ProSight Duo Identity Verification
Progent's ProSight Duo family of services integrates advanced access security technology from Duo, a Cisco subsidiary, to deliver multi-factor ID validation solutions. Two-factor authentication is one of the pillars of zero-trust network security strategy. 2FA uses out-of-band identity verification to build a second layer of security on top of just passwords. This blocks the most frequent causes of cybersecurity break-ins including phishing, brute-force password attacks, and credential theft.
Duo's single-touch Mobile Push app streamlines authentication
Duo's push technology saves time and distraction by allowing users to verify their identity just by tapping "Approve" on the authentication box on their own iOS or Android smartphone or watch. This single-touch process eliminates the necessity to open an email or text message and copy a security code by hand.
Progent's ProSight Duo family includes three subscription-based services that build on one another. ProSight Duo MFA permits you to deploy Duo's two-factor authentication platform to guard all applications while offering basic access controls, centralized management, and fast provisioning. ProSight Duo Access includes all the capabilities of ProSight Duo MFA and adds adaptive authentication policies and extensive endpoint health checking. ProSight Duo Beyond brings the ability to identify corporate as opposed to personal endpoints, deny access to suspect endpoints, and allow users secure and seamless access to inside applications. Progent is a Duo Managed Service Provider and can assist your business to plan, deploy and manage a modern identity validation system that delivers top-level access security without disrupting your users.
Two-factor Authentication
80% of cybersecurity breaches exploit compromised passwords. Every managed service plan in Progent's ProSight Duo catalog of access security products can reduce your dangerous reliance on password protection by supporting two-factor authentication. With 2FA implemented, when you sign into a protected online account and enter your correct password you are asked to confirm who you are by means of a device that you have sole possession of and that runs on a separate ("out-of-band") channel. A broad selection of devices can be utilized as your additional means of ID validation including a smartphone or watch, a token, a landline telephone, etc. You can register multiple validation devices.
ProSight Duo two-factor authentication adds an extra level of security
After you verify who you are using your validation device, you are allowed to use your application or utilize your VPN or remote desktop connection. With the Duo Mobile app's push notification feature activated, you can simply touch "Approve" on your iOS or Android smartphone or smart watch. This streamlines the login experience by making the authentication procedure nearly immediate. For other secondary devices, such as a token, you can transcribe a temporary password.
Products Available with ProSight Duo Managed Services
Progent's ProSight Duo line of subscription-based managed service plans include ProSight Duo MFA, ProSight Duo Access, and ProSight Duo Beyond. Progent's security experts can assist your company to determine which plan for ProSight Duo is the best fit for your requirements.
ProSight Duo MFA Features:
- 2FA authentication
- Duo Mobile to push single-touch identity verification for smartphones and wearables
- ID verification through a U2F USB device or biometrics
- Traditional 2FA with a passcode on a token, mobile device, or provided by an IT administrator
- Self-enrollment and management
- Dashboard of all managed endpoints accessing secured apps
- Security policy enforcement based on application, group
- Cloud-based SSO for any apps through an MFA-secured dashboard
ProSight Duo Access Features:
- All the capabilities included with ProSight Duo
- Unified Endpoint Visibility shows every networked device, not just managed endpoints
- Highlight and monitor high-risk devices
- Duo Device Health application for notebooks and desktops
- Security health monitoring for mobile computers
- Access policy enforcement based on geo-location
- Blocking capability for anonymous communication networks such as Tor
- Detection of high-risk or problem networks
- Health-based policy enforcement for laptops, PCs and endpoints
- Advise users during sigh-on to bring up to date their software and security settings
ProSight Duo Beyond Features:
- All the features of ProSight Duo Access
- Detection of company-owned vs. personally owned notebooks, desktops and mobile computers
- Identification of 3rd-party software agents like AV running on endpoints
- Secure access to on-premises websites/apps and SSH servers without requiring VPN credential management
- Confirmation of both user and endpoint trust
- Control device access to apps based on membership in endpoint management systems
- Control mobile access to apps determined by enrollment in mobile device management systems
Download ProSight Duo Two-factor Authentication Service Plans Datasheet
To download a datasheet describing the major features and benefits of ProSight Duo Two-factor Authentication Service Plans, select:
ProSight Duo access security service plans datasheet. (PDF - 335 KB)
Download Importance of Using Modern Password Management Technology White Paper
To view or download a white paper about the importance of utilizing modern password management technology, click:
Reasons for Using Advanced Password Management Technology White Paper. (PDF - 2.3 MB)
How Progent Can Assist You to Create an 2FA Solution with ProSight Duo
Progent can assist you to design, deploy, manage and troubleshoot a two-factor authentication solution built on ProSight Duo technology. Progent can also help you to integrate ProSight Duo 2FA services into a cohesive, comprehensive cybersecurity strategy by delivering expertise in all aspects of modern security technology for any combination of cloud, on-premises, work-from-home, and mobile environments.
