Penetration testing (PEN testing) is a vital method for allowing organizations to determine how exposed their networks are to real world threats by showing how well corporate security processes, procedures and technologies hold up against announced or unannounced attacks by veteran security specialists using advanced hacking techniques. Progent can provide a one-time pentest or run scheduled or continual pentests delivered as a remotely managed service.
Progent's security experts can perform extensive in-depth penetration testing without the knowledge of internal IT staff. Such testing, known as stealth pentesting, uncovers whether existing security monitoring tools such as intrusion detection alerts and event log monitoring are correctly set up and actively monitored.
Penetration testing can encompass any or all of the following areas:
- Running a series of port scanning tools to identify open network access vectors and to characterize a customer's network environment and overall security level.
- Running a series of exploit identification tools that test all open access vectors against a large database of known vulnerabilities resulting from servers that are not up to date on security patches, out of date firmware/software, poorly configured servers and devices, and default or common installation passwords.
- Evaluation of wireless network security by attempting on-site access from publicly accessible locations including parking lots, hallways, bathrooms, and physically adjacent spaces or floors. Identification of security methods utilized by wireless infrastructure and running known exploit tools to gain access.
- Attempting to determine remote access capabilities of the network and perform exploit and brute force attack methods to gain access through remote access infrastructure.
- Performing remote office security evaluation and testing, and determine whether remote sites can be used as a vector into the corporate network through VPNs or other private network infrastructure.
- Performing brute force account and password attacks using a database of over 40 million possible passwords.
- For devices and servers that are successfully penetrated, Progent security experts will manually use assorted hacker techniques to extend such exploit vectors to gain an understanding of the full network environment and see how many internal systems can be accessed and compromised. This type of security testing can expose the full scope of the vulnerability of a network environment.
- Determining internal and external network addressing configuration through email beaconing techniques.
- Performing various Denial of Service (DoS) attacks, coordinated with internal senior management to determine whether it is possible to stop or reduce network throughput. Once proof of impact is reported, such testing can be immediately terminated to avoid impacting business productivity.
- Performing PBX remote access and voice mail security testing.
- Continuous autonomous PEN testing to map your internal/external attack surface and to identify ways that vulnerabilities, improper configurations, stolen credentials, missing patches, and unsound product defaults can be chained together by threat actors into the multi-vector attacks common to modern strains of ransomware. The NodeZero product from Horizon3.ai is an example of a next-generation penetration testing platform powered by AI technology that can be run continuously to assess, tune, repair, and confirm the security posture of networks of any size in order to provide a high level of protection against modern cyberthreats like ransomware.
Progent experts can use social engineering techniques and public information to attempt customized password penetration testing utilizing information such as employees' family member names, birthdates, home addresses, and phone numbers. Progent team members can often quickly uncover this information through Internet online search and public records. Progent can uncover employee names/email addresses through publicly accessible information on the Internet, from PBX voice mail directories, public records filings, marketing materials and press releases, web sites, and receptionist.
Progent will provide a complete report of methods used and vulnerabilities uncovered during stealth penetration testing, along with a detailed list of recommended remediation steps. Progent can then work with internal IT staff to perform an audit and evaluation of the actual security protection, configuration, tools, and processes and help your company develop a comprehensive security plan.
Consulting Services for Horizon3.ai's NodeZero Pentest Solutions
NodeZero from Horizon3.ai is a cutting-edge penetration test (pentest) platform that can deliver continuous, simultaneous, programmable assessment of your internal and perimeter network so you can find, prioritize, fix, and verify cybersecurity weaknesses before malicious hackers can exploit them. Progent can help you to use NodeZero to perform comprehensive penetration tests of your network perimeter and your internal IT infrastructure so you can evaluate your present security posture. Progent's NodeZero experts can also help you to strengthen your network security and can assist you to plan and implement a cohesive cybersecurity strategy that streamlines management and delivers optimum protection for on-prem, cloud-based, and perimeter IT resources. To find out additional information about Progent's threat analysis solutions based on on NodeZero's pentest products, refer to Consulting Services for NodeZero's Pentest Products.
ProSight Low-Cost Managed Services for Information Assurance
Progent's affordable ProSight portfolio of outsourced network management services is designed to provide small and mid-size organizations with enterprise-class support and state-of-the-art technology for all facets of information assurance. ProSight managed services offered by Progent include:
- ProSight Active Security Monitoring: Next Generation Endpoint Protection and Ransomware Defense
Progent's ProSight Active Security Monitoring is an endpoint protection solution that utilizes SentinelOne's next generation behavior-based analysis tools to guard endpoints and servers and VMs against new malware attacks such as ransomware and email phishing, which routinely get by traditional signature-matching AV products. ProSight Active Security Monitoring safeguards local and cloud resources and provides a unified platform to address the entire malware attack lifecycle including protection, infiltration detection, mitigation, remediation, and forensics. Key features include one-click rollback using Windows VSS and real-time network-wide immunization against newly discovered threats. Progent is a SentinelOne Partner, reseller, and integrator. Learn more about Progent's ProSight Active Security Monitoring next-generation endpoint protection and ransomware defense with SentinelOne technology.
