ProSight Active Security Monitoring Services and Ransomware DefenseProgent's ProSight Active Security Monitoring services, powered by SentinelOne's behavior-analysis technology, provides advanced protection for endpoints and servers. This modern approach to malware defense addresses the new wave of cyber attacks, like ransomware, which easily avoid detection by traditional signature-based anti-virus (AV) techniques. ProSight ASM gives small and mid-sized companies the benefits of the same AV technology deployed by some of the world's largest enterprises including Walmart, Netflix, Visa, Citi, NASDAQ, and Salesforce. By providing real-time malware blocking, detection, mitigation, recovery and forensics in a single integrated platform, ProSight ASM lowers total cost of ownership, streamlines management, and expedites recovery. The next-generation endpoint protection (NGEP) engine incorporated in ProSight ASM was ranked by Gartner Group as the industry's "most visionary Endpoint Protection Platform." Progent is a SentinelOne Partner, dealer, and integrator.

Progent's ProSight Active Security Monitoring services rely on a low-profile software agent running on every protected device in order to create an active security grid that reacts to potential malware in real time and orchestrates unified defense featuring:

  • Real-time protection for Microsoft Windows, Mac, Linux, iOS and Android devices
  • Support for VMs powered by Hyper-V, VMware vSphere, and Citrix XenServer virtualization platforms
  • In-depth OS-level monitoring
  • Signature-less heuristics and extensive automation
  • Modern behavioral analysis
  • Detection of new generation attacks from all vectors
  • Automated post-attack remediation
  • Single-click rollback to last safe state after ransomware attack
  • Instant and automatic immunization across the entire device grid
  • Real-time visualization of an attack's progression through your network
  • Comprehensive forensics for identifying vulnerabilities
  • Centralized web-accessible management console
  • HIPAA and PCI compliant
ProSight Active Security Monitoring is available as an affordable fixed-cost monthly service, requires no special hardware, and protects onsite, mobile, and cloud-based resources. In case you experience a successful cyber attack, Progent can provide the services of CISSP-certified cybersecurity experts to work as your red team to help you utilize ProSight ASM's advanced tools to contain the intrusion, remove the malware from all affected devices, evaluate the damage, rollback your system to the last known healthy state, and document the source of the attack and its storyline within your network.

ProSight Active Security Monitoring and Today's Threat Landscape
Over 97% of successful malware attacks could have been blocked by modern security tools. But the industry has come to realize that, unfortunately, some attacks will succeed despite the best defenses. The modern security landscape is too filled with bad actors, including state-sponsored cyber criminals, for any enterprise to be entirely safe. With this in mind, ProSight Active Security Monitoring is designed not just to prevent malware from gaining access to your network, but also to react decisively to any detected penetration. This includes immediate isolation of compromised devices, automatic threat removal, machine-speed immunization of all endpoints via device-resident agents, single-click restore to a safe state, and comprehensive forensics to show you how to bolster your security profile to foil future attacks. By delivering leading-edge protection during all phases of a cyber attack, ProSight ASM provides a comprehensive solution for dealing with the increasingly dire security landscape and avoiding the financial and reputation loss associated with a major security breach.

Endpoints such as desktops, notebooks and smartphones are the most susceptible and most commonly attacked elements of an IT network. ProSight Active Security Monitoring services offer a unified endpoint protection (EPP) platform to handle the complete lifecycle of a cyber attack including blocking, identification, remediation, restoration and analytics. Threats managed by ProSight ASM include:

  • File-based attacks like ransomware, trojans, worms, backdoors and payload-based attacks
  • File-less and memory-only attacks without disk-based indicators
  • Document-based attacks incorporated within macros and Office and Adobe files
  • Phishing and spear phishing email-based attacks (which are responsible for a high percentage of security breaches)
  • Web browser-based attacks embedded in drive-by downloads, Flash, Java, Javascript, VBS, iframe, html5, and plug-ins
  • Live attacks based on scripts like PowerShell, Powersploit, WMI, and VBS
  • Credential-based attacks such as credential-scraping, Mimikatz, and tokens
ProSight ASM's Behavior-based Threat Detection
Older-generation anti-virus (AV) software uses so-called "signature matching" as its primary mechanism for malware detection. With this technique, a distinct file hash, known as a signature, is calculated for every familiar threat. AV programs continually compare incoming data against ever-expanding signature tables, and block anything with a tell-tale signature. The problem with this technique is that new threats are now being generated much faster than AV labs can create and publish signatures. Next-generation AV platforms supplement traditional signature matching with behavior analysis. This technology examines the actions of a possible threat and decides whether the behavior is normal and safe or abnormal and potentially dangerous. For example, does the code in question impact an unusually large number of processes? Does it modify the registry? Does it log keystrokes? Basically, behavior analysis focuses on suspicious activities rather than on a signature, which a hacker can easily nullify just by changing a few inconsequential bytes of malware code.

