Fast and Affordable Security Checkups for Small Businesses
Is your small business network keeping pace with today's security environment? Are you protecting your network assets? How difficult would it be for a hacker to break into your information system, and what steps can you take to prevent it? Progent has developed a fast and affordable way for small businesses to answer these questions without disrupting their network operations.
Progent's Network Security Inventory packages are fixed-price service bundles that rely on advanced network scanning technology and the certified expertise of Progent's security engineers to evaluate the vulnerability of your network and provide recommendations for simple ways you can mitigate your security risk. Progent offers two packages, the External Network Security Inventory and the Internal Network Security Inventory, which assess different aspects of network security exposure and which you can use separately or together. Both packages offer features designed for the needs of small businesses who want to take a more proactive role in making their networks safe from malicious assaults but who don't have the time or the budget to manage an exhaustive enterprise-class network security audit.
Top Features and Benefits of Progent's Security Inventory Packages for Small Business Networks
Progent's Security Inventory packages offer an array of features and benefits especially designed to address today's increasingly hostile security environment in which all business networks operate but also to take into account the financial and operational realties of small companies. Implemented together or separately, Progent's External and Internal security scanning packages help small businesses achieve a high level of network protection at little cost or hassle.
- Low-cost:
Progent's Network Security Inventory packages are inexpensive and are offered at a set-price, so you know in advance what it will cost to understand the state of your network security. Potential attack vectors detected by Progent's security scans are typically easy to fix and involve configuration issues with network operating systems, applications, and devices. If you have not regularly utilized security scans in the past, you get a lot of bang for your buck. Generally, a great deal of security risk associated with small business networks can be substantially reduced at very little expense.
- Fast:
The scanning, analysis, and reporting processes involved in Progent's Network Security Inventory packages can usually be completed in one business day. This fast turnaround can reduce the window during which your network is exposed to attack by allowing you to move quickly into remediation mode. This also reduces the stressful suspense management may feel not knowing whether information assets are safe, and minimizes the time that your network manager is diverted from other responsibilities. A combination of advanced scanning technology and experienced engineers allow Progent's security team to deliver results quickly and at low cost to the customer.
- Remote Scanning:
The scanning phase of Progent's Network Security Inventory packages are managed remotely from a secure Progent site. In the case of the Internal Network Security Inventory package, the scan is itself run from an onsite machine made available by the customer. The setup procedure for external or internal scans can accomplished in minutes, and the collected data is analyzed offsite by Progent's certified security professionals. By utilizing remote tools to conduct the Network Security Inventory packages, Progent saves significant time and money, which in turn allows Progent to offer these packages at prices that small businesses can afford.
- Proactive:
Progent's Network Security Inventory packages are not intended to detect and remove viruses or other malware resulting from a successful attack on your network, but to uncover common security gaps before they are exploited by malicious sources. Although larger enterprises routinely utilize third-party consulting firms like Progent to conduct vulnerability scans in order to benefit from an objective risk assessment, small businesses with limited IT budgets and technical expertise often wait until their networks are hacked before getting serious about security. By offering vulnerability scanning packages that are fast, affordable, and effective, Progent makes it a no brainer for small businesses to take the lead in protecting their network assets.
- Certified Security Engineers:
Progent's security engineers have been certified by some of the industry's most prestigious standards institutions including the Information Systems Audit and Control Association (ISACA), the International Information Systems Security Certification Consortium (ISC), and the SANS Institute. Progent's security team has worked with major enterprises to assess and enhance network security. With Progent's Network Security Inventory packages, small businesses get the benefit of vulnerability assessments from world-class security professionals without requiring an enterprise-class IT budget.
- Effective:
Progent's security engineers are familiar with the sophisticated tools and techniques hackers employ to break into information networks to steal and control resources and data. The majority of these intrusion attempts are based on exploiting security gaps that are surprisingly easy to block. Both of Progent's Network Security Inventory packages address a separate range of potential security vulnerabilities often found in small business IT networks. Either package will provide information to help you enhance your network protection. Using the external and the internal scan packages together will allow you to secure your network even more.
