ProSight Duo Access Security
Progent's ProSight Duo suite of services integrates industry-leading technology from Duo, a Cisco subsidiary, to offer two-factor ID validation services. Two-factor authentication (2FA) is one of the foundations of zero-trust cybersecurity design. 2FA uses separate channel identity confirmation to build an additional level of security on top of just passwords. This guards against the most frequent causes of cybersecurity breaches such as phishing, social engineering, and credential theft.
Duo's one-tap Mobile Push app simplifies identity validation
Duo's Push App saves time and distraction by allowing users to confirm who they are simply by tapping "Approve" on the authentication prompt on their own smartphone or wearable. This one-touch procedure does away with the necessity to retrieve an email or text and transcribe a security code manually.
Progent's ProSight Duo catalog includes three subscription services that progressively add features. ProSight Duo MFA permits you to implement Duo's 2FA platform to protect all apps while providing essential access tools, unified management, and rapid endpoint provisioning. ProSight Duo Access provides all the features of ProSight Duo MFA plus adaptive ID validation policies and extensive endpoint health checking. ProSight Duo Beyond brings the ability to differentiate corporate as opposed to personal devices, deny access to suspect devices, and allow users safe and transparent access to internal applications. Progent is a Duo Managed Service Provider and can help your business to design, deploy and manage a modern identity authentication solution that provides the highest level of security without disrupting your users.
Two-factor Authentication
The vast majority of cybersecurity breaches involve compromised passwords. Each service plan in Progent's ProSight Duo catalog of access security solutions can eliminate your risky reliance on password protection by allowing two-factor authentication. With 2FA implemented, when you log into a protected online application and enter your password you are requested to verify your identity by means of a device that you have sole possession of and that runs on a different ("out-of-band") channel. A broad assortment of devices can be used as this additional means of authentication including a smartphone or wearable, a token, a landline telephone, etc. You can enroll several different validation devices.
ProSight Duo 2FA adds an extra layer of security
After you verify your identity via your out-of-band device, you are permitted to use your application or access your VPN or remote desktop connection. With the Duo Mobile app's push notification feature activated, you can simply tap "Approve" on your supported phone or watch. This improves the login experience by making the verification procedure nearly instantaneous. For traditional secondary devices, such as a token, you can transcribe a temporary password.
Products Available with ProSight Duo Services
Progent's ProSight Duo catalog of subscription-based managed service plans include ProSight Duo MFA, ProSight Duo Access, and ProSight Duo Beyond. Progent's network security experts can help your organization to decide which plan for ProSight Duo is best suited for your requirements.
ProSight Duo MFA Features:
- 2FA authentication
- Duo Mobile to push single-touch ID validation for iOS or Android smartphones and wearables
- Authentication via a U2F USB device or biometrics
- Conventional 2FA with a passcode displayed on a token, mobile device, or issued by a network administrator
- Self-enrollment and self-management
- Dashboard displaying all managed endpoints connected to protected apps
- Policy enforcement driven by app, group
- Cloud-based single sign-on (SSO) for all apps through an MFA-protected dashboard
ProSight Duo Access Features:
- All the capabilities included with ProSight Duo
- Unified Endpoint Visibility shows each networked device, not just managed devices
- Highlight and monitor unhealthy devices
- Duo Device Health application for laptops and PCs
- Security health monitoring for mobile devices
- Access policy enforcement driven by geo-location
- Blocking capability for anonymous networks like Tor
- Detection of suspicious or unhealthy networks
- Health-determined policy enforcement for laptops, PCs and computers
- Prompt users during login to bring up to date their software and cybersecurity configurations
ProSight Duo Beyond Features:
- All the features of ProSight Duo Access
- Identification of corporate-owned as opposed to personally owned laptops, desktops and mobile devices
- Detection of 3rd-party software agents like anti-virus operating on endpoints
- Protected access to on-prem websites/apps and SSH servers without needing VPN credential management
- Confirmation of both user and device trust
- Limit device access to applications based on enrollment in endpoint management systems
- Limit mobile access to applications based on membership in mobile device management systems (MDMs)
Read ProSight Duo Access Security Services Datasheet
To download a datasheet describing the major features of ProSight Duo Access Security Services, select:
ProSight Duo two-factor authentication service plans datasheet. (PDF - 335 KB)
Download Importance of Deploying Advanced Password Management Tools White Paper
To read or download a white paper describing the importance of deploying modern password management technology, click:
Reasons for Deploying Advanced Password Management Technology White Paper. (PDF - 2.3 MB)
How Progent Can Help You to Build an MFA System with ProSight Duo
Progent can assist you to plan, implement, manage and debug a two-factor ID verification system based on ProSight Duo managed services. Progent can also assist you to integrate ProSight Duo 2FA services into a unified, end-to-end cybersecurity strategy by delivering expertise in all facets of advanced cybersecurity technology for any combination of cloud-based, on-premises, at-home, and mobile environments.
