Penetration testing (PEN testing) is a vital method for allowing organizations to determine how exposed their networks are to real world threats by showing how well corporate security processes, procedures and technologies hold up against announced or unannounced attacks by veteran security specialists using advanced hacking techniques. Progent can provide a one-time pentest or run scheduled or continual pentests delivered as a remotely managed service.
Progent's security experts can perform extensive in-depth penetration testing without the knowledge of internal IT staff. Such testing, known as stealth pentesting, uncovers whether existing security monitoring tools such as intrusion detection alerts and event log monitoring are correctly set up and actively monitored.
Penetration testing can encompass any or all of the following areas:
- Running a series of port scanning tools to identify open network access vectors and to characterize a customer's network environment and overall security level.
- Running a series of exploit identification tools that test all open access vectors against a large database of known vulnerabilities resulting from servers that are not up to date on security patches, out of date firmware/software, poorly configured servers and devices, and default or common installation passwords.
- Evaluation of wireless network security by attempting on-site access from publicly accessible locations including parking lots, hallways, bathrooms, and physically adjacent spaces or floors. Identification of security methods utilized by wireless infrastructure and running known exploit tools to gain access.
- Attempting to determine remote access capabilities of the network and perform exploit and brute force attack methods to gain access through remote access infrastructure.
- Performing remote office security evaluation and testing, and determine whether remote sites can be used as a vector into the corporate network through VPNs or other private network infrastructure.
- Performing brute force account and password attacks using a database of over 40 million possible passwords.
- For devices and servers that are successfully penetrated, Progent security experts will manually use assorted hacker techniques to extend such exploit vectors to gain an understanding of the full network environment and see how many internal systems can be accessed and compromised. This type of security testing can expose the full scope of the vulnerability of a network environment.
- Determining internal and external network addressing configuration through email beaconing techniques.
- Performing various Denial of Service (DoS) attacks, coordinated with internal senior management to determine whether it is possible to stop or reduce network throughput. Once proof of impact is reported, such testing can be immediately terminated to avoid impacting business productivity.
- Performing PBX remote access and voice mail security testing.
- Continuous autonomous PEN testing to map your internal/external attack surface and to identify ways that vulnerabilities, improper configurations, stolen credentials, missing patches, and unsound product defaults can be chained together by threat actors into the multi-vector attacks common to modern strains of ransomware. The NodeZero product from Horizon3.ai is an example of a next-generation penetration testing platform powered by AI technology that can be run continuously to assess, tune, repair, and confirm the security posture of networks of any size in order to provide a high level of protection against modern cyberthreats like ransomware.
Progent experts can use social engineering techniques and public information to attempt customized password penetration testing utilizing information such as employees' family member names, birthdates, home addresses, and phone numbers. Progent team members can often quickly uncover this information through Internet online search and public records. Progent can uncover employee names/email addresses through publicly accessible information on the Internet, from PBX voice mail directories, public records filings, marketing materials and press releases, web sites, and receptionist.
Progent will provide a complete report of methods used and vulnerabilities uncovered during stealth penetration testing, along with a detailed list of recommended remediation steps. Progent can then work with internal IT staff to perform an audit and evaluation of the actual security protection, configuration, tools, and processes and help your company develop a comprehensive security plan.
Expertise with Horizon3.ai's NodeZero Penetration Testing Products
NodeZero from Horizon3.ai is a leading-edge penetration test (pentest) product family that can deliver continuous, concurrent, automated testing of your internal and perimeter network to help you expose, rank, fix, and confirm cybersecurity weaknesses before threat actors can exploit them. Progent can assist you to deploy NodeZero to perform comprehensive pentests of your perimeter and your internal network so you can determine your current security profile. Progent's NodeZero experts can also assist you to harden your network security and can help you to plan and implement a unified cybersecurity strategy that simplifies management and delivers optimum cyber defense for on-prem, cloud-based, and perimeter IT assets. To find out more information about Progent's vulnerability analysis solutions based on on NodeZero's penetration test platform, visit Consulting Services for NodeZero's Penetration Test Products.
ProSight Fixed-price Managed Services for Information Assurance
Progent's low-cost ProSight suite of outsourced network management services is designed to provide small and mid-size organizations with enterprise-class support and state-of-the-art technology for all facets of information assurance and compliance. Managed services offered by Progent include:
- ProSight Active Security Monitoring (ASM): Next Generation Endpoint Protection and Ransomware Defense
ProSight Active Security Monitoring is an endpoint protection service that incorporates SentinelOne's cutting edge behavior-based machine learning tools to defend endpoints and servers and VMs against modern malware attacks like ransomware and email phishing, which routinely evade legacy signature-matching anti-virus tools. ProSight Active Security Monitoring protects on-premises and cloud resources and provides a single platform to manage the entire malware attack progression including filtering, detection, mitigation, remediation, and post-attack forensics. Key capabilities include one-click rollback using Windows Volume Shadow Copy Service and real-time system-wide immunization against new attacks. Progent is a SentinelOne Partner, dealer, and integrator. Read more about Progent's ProSight Active Security Monitoring next-generation endpoint protection and ransomware defense with SentinelOne technology.