Prevention: Prior to the Attack
New threats are being manufactured fast enough to overwhelm the capacity of signature-based AV platform providers. The industry has broadly recognized the shortcomings of signature-matching EPP since 2012. Since then things have grown worse quickly enough to qualify as a crisis.

ProSight ASM Endpoint Protection Services

Malware production has increased far faster than signature-based AV technology can respond

ProSight ASM uses intelligent cloud-based resources and reputation services from major vendors to block known threats. This combined with deep file inspection and dynamic blacklisting and whitelisting give ProSight ASM an advantage over traditional AV products. However, prevention is only the first stage of modern AV defense. Sophisticated exploits, file-less and script-based attacks routinely slip by signature-matching systems. As an example, malware packers compress attack code to camouflage malicious software so security researchers and AV software are unable to recognize the threat.

Detection and Mitigation: During the Attack
The second part of the EPP lifecycle involves reacting to a cyber attack while the malicious code is executing. ProSight ASM uses next-generation endpoint protection technology to spot malicious activity caused by any threat that breaks through the first line of defense. In order to compromise data, even file-less threats like a memory-based attack perform recognizable activities such as creating an executable file without permission. ProSight ASM's compact agent monitors activity in every protected endpoint device and uses advanced behavioral threat analysis and full execution context to detect new attacks as soon as they start. When an attack is identified, ProSight ASM at once isolates the impacted endpoint from the network to contain the damage. Since the ProSight ASM agent operates autonomously, endpoints remain secured even when they are disconnected from the Internet.

Cleanup: After a Break-in
After containing an attack, ProSight ASM starts the recovery phase of protection. When ProSight ASM is integrated with Windows Volume Shadow Copy Service (Windows VSS), changes to data caused by a cyber attack can be automatically rolled back to a trusted state with one click. ProSight ASM also logs any system-level files and settings that were altered by the attack and what files were fixed. Whenever ProSight ASM uncovers a new malware binary, the code is flagged and all devices on the network that are protected by agents are immunized against the new attack. Also, the ProSight ASM management console offers extensive forensics such as an intuitive visualization of the attack's storyline across the network from beginning to end. This audit trail of how an attack progressed through the network helps you assess the damage and highlights vulnerabilities in policies or work habits that should be corrected to avoid future breaches.

ProSight ASM Attack Storyline

ProSight ASM's management console provides a real-time storyline of a threat's path through the network

Download the ProSight Active Security Monitoring Services Datasheet
To view or download a datasheet describing the key features of ProSight Active Security Monitoring, click:
Progent's ProSight Active Security Monitoring Services Datasheet. (PDF - 89 KB)

Additional ProSight Managed Services Available from Progent
In addition to ProSight Active Security Monitoring, Progent's ProSight family of network management services includes other affordable, fixed-price managed services that allow you to outsource key aspects of IT network management including backup and disaster recovery, network infrastructure monitoring and management, email content filtering, VM hosting, and IT documentation management. By partnering with some of the industry's leading technology vendors, Progent can offer small and mid-size businesses the benefits of the same advanced technology used by the world's largest enterprises. Managed services offered by Progent include:

  • ProSight Enhanced Security Protection: Endpoint Security and Microsoft Exchange Email Filtering
    ProSight Enhanced Security Protection (ESP) services offer affordable multi-layer security for physical servers and virtual machines, workstations, mobile devices, and Exchange email. ProSight ESP uses adaptive security and advanced heuristics for round-the-clock monitoring and responding to cyber assaults from all vectors. ProSight ESP offers two-way firewall protection, penetration alarms, endpoint management, and web filtering through leading-edge technologies packaged within one agent accessible from a single console. Progent's data protection and virtualization experts can assist your business to plan and configure a ProSight ESP environment that addresses your organization's specific needs and that allows you demonstrate compliance with government and industry data protection standards. Progent will assist you define and configure policies that ProSight ESP will enforce, and Progent will monitor your IT environment and respond to alerts that call for immediate action. Progent can also assist your company to set up and test a backup and restore solution like ProSight Data Protection Services so you can recover rapidly from a destructive security attack such as ransomware. Find out more about Progent's ProSight Enhanced Security Protection (ESP) unified physical and virtual endpoint security and Exchange email filtering.

