration consultants and Google Cloud Platform consultants can help your company to add the security of ProSight Duo two-factor authentication to your cloud-hosted applications. Progent's at-home workforce solution specialists can assist your company to plan and configure protected and reliable remote connectivity for your teleworkers.
Progent also offers rapid access to Exchange Online experts, SQL Server experts, and Microsoft 365 consultants assist your business to prepare and implement Duo secure access technology with your critical workloads. Progent's CISSP-certified cybersecurity experts and CISM-certified network security experts can assist your business to review and strengthen your corporate-wide security posture. Progent also offers ProSight Active Security Monitoring (ASM) services for AI based endpoint security powered by SentinelOne.
Additional Managed Services Available from Progent
Besides ProSight Duo identity authentication services, Progent can provide other value-priced managed service packages that cover key aspects of your IT network such as security, backup/recovery, and network infrastructure management. By partnering with leading technology providers, Progent can provide small and mid-size companies the benefits of the same cutting-edge tools and services used by worldwide enterprises. Managed services offered by Progent include:
- ProSight LAN Watch: Server and Desktop Remote Monitoring and Management
ProSight LAN Watch is Progent's server and desktop monitoring managed service that uses advanced remote monitoring and management (RMM) technology to keep your network running efficiently by tracking the state of vital computers that power your business network. When ProSight LAN Watch detects a problem, an alarm is sent automatically to your designated IT personnel and your assigned Progent engineering consultant so all potential issues can be addressed before they have a chance to disrupt productivity. Learn more about ProSight LAN Watch server and desktop remote monitoring consulting.
- ProSight LAN Watch with NinjaOne RMM: Unified RMM for Networks, Servers, and Workstations
ProSight LAN Watch with NinjaOne RMM software offers a unified, cloud-based platform for monitoring and managing your network, server, and desktop devices by providing an environment for streamlining common time-consuming jobs. These include health monitoring, update management, automated remediation, endpoint configuration, backup and restore, A/V response, secure remote access, standard and custom scripts, asset inventory, endpoint profile reporting, and troubleshooting assistance. If ProSight LAN Watch with NinjaOne RMM identifies a serious issue, it sends an alert to your designated IT management staff and your assigned Progent consultant so that potential problems can be fixed before they interfere with productivity. Learn more details about ProSight LAN Watch with NinjaOne RMM server and desktop monitoring consulting.
- ProSight WAN Watch: Infrastructure Remote Monitoring and Management
Progent's ProSight WAN Watch is a network infrastructure management service that makes it easy and inexpensive for smaller organizations to map, track, reconfigure and debug their networking appliances like switches, firewalls, and load balancers plus servers, printers, endpoints and other devices. Using cutting-edge Remote Monitoring and Management technology, WAN Watch ensures that infrastructure topology diagrams are kept current, captures and displays the configuration information of virtually all devices on your network, tracks performance, and sends alerts when potential issues are detected. By automating time-consuming management and troubleshooting processes, WAN Watch can cut hours off common chores like making network diagrams, expanding your network, finding devices that require critical updates, or identifying the cause of performance problems. Learn more about ProSight WAN Watch infrastructure management consulting.
- ProSight Reporting: Real-time and In-depth Reporting for Ticketing and Network Monitoring Applications
ProSight Reporting is an expanding family of in-depth reporting plug-ins designed to work with the industry's leading ticketing and network monitoring platforms such as ConnectWise Manage, ConnectWise Automate, Customer Thermometer, Auvik, and SentinelOne. ProSight Reporting incorporates Microsoft Graph and utilizes color coding to highlight and contextualize critical issues like spotty support follow-up or endpoints with missing patches. By exposing ticketing or network health concerns clearly and in near-real time, ProSight Reporting improves network value, reduces management hassle, and saves money. For details, see ProSight Reporting for ticketing and network monitoring applications.
- ProSight Data Protection Services: Managed Backup and Disaster Recovery Services
Progent has worked with leading backup technology providers to produce ProSight Data Protection Services, a family of subscription-based offerings that provide backup-as-a-service. ProSight DPS products manage and monitor your backup operations and enable transparent backup and fast restoration of important files/folders, apps, images, plus Hyper-V and VMware virtual machines. ProSight DPS helps your business recover from data loss resulting from equipment failures, natural calamities, fire, cyber attacks like ransomware, user mistakes, malicious employees, or software bugs. Managed services in the ProSight DPS product line include ProSight DPS Altaro VM Backup, ProSight 365 Total Backup (formerly Altaro 365 Backup), ProSight ECHO Backup using Barracuda dedicated hardware, and ProSight MSP360 Hybrid Backup. Your Progent service representative can assist you to determine which of these managed services are best suited for your IT environment.
- ProSight Email Guard: Inbound and Outbound Spam Filtering and Data Leakage Protection
ProSight Email Guard is Progent's spam filtering and email encryption service that incorporates the technology of leading data security companies to provide centralized control and world-class protection for your inbound and outbound email. The powerful architecture of Progent's Email Guard combines cloud-based filtering with an on-premises gateway appliance to provide advanced protection against spam, viruses, Dos Attacks, Directory Harvest Attacks (DHAs), and other email-based malware. Email Guard's Cloud Protection Layer serves as a preliminary barricade and blocks the vast majority of unwanted email from reaching your network firewall. This decreases your vulnerability to inbound attacks and saves system bandwidth and storage space. Email Guard's onsite gateway device adds a further layer of analysis for inbound email. For outgoing email, the on-premises gateway offers AV and anti-spam protection, protection against data leaks, and email encryption. The on-premises gateway can also help Microsoft Exchange Server to track and safeguard internal email traffic that stays inside your corporate firewall. For more details, see Email Guard spam and content filtering.
