Stealth penetration testing (PEN testing) is a crucial method for enabling companies to find out how exposed their IT systems are to real world attacks by displaying how well their corporate security processes hold up against intentional but unannounced attacks by seasoned security experts using the latest hacking techniques. Progent offers one-time PEN testing or continual PEN testing delivered as a managed service.
Progent's cyber security consultants can safely provide in-depth penetration testing without alerting a client's IT staff. Stealth penetration testing uncovers whether existing security monitoring tools and procedures such as intrusion alarms and event log monitoring are correctly set up and regularly monitored.
Stealth PEN testing can include any of these areas:
- Run a series of port scanning utilities to spot open network access vectors and to identify and profile a client's network infrastructure and overall security posture.
- Deploy a series of exploit recognition tools that test all open connection vectors against a large database of known vulnerabilities caused by servers that are not up to date on patches, outdated firmware/software, misconfigured servers and infrastructure devices, and default or common installation passwords.
- Evaluate WiFi network security by trying to gain local access from publicly available places such as parking areas, stairways, restrooms, and physically attached floors. Understanding of security techniques utilized by WiFi networks and running known exploit tools to get access to the network.
- Attempt to understand remote access features of the network and use exploit and brute force attack methods to get access via remote access infrastructure.
- Perform remote office security evaluation and testing, and determine whether remote sites can be used as a vector into the corporate network through VPNs or other private network infrastructure.
- Execute brute force account and password attacks based on a database of more than 40 million common passwords.
- For resources penetrated, Progent cybersecurity experts will manually deploy assorted hacker tricks to extend such exploit vectors to gain a picture of the full network environment and see how many internal systems can be penetrated and exploited. This type of security testing can reveal the real scope of the exposure of a network environment.
- Understand internal and external network addressing set up through email beaconing methods.
- Launch various Denial of Service attacks, coordinated with top network management to determinewhether it is possible to stop or obstruct network operation. After proof of impact is recognized, such testing can be immediately stopped to avoid seriously impacting operations.
- Perform PBX phone system remote access and voice mail security testing.
- Provide ongoing automatic PEN testing to define your internal/external attack surface and to identify ways that exploitable vulnerabilities, unsafe configurations, stolen credentials, missing patches, and dangerous IT product defaults can be chained together by threat actors into the multi-vector attacks typical of the latest strains of ransomware.
Progent experts can use social engineering methods and public data to attempt customized password penetration testing based on information such as the names of an employee's family members, date of birth, home address, and phone number. Progent experts can commonly uncover this data through Internet online search and readily available public records. Progent can uncover employee names/email addresses via publicly available data on the Internet, from PBX voice mail directories, public filings, marketing materials and press releases, web sites, and receptionists.
Progent will provide a full report of methods utilized and vulnerabilities uncovered during stealth PEN testing, along with a detailed list of recommended remediation steps. Progent can then work with internal IT staff to carry out an audit and evaluation of your actual security defense, set up, tools, and processes and help your business to design and deploy a solid cyber security plan.
ProSight Flat-rate Managed Services for Information Assurance
Progent's affordable ProSight series of outsourced network management services is intended to provide small and mid-size organizations with enterprise-class support and state-of-the-art technology for all facets of information assurance and compliance. Managed services available from Progent include:
- ProSight Active Security Monitoring: Next Generation Endpoint Protection and Ransomware Recovery
ProSight Active Security Monitoring (ASM) is an endpoint protection (EPP) solution that utilizes SentinelOne's next generation behavior analysis technology to defend endpoints as well as servers and VMs against new malware attacks like ransomware and email phishing, which routinely escape traditional signature-based anti-virus tools. ProSight Active Security Monitoring safeguards local and cloud resources and offers a unified platform to automate the entire threat progression including blocking, infiltration detection, mitigation, remediation, and forensics. Key capabilities include single-click rollback with Windows Volume Shadow Copy Service (VSS) and real-time system-wide immunization against newly discovered attacks. Progent is a SentinelOne Partner, reseller, and integrator. Learn more about Progent's ProSight Active Security Monitoring next-generation endpoint protection and ransomware defense with SentinelOne technology.