- ProSight Enhanced Security Protection (ESP): Unified Endpoint Protection
ProSight Enhanced Security Protection (ESP) managed services deliver economical multi-layer protection for physical servers and VMs, desktops, mobile devices, and Exchange Server. ProSight ESP utilizes contextual security and advanced machine learning for round-the-clock monitoring and reacting to cyber threats from all vectors. ProSight ESP delivers two-way firewall protection, intrusion alerts, device control, and web filtering via cutting-edge tools incorporated within one agent managed from a single control. Progent's security and virtualization consultants can assist your business to plan and implement a ProSight ESP deployment that addresses your organization's unique requirements and that allows you demonstrate compliance with legal and industry data protection regulations. Progent will help you define and configure policies that ProSight ESP will enforce, and Progent will monitor your IT environment and react to alarms that call for urgent action. Progent's consultants can also assist your company to install and test a backup and disaster recovery solution such as ProSight Data Protection Services so you can recover rapidly from a destructive security attack like ransomware. Learn more about Progent's ProSight Enhanced Security Protection unified physical and virtual endpoint security and Exchange filtering.
- ProSight Data Protection Services: Managed Cloud Backup
Progent has worked with advanced backup/restore product companies to create ProSight Data Protection Services (DPS), a family of offerings that provide backup-as-a-service. All ProSight DPS services automate and monitor your backup operations and allow non-disruptive backup and fast recovery of important files, applications, system images, plus virtual machines. ProSight DPS lets you avoid data loss resulting from equipment failures, natural calamities, fire, cyber attacks like ransomware, human error, ill-intentioned employees, or software bugs. Managed services in the ProSight Data Protection family include ProSight DPS Altaro VM Backup, ProSight 365 Total Backup (formerly Altaro Office 365 Backup), ProSight ECHO Backup based on Barracuda dedicated hardware, and ProSight DPS MSP360 Hybrid Backup. Your Progent expert can assist you to identify which of these managed backup services are most appropriate for your network.
- ProSight Email Guard: Spam Filtering, Data Leakage Protection and Content Filtering
ProSight Email Guard is Progent's email security solution that uses the technology of leading data security vendors to deliver web-based control and comprehensive security for your email traffic. The hybrid architecture of Email Guard managed service integrates cloud-based filtering with an on-premises security gateway appliance to offer complete defense against spam, viruses, Denial of Service (DoS) Attacks, Directory Harvest Attacks (DHAs), and other email-borne malware. Email Guard's Cloud Protection Layer acts as a preliminary barricade and keeps most unwanted email from making it to your security perimeter. This decreases your exposure to inbound threats and conserves network bandwidth and storage. Email Guard's on-premises gateway device adds a deeper level of inspection for incoming email. For outgoing email, the onsite gateway provides anti-virus and anti-spam protection, DLP, and email encryption. The onsite gateway can also assist Exchange Server to monitor and safeguard internal email traffic that originates and ends within your corporate firewall. Learn more about Progent's ProSight Email Guard spam filtering, virus blocking, email content filtering and data loss prevention.
- ProSight WAN Watch: Network Infrastructure Remote Monitoring and Management
ProSight WAN Watch is an infrastructure monitoring and management service that makes it easy and affordable for small and mid-sized organizations to map, monitor, optimize and debug their connectivity appliances like routers, firewalls, and access points as well as servers, client computers and other devices. Incorporating state-of-the-art Remote Monitoring and Management (RMM) technology, WAN Watch ensures that network diagrams are always updated, captures and displays the configuration information of virtually all devices on your network, monitors performance, and generates alerts when issues are detected. By automating complex network management processes, ProSight WAN Watch can cut hours off common chores such as network mapping, expanding your network, locating appliances that require critical software patches, or isolating performance bottlenecks. Find out more details about ProSight WAN Watch network infrastructure management services.
- ProSight LAN Watch: Server and Desktop Monitoring and Management
ProSight LAN Watch is Progent's server and desktop remote monitoring service that incorporates advanced remote monitoring and management techniques to help keep your IT system operating at peak levels by tracking the health of vital assets that drive your information system. When ProSight LAN Watch detects a problem, an alert is transmitted automatically to your specified IT staff and your assigned Progent consultant so any potential issues can be resolved before they have a chance to impact your network Find out more about ProSight LAN Watch server and desktop remote monitoring services.