- ProSight Enhanced Security Protection (ESP): Unified Physical and Virtual Endpoint Security
Progent's ProSight Enhanced Security Protection managed services offer economical multi-layer security for physical and virtual servers, desktops, smartphones, and Exchange Server. ProSight ESP utilizes contextual security and modern behavior analysis for continuously monitoring and reacting to security threats from all attack vectors. ProSight ESP delivers two-way firewall protection, penetration alerts, endpoint management, and web filtering via leading-edge tools incorporated within a single agent managed from a unified console. Progent's security and virtualization consultants can assist your business to design and implement a ProSight ESP environment that meets your company's specific requirements and that allows you demonstrate compliance with legal and industry data protection standards. Progent will assist you define and configure policies that ProSight ESP will manage, and Progent will monitor your IT environment and respond to alarms that require urgent attention. Progent's consultants can also assist you to install and verify a backup and disaster recovery system such as ProSight Data Protection Services (DPS) so you can get back in business quickly from a destructive security attack like ransomware. Find out more about Progent's ProSight Enhanced Security Protection unified physical and virtual endpoint security and Exchange email filtering.
- ProSight Data Protection Services: Managed Backup
Progent has worked with advanced backup product companies to produce ProSight Data Protection Services, a selection of management offerings that provide backup-as-a-service (BaaS). All ProSight DPS services automate and monitor your data backup operations and enable non-disruptive backup and rapid recovery of critical files/folders, apps, images, plus Hyper-V and VMware virtual machines. ProSight DPS helps your business protect against data loss caused by equipment breakdown, natural calamities, fire, cyber attacks like ransomware, human mistakes, malicious insiders, or application bugs. Managed services available in the ProSight DPS product line include ProSight Altaro VM Backup, ProSight 365 Total Backup (formerly Altaro Office 365 Backup), ProSight DPS ECHO Backup based on Barracuda purpose-built hardware, and ProSight DPS MSP360 Cloud and On-prem Backup. Your Progent service representative can assist you to determine which of these fully managed backup services are best suited for your IT environment.
- ProSight Email Guard: Spam Filtering, Data Leakage Protection and Content Filtering
ProSight Email Guard is Progent's email security solution that uses the technology of leading information security companies to provide web-based management and world-class security for your email traffic. The hybrid architecture of Progent's Email Guard managed service combines a Cloud Protection Layer with a local security gateway device to offer advanced defense against spam, viruses, Denial of Service (DoS) Attacks, Directory Harvest Attacks, and other email-borne threats. The Cloud Protection Layer serves as a first line of defense and keeps most threats from reaching your network firewall. This decreases your exposure to external attacks and conserves system bandwidth and storage space. Email Guard's onsite gateway device provides a further layer of inspection for inbound email. For outbound email, the onsite gateway offers anti-virus and anti-spam filtering, policy-based Data Loss Prevention, and encryption. The on-premises gateway can also help Microsoft Exchange Server to monitor and protect internal email traffic that originates and ends within your corporate firewall. Find out more about Progent's ProSight Email Guard spam filtering, virus blocking, email content filtering and data leakage protection.
- ProSight WAN Watch: Infrastructure Management
ProSight WAN Watch is a network infrastructure management service that makes it simple and inexpensive for smaller organizations to map out, track, optimize and troubleshoot their networking appliances like routers, firewalls, and load balancers plus servers, client computers and other networked devices. Incorporating cutting-edge RMM technology, ProSight WAN Watch ensures that infrastructure topology diagrams are always updated, copies and displays the configuration information of virtually all devices on your network, monitors performance, and sends notices when potential issues are discovered. By automating time-consuming management processes, ProSight WAN Watch can cut hours off ordinary tasks such as network mapping, expanding your network, finding devices that require critical updates, or resolving performance bottlenecks. Learn more about ProSight WAN Watch infrastructure management services.
- ProSight LAN Watch: Server and Desktop Monitoring and Management
ProSight LAN Watch is Progent's server and desktop remote monitoring service that incorporates state-of-the-art remote monitoring and management (RMM) technology to help keep your network running at peak levels by checking the state of critical computers that power your information system. When ProSight LAN Watch uncovers an issue, an alarm is transmitted automatically to your specified IT management staff and your Progent engineering consultant so any looming problems can be addressed before they can disrupt productivity Find out more about ProSight LAN Watch server and desktop remote monitoring consulting.