  • ProSight Data Protection Services (DPS): Managed Backup and Disaster Recovery Services
    Progent has partnered with leading backup technology providers to produce ProSight Data Protection Services (DPS), a family of subscription-based management offerings that provide backup-as-a-service. ProSight DPS services automate and track your data backup operations and enable transparent backup and fast recovery of important files/folders, applications, images, and virtual machines. ProSight DPS lets your business avoid data loss resulting from equipment breakdown, natural calamities, fire, malware such as ransomware, human mistakes, malicious insiders, or application bugs. Managed backup services available in the ProSight Data Protection Services portfolio include ProSight DPS Altaro VM Backup, ProSight 365 Total Backup (formerly Altaro 365 Backup), ProSight DPS ECHO Backup using Barracuda purpose-built storage, and ProSight DPS MSP360 Cloud and On-prem Backup. Your Progent expert can assist you to identify which of these fully managed services are most appropriate for your IT environment.

  • ProSight Email Guard: Inbound and Outbound Spam Filtering and Data Leakage Protection
    ProSight Email Guard is Progent's spam and virus filtering service that incorporates the infrastructure of top information security vendors to provide web-based management and world-class protection for all your inbound and outbound email. The hybrid structure of Progent's Email Guard combines a Cloud Protection Layer with a local gateway device to offer advanced protection against spam, viruses, Dos Attacks, Directory Harvest Attacks (DHAs), and other email-borne threats. Email Guard's cloud filter serves as a preliminary barricade and blocks the vast majority of unwanted email from making it to your network firewall. This reduces your exposure to external attacks and saves system bandwidth and storage space. Email Guard's onsite security gateway appliance provides a deeper layer of analysis for inbound email. For outgoing email, the onsite security gateway provides anti-virus and anti-spam protection, DLP, and email encryption. The onsite gateway can also help Microsoft Exchange Server to track and safeguard internal email traffic that originates and ends within your corporate firewall. For more information, see ProSight Email Guard spam filtering and data leakage protection.

  • ProSight WAN Watch: Infrastructure Remote Monitoring and Management
    Progent's ProSight WAN Watch is an infrastructure management service that makes it simple and affordable for smaller organizations to map out, track, reconfigure and troubleshoot their connectivity hardware like routers and switches, firewalls, and load balancers as well as servers, printers, client computers and other networked devices. Using cutting-edge RMM technology, ProSight WAN Watch makes sure that network diagrams are always updated, copies and manages the configuration of almost all devices connected to your network, tracks performance, and sends alerts when issues are discovered. By automating complex management and troubleshooting activities, WAN Watch can cut hours off common tasks such as network mapping, reconfiguring your network, finding appliances that require important updates, or resolving performance issues. Find out more about ProSight WAN Watch network infrastructure monitoring and management services.

  • ProSight LAN Watch: Server and Desktop Monitoring
    ProSight LAN Watch is Progent's server and desktop remote monitoring managed service that uses state-of-the-art remote monitoring and management technology to help keep your IT system operating at peak levels by tracking the state of vital computers that drive your business network. When ProSight LAN Watch uncovers a problem, an alarm is transmitted automatically to your designated IT management staff and your assigned Progent engineering consultant so any looming problems can be resolved before they have a chance to disrupt your network. Learn more about ProSight LAN Watch server and desktop monitoring consulting.

  • ProSight Virtual Hosting: Hosted Virtual Machines at Progent's Tier III Data Center
    With ProSight Virtual Hosting service, a small business can have its key servers and applications hosted in a secure Tier III data center on a fast virtual host configured and managed by Progent's IT support experts. With Progent's ProSight Virtual Hosting service model, the client owns the data, the OS software, and the apps. Since the system is virtualized, it can be moved immediately to a different hosting environment without requiring a time-consuming and difficult reinstallation process. With ProSight Virtual Hosting, your business is not locked into a single hosting provider. Learn more about ProSight Virtual Hosting services.