- ProSight Virtual Hosting: Hosted Virtual Machines at Progent's World-class Data Center
With Progent's ProSight Virtual Hosting service, a small or mid-size organization can have its critical servers and apps hosted in a protected fault tolerant data center on a fast virtual host set up and maintained by Progent's network support professionals. With the ProSight Virtual Hosting model, the customer owns the data, the OS software, and the applications. Because the system is virtualized, it can be ported immediately to an alternate hardware solution without requiring a time-consuming and technically risky configuration process. With ProSight Virtual Hosting, your business is not locked into one hosting service. Learn more details about ProSight Virtual Hosting services.
- ProSight IT Asset Management: Network Documentation Management
Progent's ProSight IT Asset Management service is a cloud-based IT documentation management service that allows you to capture, maintain, retrieve and protect data about your network infrastructure, procedures, applications, and services. You can quickly locate passwords or serial numbers and be alerted automatically about impending expirations of SSLs ,domains or warranties. By updating and managing your IT infrastructure documentation, you can eliminate as much as half of time spent trying to find vital information about your IT network. ProSight IT Asset Management includes a centralized location for storing and sharing all documents required for managing your network infrastructure such as standard operating procedures (SOPs) and How-To's. ProSight IT Asset Management also offers a high level of automation for gathering and associating IT information. Whether you're making improvements, performing maintenance, or responding to an emergency, ProSight IT Asset Management delivers the data you require the instant you need it. Learn more details about ProSight IT Asset Management service.
- Patch Management: Software/Firmware Update Management Services
Progent's support services for patch management provide businesses of all sizes a flexible and affordable solution for evaluating, testing, scheduling, applying, and tracking updates to your ever-evolving information network. Besides optimizing the protection and functionality of your computer environment, Progent's patch management services permit your IT team to focus on more strategic projects and activities that deliver maximum business value from your network. Find out more about Progent's software/firmware update management services.
- ProSight Duo Two-Factor Authentication: Access Security, Endpoint Policy Enforcement, and Secure Single Sign-on (SSO)
Progent's Duo authentication services utilize Cisco's Duo cloud technology to protect against compromised passwords through the use of two-factor authentication (2FA). Duo supports one-tap identity verification on Apple iOS, Android, and other out-of-band devices. Using 2FA, whenever you log into a protected online account and enter your password you are requested to verify who you are on a device that only you have and that is accessed using a different ("out-of-band") network channel. A wide range of devices can be used for this second form of authentication including a smartphone or watch, a hardware token, a landline phone, etc. You may designate several validation devices. To learn more about ProSight Duo two-factor identity authentication services, see Duo MFA two-factor authentication services.
ProSight Network Audits
Progent's ProSight Network Audits offer a fast and affordable way for small and mid-size businesses to obtain an objective evaluation of the health of their information system. Powered by a selection of the leading remote monitoring and management (RMM) tools available, and overseen by Progent's world-class team of IT professionals, ProSight Network Audits show you how well the configuration of your essential infrastructure assets adhere to industry leading practices. The Basic and Advanced versions of ProSight Network Audit services are available at a low, one-time cost and deliver immediate ROI like a more manageable Active Directory (AD) system. Both also come with one year of state-of-the-art remote network monitoring and management (RMM). Advantages can include simpler network management, improved compliance with information security standards, higher utilization of IT resources, quicker troubleshooting, more reliable backup and restore, and higher availability. Read more about ProSight Network Audits IT infrastructure review.
Progent's ProSight Ransomware Preparedness Report
Progent's ProSight Ransomware Preparedness Report service is a low-cost service built around a brief interview with a Progent information assurance consultant. The interview is designed to assess your organization's ability to block or recover quickly after an assault by a ransomware strain such as Ryuk, WannaCry, MongoLock, or Hermes. Progent will consult with you personally to collect information concerning your current security profile and backup platform, and Progent will then produce a custom Basic Security and Best Practices Report document describing how you can follow industry best practices to create an efficient security and backup environment that aligns with your company's requirements. For details, refer to The ProSight Ransomware Preparedness Report.
Contact Progent for Penetration Testing Consulting
To learn more about Progent's network security consulting, telephone Progent at 800-993-9400 or visit Contact Progent.
Ransomware 24x7 Hot Line: Call 800-462-8800
Progent's Ransomware 24x7 Hot Line is intended to help organizations to carry out the time-critical first phase in responding to a ransomware assault by containing the malware. Progent's online ransomware expert can assist businesses to identify and isolate infected servers and endpoints and guard clean assets from being compromised. If your network has been penetrated by any version of ransomware, don't panic. Get immediate help by calling Progent's Ransomware Hot Line at 800-462-8800. For more information, visit Progent's Ransomware 24x7 Hot Line.