Progent's Cisco CCIE network engineers can help you to configure and debug your Cisco ASA firewalls, switches, VPN connections, and other network infrastructure to work with Cisco Duo's secure access technology. Progent's certified Azure experts, AWS configuration experts and Google Cloud Platform consulting experts can assist you to bring the protection of ProSight Duo two-factor authentication to your cloud-hosted apps. Progent's at-home workforce integration experts can help your business to plan and configure protected and resilient remote connectivity for your teleworkers.
Progent can also provide rapid access to Exchange Online consultants, SQL Server consultants, and Microsoft 365 consultants help your business to prepare and deploy Duo secure access technology with your critical workloads. Progent's CISSP-certified network security consultants and CISM-certified network security specialists can assist your company to review and strengthen your corporate-wide security posture. Progent also offers ProSight Active Security Monitoring (ASM) services for machine-learning based endpoint protection powered by SentinelOne.
Additional Managed Services Offered by Progent
In addition to ProSight Duo identity authentication services, Progent can provide other affordably-priced managed service plans that cover vital components of your IT network like cybersecurity, backup/restore, and network infrastructure monitoring and management. By working with leading technology innovators, Progent can offer small and middle-size companies the advantages of the same cutting-edge tools and services utilized by the world's largest enterprises. Managed service plans available from Progent include:
- ProSight LAN Watch: Server and Desktop Remote Monitoring and Management
ProSight LAN Watch is Progent's server and desktop monitoring managed service that uses state-of-the-art remote monitoring and management (RMM) techniques to help keep your network operating at peak levels by tracking the state of critical assets that drive your information system. When ProSight LAN Watch uncovers a problem, an alarm is sent automatically to your designated IT staff and your Progent consultant so that any looming issues can be resolved before they have a chance to disrupt productivity. Learn more details about ProSight LAN Watch server and desktop monitoring services.
- ProSight LAN Watch with NinjaOne RMM: Unified RMM Solution for Networks, Servers, and Desktops
ProSight LAN Watch with NinjaOne RMM software delivers a unified, cloud-driven solution for monitoring and managing your client-server infrastructure by offering tools for performing common tedious tasks. These include health monitoring, update management, automated remediation, endpoint setup, backup and restore, anti-virus defense, secure remote access, built-in and custom scripts, resource inventory, endpoint profile reporting, and troubleshooting help. When ProSight LAN Watch with NinjaOne RMM uncovers a serious issue, it transmits an alert to your specified IT staff and your Progent consultant so potential problems can be taken care of before they interfere with your network. Learn more details about ProSight LAN Watch with NinjaOne RMM server and desktop remote monitoring services.
- ProSight WAN Watch: Infrastructure Remote Monitoring and Management
Progent's ProSight WAN Watch is a network infrastructure management service that makes it easy and affordable for smaller organizations to map out, track, optimize and troubleshoot their connectivity appliances such as routers and switches, firewalls, and wireless controllers plus servers, printers, client computers and other devices. Using cutting-edge RMM technology, WAN Watch ensures that network maps are always current, copies and manages the configuration information of virtually all devices on your network, monitors performance, and sends alerts when issues are detected. By automating tedious network management processes, WAN Watch can cut hours off common tasks such as making network diagrams, expanding your network, locating devices that require critical software patches, or isolating performance issues. Find out more about ProSight WAN Watch infrastructure management services.