Progent's Cisco-certified CCIE network experts can assist you to configure and troubleshoot your Cisco ASA firewalls, switches, VPN connections, and other network infrastructure to work with Cisco Duo's ID verification technology. Progent's certified Azure integration experts, AWS support experts and Google Cloud Platform consulting experts can help your company to bring the security of ProSight Duo two-factor authentication to your cloud-hosted applications. Progent's work-from-home solution specialists can help your business to plan and configure protected and reliable remote connectivity for your at-home workers.
Progent can also provide fast guidance from Microsoft 365 Exchange experts, SQL Server experts, and Microsoft 365 consultants assist your organization to prepare and deploy Duo 2FA with your key applications. Progent's CISSP-certified network security consultants and CISM-certified network security specialists can help your business to review and strengthen your overall cybersecurity profile. Progent also offers ProSight Active Security Monitoring managed services for machine-learning based endpoint protection powered by SentinelOne.
Other Managed Services Available from Progent
Besides ProSight Duo 2FA services, Progent can provide other low-cost managed service plans that cover key components of your IT network such as security, backup/recovery, and infrastructure management. By partnering with top-tier technology providers, Progent can provide small and middle-size businesses the benefits of the same cutting-edge tools and services used by global enterprises. Popular managed services available from Progent include:
- ProSight LAN Watch: Server and Desktop Monitoring
ProSight LAN Watch is Progent's server and desktop monitoring managed service that uses state-of-the-art remote monitoring and management (RMM) technology to keep your network running efficiently by checking the health of vital assets that power your business network. When ProSight LAN Watch uncovers an issue, an alert is transmitted automatically to your specified IT personnel and your assigned Progent consultant so all looming problems can be addressed before they can impact your network. Learn more details about ProSight LAN Watch server and desktop monitoring consulting.
- ProSight LAN Watch with NinjaOne RMM: Centralized RMM for Networks, Servers, and Workstations
ProSight LAN Watch with NinjaOne RMM software delivers a unified, cloud-based platform for managing your client-server infrastructure by providing an environment for performing common time-consuming tasks. These include health checking, patch management, automated repairs, endpoint setup, backup and restore, A/V protection, remote access, standard and custom scripts, resource inventory, endpoint profile reports, and troubleshooting support. When ProSight LAN Watch with NinjaOne RMM uncovers a serious incident, it transmits an alarm to your specified IT staff and your Progent technical consultant so that emerging problems can be fixed before they interfere with productivity. Find out more about ProSight LAN Watch with NinjaOne RMM server and desktop monitoring consulting.
- ProSight WAN Watch: Network Infrastructure Remote Monitoring and Management
ProSight WAN Watch is an infrastructure monitoring and management service that makes it simple and inexpensive for small and mid-sized organizations to diagram, track, reconfigure and debug their networking appliances like routers, firewalls, and load balancers plus servers, printers, client computers and other networked devices. Incorporating cutting-edge Remote Monitoring and Management technology, ProSight WAN Watch makes sure that network diagrams are kept current, copies and displays the configuration information of almost all devices on your network, tracks performance, and sends alerts when problems are discovered. By automating complex management and troubleshooting activities, WAN Watch can knock hours off ordinary chores such as making network diagrams, expanding your network, locating devices that need critical software patches, or resolving performance problems. Find out more details about ProSight WAN Watch infrastructure monitoring and management consulting.