  • ProSight IT Asset Management: Network Documentation Management
    ProSight IT Asset Management service is a cloud-based IT documentation management service that makes it easy to create, maintain, retrieve and safeguard information about your network infrastructure, procedures, applications, and services. You can instantly find passwords or IP addresses and be warned about impending expirations of SSLs or domains. By cleaning up and organizing your IT infrastructure documentation, you can eliminate as much as half of time thrown away searching for vital information about your network. ProSight IT Asset Management includes a centralized location for holding and sharing all documents required for managing your network infrastructure such as standard operating procedures and self-service instructions. ProSight IT Asset Management also offers a high level of automation for gathering and associating IT information. Whether you're planning enhancements, doing maintenance, or responding to a crisis, ProSight IT Asset Management gets you the data you require when you need it. Find out more about ProSight IT Asset Management service.

  • Active Protection Against Ransomware: AI-based Ransomware Identification and Remediation
    Progent's Active Protection Against Ransomware is an endpoint protection managed service that utilizes next generation behavior analysis tools to guard endpoint devices as well as physical and virtual servers against new malware assaults like ransomware and file-less exploits, which easily escape legacy signature-matching AV products. Progent Active Security Monitoring services safeguard on-premises and cloud resources and provides a unified platform to address the complete malware attack lifecycle including filtering, infiltration detection, containment, cleanup, and forensics. Top capabilities include single-click rollback using Windows Volume Shadow Copy Service (VSS) and real-time network-wide immunization against new threats. Learn more about Progent's ransomware defense and recovery services.

  • Outsourced/Co-managed Service Desk: Help Desk Managed Services
    Progent's Support Center services enable your IT team to outsource Help Desk services to Progent or split responsibilities for Service Desk support seamlessly between your in-house support team and Progent's nationwide pool of IT support engineers and subject matter experts. Progent's Co-managed Help Desk Service provides a seamless extension of your in-house IT support group. Client interaction with the Service Desk, delivery of support, escalation, ticket creation and tracking, efficiency metrics, and maintenance of the service database are consistent regardless of whether incidents are resolved by your corporate network support resources, by Progent, or by a combination. Read more about Progent's outsourced/co-managed Help Center services.

  • Progent's Patch Management: Patch Management Services
    Progent's support services for patch management offer businesses of any size a flexible and affordable alternative for assessing, testing, scheduling, implementing, and tracking software and firmware updates to your dynamic IT system. Besides optimizing the protection and reliability of your IT network, Progent's patch management services allow your in-house IT team to focus on more strategic initiatives and activities that derive the highest business value from your network. Learn more about Progent's patch management support services.

  • ProSight Duo Two-Factor Authentication: Identity Validation, Endpoint Remediation, and Secure Single Sign-on (SSO)
    Progent's Duo authentication service plans incorporate Cisco's Duo technology to defend against compromised passwords through the use of two-factor authentication. Duo enables single-tap identity confirmation with Apple iOS, Android, and other personal devices. With 2FA, whenever you log into a secured application and give your password you are asked to confirm your identity via a device that only you have and that uses a different ("out-of-band") network channel. A broad selection of devices can be utilized as this second means of authentication including an iPhone or Android or wearable, a hardware/software token, a landline phone, etc. You may register several verification devices. For more information about Duo two-factor identity validation services, refer to Duo MFA two-factor authentication (2FA) services for access security.

  • ProSight Reporting: Real-time and In-depth Reporting for Ticketing and Network Monitoring Platforms
    ProSight Reporting is a growing suite of real-time reporting utilities created to work with the top ticketing and network monitoring platforms including ConnectWise Manage, ConnectWise Automate, Customer Thermometer, Auvik, and SentinelOne. ProSight Reporting incorporates Microsoft Graph and features color coding to surface and contextualize critical issues like inconsistent support follow-through or machines with out-of-date AVs. By exposing ticketing or network health concerns clearly and in near-real time, ProSight Reporting enhances productivity, reduces management overhead, and saves money. For more information, see ProSight Reporting for ticketing and network monitoring applications.
Download Progent's 10 Benefits of Managed IT Services White Paper
To download a white paper explaining why managed services are quickly replacing the old break/fix model of IT support for small and mid-size companies, click:
10 Benefits of Managed IT Services. (PDF - 710 KB)