- ProSight Reporting: In-depth Reporting for Ticketing and Network Monitoring Platforms
ProSight Reporting is a growing family of real-time and in-depth reporting tools created to integrate with the top ticketing and network monitoring platforms such as ConnectWise Manage, ConnectWise Automate, Customer Thermometer, Auvik, and SentinelOne. ProSight Reporting uses Microsoft Graph and utilizes color coding to surface and contextualize key issues such as inconsistent support follow-up or machines with missing patches. By exposing ticketing or network health concerns concisely and in near-real time, ProSight Reporting enhances productivity, lowers management overhead, and saves money. For details, visit ProSight Reporting for ticketing and network monitoring platforms.
- ProSight Data Protection Services (DPS): Managed Backup and Disaster Recovery Services
Progent has worked with leading backup/restore technology providers to produce ProSight Data Protection Services, a selection of subscription-based management offerings that deliver backup-as-a-service. ProSight DPS services manage and monitor your data backup operations and enable non-disruptive backup and fast recovery of critical files/folders, apps, system images, and virtual machines. ProSight DPS lets you avoid data loss caused by equipment failures, natural disasters, fire, malware such as ransomware, user mistakes, malicious insiders, or application bugs. Managed services in the ProSight Data Protection Services portfolio include ProSight Altaro VM Backup, ProSight 365 Total Backup (formerly Altaro 365 Backup), ProSight ECHO Backup using Barracuda dedicated storage, and ProSight MSP360 Hybrid Backup. Your Progent consultant can help you to identify which of these fully managed services are best suited for your network.
- ProSight Email Guard: Inbound and Outbound Spam Filtering and Data Leakage Protection
ProSight Email Guard is Progent's spam and virus filtering service that incorporates the technology of top data security companies to deliver web-based control and world-class security for your inbound and outbound email. The hybrid architecture of Progent's Email Guard combines a Cloud Protection Layer with a local gateway device to provide complete defense against spam, viruses, Denial of Service Attacks, Directory Harvest Attacks (DHAs), and other email-borne threats. The Cloud Protection Layer serves as a first line of defense and keeps most unwanted email from reaching your security perimeter. This reduces your vulnerability to external threats and saves system bandwidth and storage. Email Guard's on-premises security gateway device adds a deeper layer of inspection for inbound email. For outbound email, the onsite security gateway offers AV and anti-spam filtering, DLP, and email encryption. The onsite gateway can also help Microsoft Exchange Server to track and safeguard internal email traffic that stays inside your corporate firewall. For more details, visit Email Guard spam and content filtering.
- Outsourced/Co-managed Service Center: Help Desk Managed Services
Progent's Help Center services permit your IT team to offload Help Desk services to Progent or split responsibilities for support services seamlessly between your in-house network support group and Progent's extensive roster of IT support engineers and subject matter experts. Progent's Shared Help Desk Service offers a smooth extension of your in-house network support team. End user interaction with the Help Desk, delivery of support, problem escalation, trouble ticket generation and tracking, performance measurement, and maintenance of the service database are cohesive whether issues are resolved by your in-house IT support organization, by Progent's team, or a mix of the two. Learn more about Progent's outsourced/shared Call Desk services.
- Active Protection Against Ransomware: Machine Learning-based Ransomware Detection and Cleanup
Progent's Active Defense Against Ransomware is an endpoint protection (EPP) service that utilizes cutting edge behavior machine learning tools to guard endpoints as well as servers and VMs against modern malware assaults like ransomware and file-less exploits, which routinely evade traditional signature-matching anti-virus tools. Progent ASM services safeguard local and cloud resources and offers a unified platform to manage the complete threat lifecycle including protection, detection, mitigation, cleanup, and forensics. Top features include one-click rollback with Windows Volume Shadow Copy Service and automatic network-wide immunization against new attacks. Learn more about Progent's ransomware defense and recovery services.