- ProSight Reporting: Real-time Reporting for Ticketing and Network Monitoring Applications
ProSight Reporting is a growing line of real-time reporting utilities created to work with the industry's leading ticketing and network monitoring applications such as ConnectWise Manage, ConnectWise Automate, Customer Thermometer, Auvik, and SentinelOne. ProSight Reporting incorporates Microsoft Graph and utilizes color coding to highlight and contextualize key issues like spotty support follow-up or machines with out-of-date AVs. By exposing ticketing or network health problems clearly and in near-real time, ProSight Reporting improves network value, lowers management hassle, and saves money. For details, see ProSight Reporting for ticketing and network monitoring platforms.
- ProSight Data Protection Services: Backup and Recovery Services
Progent has worked with leading backup technology providers to create ProSight Data Protection Services, a family of offerings that provide backup-as-a-service (BaaS). ProSight DPS products automate and monitor your backup operations and enable non-disruptive backup and rapid restoration of vital files/folders, apps, system images, and virtual machines. ProSight DPS helps you protect against data loss resulting from hardware failures, natural calamities, fire, malware such as ransomware, human mistakes, ill-intentioned insiders, or software glitches. Managed backup services in the ProSight Data Protection Services portfolio include ProSight DPS Altaro VM Backup, ProSight 365 Total Backup (formerly Altaro 365 Backup), ProSight DPS ECHO Backup based on Barracuda dedicated hardware, and ProSight DPS MSP360 Hybrid Backup. Your Progent service representative can help you to identify which of these fully managed backup services are best suited for your IT environment.
- ProSight Email Guard: Inbound and Outbound Spam Filtering and Data Leakage Protection
ProSight Email Guard is Progent's spam filtering service that uses the infrastructure of leading data security vendors to provide centralized control and comprehensive protection for your inbound and outbound email. The hybrid architecture of Email Guard managed service integrates cloud-based filtering with an on-premises security gateway device to provide advanced defense against spam, viruses, Dos Attacks, Directory Harvest Attacks, and other email-based malware. Email Guard's Cloud Protection Layer acts as a first line of defense and keeps the vast majority of threats from reaching your network firewall. This reduces your exposure to inbound threats and conserves network bandwidth and storage space. Email Guard's on-premises security gateway appliance provides a deeper level of inspection for inbound email. For outgoing email, the local gateway offers anti-virus and anti-spam filtering, DLP, and email encryption. The onsite security gateway can also help Microsoft Exchange Server to monitor and safeguard internal email that originates and ends inside your corporate firewall. For more details, visit ProSight Email Guard spam filtering and data leakage protection.
- Outsourced/Co-managed Service Desk: Help Desk Managed Services
Progent's Support Desk services enable your IT group to offload Call Center services to Progent or divide responsibilities for support services seamlessly between your in-house network support team and Progent's extensive pool of IT support technicians, engineers and subject matter experts. Progent's Co-managed Service Desk provides a smooth extension of your core support organization. User access to the Help Desk, provision of technical assistance, escalation, trouble ticket generation and updates, efficiency measurement, and maintenance of the support database are consistent whether incidents are taken care of by your corporate network support organization, by Progent's team, or by a combination. Find out more about Progent's outsourced/co-managed Call Center services.
- Active Protection Against Ransomware: AI-based Ransomware Identification and Cleanup
Progent's Active Protection Against Ransomware is an endpoint protection managed service that utilizes next generation behavior-based analysis technology to guard endpoints and servers and VMs against modern malware assaults such as ransomware and email phishing, which routinely get by traditional signature-matching AV tools. Progent Active Security Monitoring services protect local and cloud-based resources and offers a unified platform to manage the complete threat progression including protection, infiltration detection, mitigation, cleanup, and forensics. Key features include single-click rollback with Windows Volume Shadow Copy Service and automatic network-wide immunization against newly discovered attacks. Learn more about Progent's ransomware defense and recovery services.