- ProSight Enhanced Security Protection (ESP): Unified Physical and Virtual Endpoint Protection
ProSight Enhanced Security Protection managed services deliver economical multi-layer security for physical and virtual servers, desktops, smartphones, and Exchange Server. ProSight ESP uses adaptive security and advanced heuristics for round-the-clock monitoring and reacting to security threats from all attack vectors. ProSight ESP offers two-way firewall protection, penetration alarms, endpoint management, and web filtering through cutting-edge tools incorporated within a single agent accessible from a unified control. Progent's security and virtualization consultants can assist your business to design and implement a ProSight ESP deployment that addresses your organization's unique needs and that allows you prove compliance with government and industry data security standards. Progent will assist you specify and configure security policies that ProSight ESP will manage, and Progent will monitor your IT environment and react to alarms that require immediate attention. Progent can also assist you to install and verify a backup and restore system like ProSight Data Protection Services so you can get back in business rapidly from a destructive cyber attack like ransomware. Learn more about Progent's ProSight Enhanced Security Protection unified endpoint security and Microsoft Exchange email filtering.
- ProSight Data Protection Services: Managed Cloud Backup and Recovery
Progent has worked with advanced backup/restore product companies to produce ProSight Data Protection Services, a selection of offerings that provide backup-as-a-service. All ProSight DPS products manage and monitor your data backup operations and enable transparent backup and rapid restoration of vital files, applications, images, and virtual machines. ProSight DPS helps your business recover from data loss resulting from hardware breakdown, natural disasters, fire, cyber attacks such as ransomware, user error, ill-intentioned employees, or application glitches. Managed services in the ProSight Data Protection portfolio include ProSight DPS Altaro VM Backup, ProSight 365 Total Backup (formerly Altaro Office 365 Backup), ProSight ECHO Backup based on Barracuda purpose-built storage, and ProSight DPS MSP360 Cloud and On-prem Backup. Your Progent service representative can assist you to identify which of these managed services are best suited for your IT environment.
- ProSight Email Guard: Spam Filtering, Data Leakage Protection and Content Filtering
ProSight Email Guard is Progent's email filtering and encryption solution that incorporates the technology of top data security companies to provide web-based management and world-class protection for your email traffic. The hybrid structure of Email Guard managed service combines cloud-based filtering with a local security gateway appliance to provide advanced protection against spam, viruses, Dos Attacks, DHAs, and other email-based malware. Email Guard's Cloud Protection Layer acts as a preliminary barricade and blocks the vast majority of unwanted email from reaching your security perimeter. This decreases your exposure to external threats and saves network bandwidth and storage. Email Guard's on-premises security gateway device provides a deeper layer of inspection for inbound email. For outbound email, the onsite security gateway offers AV and anti-spam protection, protection against data leaks, and encryption. The onsite security gateway can also assist Exchange Server to monitor and protect internal email traffic that stays within your corporate firewall. Find out more about Progent's ProSight Email Guard spam filtering, virus blocking, email content filtering and data loss prevention.
- ProSight WAN Watch: Network Infrastructure Remote Monitoring and Management
ProSight WAN Watch is an infrastructure monitoring and management service that makes it simple and inexpensive for small and mid-sized businesses to map out, track, reconfigure and debug their networking appliances such as switches, firewalls, and wireless controllers plus servers, endpoints and other devices. Using cutting-edge Remote Monitoring and Management technology, WAN Watch makes sure that network diagrams are kept current, captures and manages the configuration of virtually all devices on your network, monitors performance, and generates notices when issues are detected. By automating time-consuming network management processes, WAN Watch can cut hours off common chores like making network diagrams, expanding your network, finding devices that need important software patches, or identifying the cause of performance issues. Learn more about ProSight WAN Watch infrastructure monitoring and management services.
- ProSight LAN Watch: Server and Desktop Remote Monitoring and Management
ProSight LAN Watch is Progent's server and desktop monitoring service that incorporates state-of-the-art remote monitoring and management (RMM) technology to keep your network running at peak levels by tracking the state of critical computers that power your business network. When ProSight LAN Watch detects a problem, an alarm is sent immediately to your specified IT personnel and your assigned Progent engineering consultant so all potential problems can be addressed before they can impact productivity Learn more details about ProSight LAN Watch server and desktop remote monitoring services.
- ProSight Virtual Hosting: Hosted VMs at Progent's Tier III Data Center
With ProSight Virtual Hosting service, a small organization can have its critical servers and applications hosted in a protected Tier III data center on a fast virtual machine host set up and managed by Progent's network support professionals. Under the ProSight Virtual Hosting service model, the customer retains ownership of the data, the OS platforms, and the apps. Since the environment is virtualized, it can be ported easily to an alternate hosting solution without requiring a time-consuming and technically risky reinstallation procedure. With ProSight Virtual Hosting, your business is not locked into a single hosting service. Learn more details about ProSight Virtual Hosting services.