- ProSight IT Asset Management: Network Documentation Management
Progent's ProSight IT Asset Management service is a cloud-based IT documentation management service that makes it easy to capture, update, find and protect data about your network infrastructure, processes, business apps, and services. You can instantly locate passwords or IP addresses and be alerted about upcoming expirations of SSLs ,domains or warranties. By updating and organizing your IT infrastructure documentation, you can eliminate as much as half of time wasted trying to find vital information about your network. ProSight IT Asset Management includes a common repository for holding and sharing all documents required for managing your network infrastructure such as recommended procedures and self-service instructions. ProSight IT Asset Management also offers a high level of automation for gathering and relating IT data. Whether you're making improvements, doing regular maintenance, or reacting to an emergency, ProSight IT Asset Management gets you the data you require the instant you need it. Find out more about ProSight IT Asset Management service.
- Progent's Patch Management: Software/Firmware Update Management Services
Progent's support services for software and firmware patch management offer businesses of all sizes a flexible and cost-effective solution for evaluating, testing, scheduling, implementing, and documenting software and firmware updates to your ever-evolving information network. In addition to maximizing the security and functionality of your IT network, Progent's patch management services allow your IT team to concentrate on line-of-business initiatives and tasks that derive maximum business value from your network. Learn more about Progent's patch management services.
- ProSight Virtual Hosting: Hosted VMs at Progent's World-class Data Center
With ProSight Virtual Hosting service, a small business can have its key servers and applications hosted in a protected fault tolerant data center on a fast virtual machine host set up and managed by Progent's network support professionals. With the ProSight Virtual Hosting service model, the customer retains ownership of the data, the operating system software, and the applications. Since the environment is virtualized, it can be moved easily to an alternate hosting solution without requiring a time-consuming and difficult configuration process. With ProSight Virtual Hosting, your business is not locked into a single hosting service. Learn more details about ProSight Virtual Hosting services.
- ProSight Active Security Monitoring: Endpoint Protection and Ransomware Defense
ProSight Active Security Monitoring is an endpoint protection service that incorporates SentinelOne's cutting edge behavior-based analysis tools to guard physical and virtual endpoint devices against modern malware assaults such as ransomware and file-less exploits, which routinely evade traditional signature-based anti-virus tools. ProSight ASM protects on-premises and cloud-based resources and offers a unified platform to automate the entire threat lifecycle including filtering, infiltration detection, containment, remediation, and forensics. Key features include single-click rollback using Windows Volume Shadow Copy Service and real-time network-wide immunization against newly discovered threats. Progent is a SentinelOne Partner, dealer, and integrator. Read more about Progent's ProSight Active Security Monitoring endpoint protection and ransomware recovery.
- ProSight Enhanced Security Protection (ESP): Physical and Virtual Endpoint Security and Exchange Email Filtering
ProSight Enhanced Security Protection services deliver ultra-affordable in-depth security for physical servers and virtual machines, workstations, mobile devices, and Exchange email. ProSight ESP uses contextual security and advanced machine learning for continuously monitoring and reacting to cyber assaults from all vectors. ProSight ESP provides two-way firewall protection, intrusion alarms, endpoint control, and web filtering via cutting-edge technologies packaged within one agent accessible from a unified control. Progent's security and virtualization experts can assist your business to design and implement a ProSight ESP environment that meets your company's specific needs and that allows you demonstrate compliance with government and industry data protection standards. Progent will assist you define and configure security policies that ProSight ESP will manage, and Progent will monitor your IT environment and respond to alerts that require immediate action. Progent can also help your company to set up and verify a backup and restore solution like ProSight Data Protection Services so you can get back in business rapidly from a destructive security attack such as ransomware. Learn more about Progent's ProSight Enhanced Security Protection (ESP) unified endpoint security and Microsoft Exchange email filtering.
Contact Progent for Cybersecurity Expertise
If you need expertise for MFA access security or any other facet of cybersecurity, call Progent at 800-993-9400 or visit Contact Progent.