- Outsourced/Co-managed Help Desk: Help Desk Managed Services
Progent's Support Center services enable your IT team to offload Support Desk services to Progent or split activity for Help Desk services seamlessly between your internal support resources and Progent's extensive roster of IT service technicians, engineers and subject matter experts (SMEs). Progent's Co-managed Service Desk offers a smooth extension of your core IT support team. End user access to the Help Desk, provision of technical assistance, escalation, ticket creation and tracking, performance measurement, and maintenance of the support database are cohesive whether issues are resolved by your in-house IT support organization, by Progent, or by a combination. Find out more about Progent's outsourced/co-managed Call Desk services.
- Active Defense Against Ransomware: AI-based Ransomware Identification and Cleanup
Progent's Active Protection Against Ransomware is an endpoint protection managed service that incorporates cutting edge behavior machine learning technology to guard endpoint devices and servers and VMs against new malware attacks such as ransomware and file-less exploits, which easily escape traditional signature-based AV tools. Progent Active Security Monitoring services safeguard local and cloud resources and offers a single platform to automate the entire threat progression including blocking, detection, mitigation, cleanup, and post-attack forensics. Key capabilities include one-click rollback using Windows Volume Shadow Copy Service and automatic network-wide immunization against new attacks. Find out more about Progent's ransomware protection and recovery services.
- ProSight IT Asset Management: Network Documentation Management
Progent's ProSight IT Asset Management service is a cloud-based IT documentation management service that makes it easy to create, maintain, find and safeguard information related to your IT infrastructure, procedures, business apps, and services. You can instantly locate passwords or serial numbers and be alerted automatically about impending expirations of SSL certificates or warranties. By cleaning up and managing your IT documentation, you can eliminate as much as half of time thrown away trying to find vital information about your network. ProSight IT Asset Management features a common location for holding and collaborating on all documents required for managing your business network like standard operating procedures (SOPs) and self-service instructions. ProSight IT Asset Management also offers a high level of automation for gathering and relating IT information. Whether you're planning improvements, performing regular maintenance, or responding to a crisis, ProSight IT Asset Management delivers the data you require the instant you need it. Learn more about Progent's ProSight IT Asset Management service.
- Patch Management: Patch Management Services
Progent's support services for patch management offer organizations of all sizes a versatile and affordable alternative for assessing, validating, scheduling, implementing, and tracking software and firmware updates to your ever-evolving IT network. In addition to optimizing the protection and functionality of your computer network, Progent's software/firmware update management services allow your IT team to focus on line-of-business initiatives and activities that derive the highest business value from your network. Find out more about Progent's software/firmware update management services.
- ProSight Virtual Hosting: Hosted Virtual Machines at Progent's Tier III Data Center
With Progent's ProSight Virtual Hosting service, a small or mid-size organization can have its critical servers and apps hosted in a protected fault tolerant data center on a fast virtual machine host configured and maintained by Progent's IT support professionals. With Progent's ProSight Virtual Hosting model, the client owns the data, the OS software, and the apps. Because the system is virtualized, it can be moved immediately to a different hosting solution without requiring a time-consuming and difficult reinstallation procedure. With ProSight Virtual Hosting, your business is not tied a single hosting service. Learn more about ProSight Virtual Hosting services.
- ProSight Active Security Monitoring: Endpoint Protection and Ransomware Defense
Progent's ProSight Active Security Monitoring (ASM) is an endpoint protection (EPP) service that utilizes SentinelOne's cutting edge behavior-based machine learning technology to guard physical and virtual endpoints against new malware attacks like ransomware and email phishing, which easily escape traditional signature-based anti-virus products. ProSight Active Security Monitoring protects on-premises and cloud resources and offers a unified platform to automate the complete threat lifecycle including filtering, detection, mitigation, remediation, and post-attack forensics. Key capabilities include single-click rollback using Windows Volume Shadow Copy Service (VSS) and automatic network-wide immunization against newly discovered attacks. Progent is a SentinelOne Partner, dealer, and integrator. Find out more about Progent's ProSight Active Security Monitoring next-generation endpoint protection and ransomware recovery.
- ProSight Enhanced Security Protection (ESP): Physical and Virtual Endpoint Security and Exchange Filtering
Progent's ProSight Enhanced Security Protection (ESP) managed services deliver affordable multi-layer protection for physical servers and virtual machines, desktops, mobile devices, and Exchange Server. ProSight ESP uses adaptive security and modern behavior analysis for continuously monitoring and responding to security threats from all attack vectors. ProSight ESP offers firewall protection, penetration alerts, endpoint management, and web filtering via cutting-edge technologies incorporated within a single agent managed from a single control. Progent's security and virtualization consultants can help your business to design and implement a ProSight ESP deployment that addresses your company's unique needs and that helps you demonstrate compliance with government and industry data security standards. Progent will assist you define and configure policies that ProSight ESP will enforce, and Progent will monitor your network and react to alerts that call for immediate attention. Progent can also assist you to install and verify a backup and disaster recovery solution like ProSight Data Protection Services (DPS) so you can get back in business rapidly from a potentially disastrous security attack like ransomware. Read more about Progent's ProSight Enhanced Security Protection (ESP) unified physical and virtual endpoint security and Exchange email filtering.
Contact Progent for Cybersecurity Solutions
If you need help with multi-factor authentication or any other aspect of cybersecurity, call Progent at 800-993-9400 or visit Contact Progent.