ProSight Network Audits
Progent's ProSight Network Audits offer a fast and affordable way for small and mid-size businesses to get an unbiased assessment of the health of their network. Based on a selection of the top remote monitoring and management (RMM) platforms available, and supervised by Progent's world-class group of information technology professionals, ProSight Network Audits help you see how well the deployment of your essential network devices adhere to leading practices. The Basic and Advanced options for ProSight Network Audit services are offered at a budget-friendly, one-time cost and provide immediate ROI like a cleaner Active Directory (AD) environment. Both also include a year of advanced remote network monitoring and management (RMM). Benefits can include easier management, better compliance with data security regulations, more efficient utilization of network assets, faster problem resolution, more reliable backup and restore, and less downtime. Learn more information about ProSight Network Audits network infrastructure assessment.

Progent's ProSight Ransomware Preparedness Report Service
The ProSight Ransomware Preparedness Report is an affordable service built around a phone interview with a Progent information assurance consultant. The interview is intended to evaluate your company's ability to defend against ransomware or recover rapidly after an attack by a ransomware variant like Ryuk, Maze, Sodinokibi, Netwalker, DopplePaymer, Conti or Nephilim. Progent will consult with you personally to collect information concerning your existing AV defense and backup/recovery system, and Progent will then deliver a custom Basic Security and Best Practices Report detailing how you can apply industry best practices to deploy a cost-effective security and backup system that minimizes your vulnerability to ransomware and meets your business requirements. For details, see The ProSight Ransomware Preparedness Report Service.

The Progent Edge
Progent's roster of over 100 IT consultants includes experts who have earned certifications in all facets of network technology associated with small and mid-size businesses. This broad scope of skills positions Progent to be your single point of contact with technology vendors and a reliable source of guidance and troubleshooting know-how to help you manage your business network. Progent has built an especially strong team of data security specialists who can help you protect your information and maximize the business value of your network. Besides the endpoint security offered by ProSight Active Security Monitoring, Progent provides additional managed services and value-priced service packages intended to assist small and mid-size organizations to build and manage networks that deliver enterprise-class security and compliance on a small-business budget.

Progent offers expert support for all endpoints, servers and VMs protected by ProSight Active Security Monitoring. Expertise offered by Progent includes Windows 11 planning and migration consulting, Windows 10 configuration, Linux integration, Mac OS X and macOS support, iPhone and iPad management, Android integration, Windows Server 2022 integration expertise, Windows Server 2019 migration consulting, Windows Hyper-V support, and VMware vSphere planning and support. To implement the single-click rollback feature of ProSight Active Security Monitoring, Progent's Windows Server consultants can assist you to configure Windows Volume Shadow Copy Service. In addition, Progent offers remote and on-premises support from certified Cisco CCIE network infrastructure consultants to help you design, secure, or troubleshoot your infrastructure. If your network makes use of public cloud services, Progent can provide the expertise of Microsoft Azure consultants, Amazon AWS consultants, and Google Cloud integration consultants to help you build and manage hybrid networking solutions that seamlessly integrate local and cloud-based resources.

Other Affordable Service Packages Available from Progent
In addition to the ProSight suite of network management services, Progent offers affordable, one-time service packages to assist small and mid-size companies to verify compliance with internal or regulatory security requirements. These low-cost services include security vulnerability evaluation and penetration testing. Progent can also provide high-level disaster recovery planning consulting and business continuity planning consulting to help make sure you can resume your business activity as soon as possible following a catastrophe.

Contact Progent about ProSight Active Security Monitoring Services
To find out more about how Progent can help you set up an affordable, fully managed endpoint security solution with ProSight Active Security Monitoring, call 1-800-993-9400 or visit Contact Progent.