- ProSight Virtual Hosting: Hosted VMs at Progent's World-class Data Center
With ProSight Virtual Hosting service, a small or mid-size business can have its critical servers and applications hosted in a secure fault tolerant data center on a fast virtual machine host set up and managed by Progent's IT support experts. Under Progent's ProSight Virtual Hosting service model, the customer owns the data, the OS platforms, and the apps. Since the system is virtualized, it can be ported immediately to a different hosting solution without a lengthy and difficult configuration procedure. With ProSight Virtual Hosting, your business is not tied a single hosting provider. Find out more details about ProSight Virtual Hosting services.
- ProSight IT Asset Management: Network Documentation Management
ProSight IT Asset Management service is an IT infrastructure documentation management service that allows you to create, update, retrieve and safeguard data related to your network infrastructure, procedures, applications, and services. You can quickly find passwords or IP addresses and be alerted about upcoming expirations of SSLs or domains. By updating and managing your IT infrastructure documentation, you can eliminate as much as half of time thrown away trying to find critical information about your IT network. ProSight IT Asset Management features a common location for holding and collaborating on all documents required for managing your network infrastructure like standard operating procedures (SOPs) and How-To's. ProSight IT Asset Management also offers a high level of automation for collecting and relating IT information. Whether you're planning enhancements, doing maintenance, or responding to an emergency, ProSight IT Asset Management delivers the information you need the instant you need it. Learn more details about Progent's ProSight IT Asset Management service.
- Progent's Patch Management: Software/Firmware Update Management Services
Progent's managed services for patch management offer organizations of any size a flexible and cost-effective solution for evaluating, testing, scheduling, implementing, and tracking software and firmware updates to your dynamic information system. In addition to optimizing the protection and reliability of your IT environment, Progent's software/firmware update management services free up time for your in-house IT team to concentrate on more strategic initiatives and tasks that derive maximum business value from your network. Learn more about Progent's software/firmware update management services.
- ProSight Duo Multi-Factor Authentication: ID Confirmation, Endpoint Remediation, and Protected Single Sign-on
Progent's Duo authentication service plans incorporate Cisco's Duo technology to protect against stolen passwords by using two-factor authentication. Duo supports single-tap identity verification on iOS, Google Android, and other out-of-band devices. With Duo 2FA, when you log into a protected online account and give your password you are requested to confirm who you are via a unit that only you have and that uses a different network channel. A wide selection of devices can be utilized as this second means of authentication such as an iPhone or Android or watch, a hardware/software token, a landline phone, etc. You may register several validation devices. For details about Duo two-factor identity validation services, see Duo MFA two-factor authentication (2FA) services.
ProSight Network Audits
Progent's ProSight Network Audits offer a quick and affordable way for small and medium-size businesses to get an objective assessment of the health of their information system. Based on some of the leading remote monitoring and management (RMM) platforms in the industry, and overseen by Progent's world-class team of information technology experts, ProSight Network Audits show you how closely the deployment of your core network devices conform to leading practices. Both the Basic and Advanced options for ProSight Network Audit services are available at a low, one-time cost and deliver immediate ROI such as a more manageable Active Directory (AD) environment. Both also include a year of cutting-edge remote network monitoring and management (RMM). Benefits can include lower-cost network management, improved compliance with information security requirements, higher utilization of IT resources, faster problem resolution, more reliable backup and recovery, and higher availability. Read more information about Progent's ProSight Network Audits IT infrastructure assessment.
The ProSight Ransomware Preparedness Report
Progent's ProSight Ransomware Preparedness Report is an affordable service based on a brief phone discussion with a Progent information assurance expert. The interview is intended to assess your company's preparedness to stop or recover rapidly following an attack by a ransomware variant like Ryuk, WannaCry, MongoLock, or Hermes. Progent will work with you directly to gather information about your current AV defense and backup platform, and Progent will then produce a written Basic Security and Best Practices Report document describing how you can follow industry best practices to build a cost-effective AV and backup environment that meets your business requirements. For details, visit Progent's ProSight Ransomware Preparedness Report.
Contact Progent for Penetration Testing Consulting
For computer security support services, telephone Progent at 800-993-9400 or visit Contact Progent.
Ransomware 24x7 Hot Line: Call 800-462-8800
Progent's Ransomware 24x7 Hot Line is intended to help you to complete the urgent first step in responding to a ransomware assault by putting out the fire. Progent's remote ransomware engineer can assist businesses to identify and quarantine breached devices and protect clean assets from being compromised. If your system has been breached by any strain of ransomware, act fast. Get help quickly by calling Progent's Ransomware Hot Line at 800-462-8800. For details, visit Progent's Ransomware 24x7 Hot Line.