- ProSight IT Asset Management: Network Documentation Management
Progent's ProSight IT Asset Management service is a cloud-based IT documentation management service that allows you to capture, update, retrieve and safeguard information about your network infrastructure, processes, applications, and services. You can quickly locate passwords or IP addresses and be alerted automatically about impending expirations of SSL certificates or domains. By updating and organizing your network documentation, you can save as much as 50% of time spent trying to find critical information about your IT network. ProSight IT Asset Management features a centralized repository for holding and collaborating on all documents required for managing your network infrastructure like recommended procedures and How-To's. ProSight IT Asset Management also offers a high level of automation for collecting and associating IT data. Whether you're planning enhancements, doing maintenance, or responding to a crisis, ProSight IT Asset Management delivers the knowledge you need when you need it. Read more about ProSight IT Asset Management service.
- Patch Management: Patch Management Services
Progent's managed services for software and firmware patch management provide organizations of any size a flexible and cost-effective solution for evaluating, testing, scheduling, implementing, and tracking software and firmware updates to your dynamic IT network. Besides maximizing the security and reliability of your computer network, Progent's patch management services free up time for your in-house IT team to focus on line-of-business initiatives and tasks that derive the highest business value from your network. Learn more about Progent's software/firmware update management services.
- ProSight Virtual Hosting: Hosted Virtual Machines at Progent's Tier III Data Center
With Progent's ProSight Virtual Hosting service, a small or mid-size organization can have its critical servers and applications hosted in a secure fault tolerant data center on a high-performance virtual host set up and maintained by Progent's IT support experts. Under Progent's ProSight Virtual Hosting service model, the client owns the data, the operating system software, and the applications. Because the environment is virtualized, it can be moved immediately to a different hosting solution without requiring a time-consuming and difficult configuration procedure. With ProSight Virtual Hosting, you are not tied a single hosting service. Find out more details about ProSight Virtual Hosting services.
- ProSight Active Security Monitoring: Endpoint Protection and Ransomware Defense
ProSight Active Security Monitoring (ASM) is an endpoint protection (EPP) solution that incorporates SentinelOne's cutting edge behavior analysis tools to defend physical and virtual endpoints against new malware assaults like ransomware and file-less exploits, which easily escape legacy signature-matching anti-virus tools. ProSight Active Security Monitoring safeguards on-premises and cloud resources and offers a unified platform to automate the entire threat progression including protection, identification, mitigation, cleanup, and forensics. Top capabilities include one-click rollback with Windows VSS and real-time network-wide immunization against newly discovered attacks. Progent is a SentinelOne Partner, dealer, and integrator. Find out more about Progent's ProSight Active Security Monitoring endpoint protection and ransomware recovery.
- ProSight Enhanced Security Protection (ESP): Endpoint Protection and Microsoft Exchange Filtering
Progent's ProSight Enhanced Security Protection services deliver economical multi-layer protection for physical and virtual servers, workstations, smartphones, and Exchange Server. ProSight ESP uses contextual security and advanced machine learning for round-the-clock monitoring and responding to cyber assaults from all vectors. ProSight ESP provides firewall protection, intrusion alarms, device management, and web filtering via cutting-edge technologies incorporated within a single agent managed from a single control. Progent's data protection and virtualization experts can help you to design and configure a ProSight ESP environment that addresses your organization's specific requirements and that allows you prove compliance with government and industry information protection regulations. Progent will assist you specify and implement policies that ProSight ESP will enforce, and Progent will monitor your IT environment and respond to alerts that call for urgent attention. Progent can also help you to install and verify a backup and restore system such as ProSight Data Protection Services (DPS) so you can recover quickly from a destructive security attack such as ransomware. Read more about Progent's ProSight Enhanced Security Protection (ESP) unified physical and virtual endpoint protection and Microsoft Exchange email filtering.
Contact Progent for Network Security Solutions
If you need expertise for multi-factor authentication or any other facet of network security, call Progent at 800-993-9400 or visit Contact Progent.