- ProSight IT Asset Management: Network Documentation Management
Progent's ProSight IT Asset Management service is a cloud-based IT documentation management service that allows you to capture, update, find and safeguard data related to your network infrastructure, processes, applications, and services. You can quickly find passwords or serial numbers and be warned about impending expirations of SSLs or warranties. By updating and managing your IT infrastructure documentation, you can save as much as 50% of time wasted looking for vital information about your IT network. ProSight IT Asset Management features a common repository for storing and collaborating on all documents related to managing your network infrastructure such as standard operating procedures and How-To's. ProSight IT Asset Management also supports a high level of automation for gathering and relating IT information. Whether you're planning improvements, doing maintenance, or reacting to an emergency, ProSight IT Asset Management delivers the data you need when you need it. Find out more about Progent's ProSight IT Asset Management service.
- Progent's Patch Management: Software/Firmware Update Management Services
Progent's support services for software and firmware patch management offer businesses of all sizes a flexible and cost-effective solution for evaluating, validating, scheduling, implementing, and tracking software and firmware updates to your ever-evolving IT system. In addition to optimizing the protection and functionality of your IT environment, Progent's software/firmware update management services permit your IT staff to focus on line-of-business projects and activities that deliver the highest business value from your information network. Learn more about Progent's software/firmware update management services.
- ProSight Duo Multi-Factor Authentication: ID Confirmation, Endpoint Remediation, and Protected Single Sign-on
Progent's Duo MFA services utilize Cisco's Duo technology to protect against stolen passwords through the use of two-factor authentication. Duo supports one-tap identity verification on Apple iOS, Android, and other personal devices. With Duo 2FA, when you log into a secured online account and give your password you are asked to confirm who you are via a device that only you have and that uses a different network channel. A broad range of devices can be used as this added means of ID validation such as a smartphone or wearable, a hardware/software token, a landline telephone, etc. You can register several validation devices. To find out more about ProSight Duo two-factor identity authentication services, see Cisco Duo MFA two-factor authentication (2FA) services for access security.
ProSight Network Audits
Progent's ProSight Network Audits are a quick and affordable way for small and medium-size organizations to get an objective evaluation of the health of their network. Powered by some of the leading remote monitoring and management tools available, and supervised by Progent's certified group of IT professionals, ProSight Network Audits show you how closely the configuration of your essential infrastructure assets conform to leading practices. Both the Basic and Advanced options for ProSight Network Audit services are offered at a budget-friendly, one-time cost and provide instant benefits such as a cleaner Active Directory system. Both versions also come with one year of state-of-the-art remote network monitoring and management. Advantages can include simpler management, better compliance with data security regulations, more efficient utilization of IT resources, faster troubleshooting, more dependable backup and restore, and increased uptime. Learn more about Progent's ProSight Network Audits IT infrastructure assessment.
Progent's ProSight Ransomware Preparedness Report
The ProSight Ransomware Preparedness Report service is an affordable service based on a phone discussion with a Progent information assurance expert. The fact-finding interview is intended to help assess your company's preparedness either to block or recover rapidly after an assault by a ransomware strain such as Ryuk, WannaCry, MongoLock, or Hermes. Progent will work with you personally to collect information concerning your existing security profile and backup system, and Progent will then produce a written Basic Security and Best Practices Report document describing how you can follow best practices to deploy a cost-effective security and backup/recovery environment that meets your company's requirements. For more information, visit The ProSight Ransomware Preparedness Report Service.
Contact Progent for Penetration Testing Consulting
To learn more about Progent's computer security engineering help, phone Progent at 800-993-9400 or go to Contact Progent.
Ransomware 24x7 Hot Line: Call 800-462-8800
Progent's Ransomware 24x7 Hot Line is designed to assist you to take the urgent first phase in mitigating a ransomware attack by containing the malware. Progent's online ransomware expert can assist you to locate and quarantine infected devices and protect clean assets from being penetrated. If your system has been breached by any version of ransomware, don't panic. Get immediate help by calling Progent's Ransomware Hot Line at 800-462-8800. For details, visit Progent's Ransomware 24x7 Hot Line.