An index of content::

  • Adams County Colorado BlackBerry BES Network Consulting Firms BlackBerry Synchronization Technology Consulting Company Aurora Colorado
  • Austin Remote Workers Data Protection Solutions Consulting and Support Services Travis County Texas Travis County Texas Remote Workforce Guidance near me in Austin - Backup Systems Expertise
  • After Hours Signature-matching Virus Protection Consultant
  • Award Winning Akron Critical Crypto-Ransomware Removal Support Services Akron, OH Akron Ransomware Remediation Consulting Akron, OH
  • Cisco Network Security Consultants Santa Rosa, CA Cisco Technical Support Organizations Healdsburg CA, United States

  • Online Support Services Windows Server 2022 Disaster Recovery
    Microsoft Certified Expert Windows Server 2022 Storage Replica Integration

    Progent's certified Windows Server 2022 experts can assist your company to plan and implement a cost-effective upgrade to Windows Server 2022 that features high availability and that is based on a self-hosted system architecture or a hybrid deployment model that integrates cloud-hosted Windows Server Online with an on-prem implementation of Windows Server 2022.

  • Cisco Technical Support Tucson, AZ Largest Cisco Integration Group Tucson Arizona
  • Guadalajara Critical Crypto Repair Help Guadalajara Jalisco Guadalajara Crypto-Ransomware Repair Zapopan
  • IT Consultants Exchange 2019 Oklahoma City, OK 24/7 Microsoft Exchange Service Oklahoma County
  • Immediate Kansas City Remote Workers Set up Expertise Kansas City Bonner Springs Urgent At Home Workforce Consulting and Support Services - Kansas City - Set up Guidance Kansas City, KS
  • Ipanema, Estado do Rio de Janeiro Ipanema Remote Workers Help Desk Solutions Consulting and Support Services Leblon, Ipanema Telecommuters Consultants near Ipanema - Help Desk Solutions Consulting Services
  • Irving-Euless Technology Support Best CISSP Certified Security Irving, Texas Computer Installation
  • MS Dynamics GP Premier Partner near me in Curitiba - Upgrade Consultants Curitiba Dynamics GP (Great Plains) Customization Expert Curitiba, State of Parana
  • Manaus, Amazonas Manaus Hermes Ransomware Forensics Manaus Lockbit Ransomware Forensics Investigation
  • Migration Consulting Cisco Stamford Danbury Greenwich Fairfield County Connecticut Cisco Small Business IT Consulting Company
  • Pasadena Crypto-Ransomware Settlement Services Top Ranked Pasadena Egregor Ransomware Settlement Consulting Harris County Texas, U.S.A.
  • Phobos Ransomware Hot Line Anchorage Muldoon Mall Maze Ransomware Hot Line Anchorage, America
  • Sacramento Cisco Network Consultation Cisco Outsourcing
  • Short-Term IT Staffing Services Consultants IT Staffing for Network Support Groups Allentown, Lehigh County, US
  • Sorocaba Crypto-Ransomware Locky Vulnerability Evaluation Sorocaba, SP Emergency Sorocaba Ransomware Infection Preparedness
  • Thousand Oaks, Conejo Valley BlackBerry Email Computer Service Providers BlackBerry Support Firms Thousand Oaks California
  • Tulsa Urgent Crypto Repair Experts Tulsa, OK Award Winning Tulsa Immediate Crypto-Ransomware Cleanup Experts
  • SentinelOne Ransomware Recovery Consultancy
  • Work at Home Employees Florianópolis Consulting - Voice/Video Conferencing Solutions Consulting Florianopolis-São José Florianopolis, SC At Home Workers Assistance near me in Florianópolis - Conferencing Systems Assistance
  • Work from Home Employees Consulting and Support Services - Monterrey - Collaboration Solutions Consulting Monterrey Monterrey Monterrey Offsite Workforce Collaboration Systems Expertise

  • Data Mart Coder
    Integration Companies Web

    If you want to revamp your corporate web site, create internal websites for purposes such as human resources or worker education, establish a high-impact web presence for a new venture, or write line-of-business, data-driven custom web applications, Progent can provide talented and experienced web designers. Progent's experts can also show you how to build and maintain a safe, fault-tolerant server and communications infrastructure, including off-site and wireless access, to support your web tools.

  • SentinelOne Endpoint Security Specialists
  • Work from Home Employees Consulting near me in Irvine - Collaboration Solutions Consulting Experts Irvine California 24x7 Offsite Workforce Consulting Services nearby Irvine - Collaboration Solutions Guidance Irvine, CA

  • © 2002-2024 Progent Corporation. All rights reserved.