- Actionable Reporting:
The data collected from Progent's Network Security Inventory scans are analyzed by a certified engineer on Progent's security team. As part of the package, Progent's security engineer will prepare and send a report that summarizes the results of the vulnerability scan and suggests mitigation procedures that can be performed by Progent, by your in-house IT support staff, or by a competent third-party security consulting firm. Any remedial work requested from Progent will be performed as a separate project for which Progent can provide a time estimate and for which Progent will bill at standard consulting rates.
External Security Inventory Scan
Progent's External Network Security Inventory package tests for the threat levels of the open ports and services on your network that are exposed outside your firewall. These ports and services can include email, web sites, eCommerce applications, remote access tools, or any service that requires or is granted communication with the world beyond your firewall. This is a favorite hunting ground of hackers and, in many small businesses, a rich source of attack vectors.
Progent's security team will examine the scanned data, produce a report that summarizes and interprets the results, and make suggestions on efficient ways to reduce your exposure to attack. The external scan will not disrupt your ongoing network operations or noticeably impact your system performance. Progent offers this service package at a low set price that covers setup, scanning, analysis, reporting, and recommendations. The set price does not include remediation services which may be suggested. These follow-on services can be performed by any qualified security engineer and are available from Progent at standard consulting rates.
Internal Security Inventory Scan
Many security attacks originate from inside your company firewall and can be the result of careless employees who attach compromised laptops to your network, workers who try to access restricted information or gain unauthorized administration rights, or lurkers in close physical proximity to your wireless access points. Progent's Internal Network Security Inventory package tests for vulnerabilities within your firewall by looking for open ports and services that are not exposed to the outside world but that could be a source of trouble if improperly configured. The internal scan can be executed from any computer inside your security perimeter that you make temporarily available to Progent's security engineer. Progent will remotely download a virtual machine and the required scanning tools to the internal computer you have assigned, launch the scan, and transfer the collected data to a secure Progent site. Progent does not need to make an expensive onsite service call and the time required to install and subsequently remove the scanning software is negligible.
Progent's security engineer managing the Internal Security Inventory Scan will examine the scanned data and create a report that summarizes the results and suggests any mitigation measures that may be required. Progent offers this service package at a low set price that covers setup, scanning, analysis, reporting, and recommendations. The set price does not include remediation services which may be suggested. These follow-on services can be performed by any qualified security engineer and are available from Progent at standard consulting rates.
Download the Security Inventory Scan Datasheet
To download a single-page printable datasheet describing Progent's two set-price Security Inventory Scan service packages for small businesses, click:
Security Inventory Scanning Packages (PDF - 104 KB).
Additional Network Security Auditing Services Available from Progent
Progent offers a variety of additional services designed to check your network for vulnerabilities, verify your compliance with governmental or industry security standards, and mitigate critical gaps in your network's defenses:
- Enterprise Vulnerability Assessment Service Packages
Progent can provide a range of set-price enterprise security assessment service packages created for corporations who need to comply with security standards required by state agencies or by customers. Progent's security assessment packages offer larger businesses an opportunity to get an objective opinion about the strength of their network security. For each security inventory or evaluation bundle, Progent engineers with high-level security credentials analyze and report on collected data and provide suggestions for effective improvements. An added-cost option for on-premises security engineers is available throughout United States.
- Support for Horizon3.ai's NodeZero PEN Testing Solutions
NodeZero from Horizon3.ai is a cutting-edge penetration test (pentest) product family that supports continuous, concurrent, programmable testing of your internal and perimeter network to help you identify, rank, fix, and confirm security vulnerabilities before threat actors can exploit them. Progent offers the expertise of a NodeZero Certified Operator (NCO) who can help you to deploy NodeZero to carry out comprehensive penetration tests of your network perimeter and your internal IT infrastructure in order to determine your current security posture. Progent can also assist you to harden your existing network security and can help you to plan and implement a unified cybersecurity ecosystem that streamlines management and delivers maximum protection for on-prem, cloud-based, and perimeter IT resources. To learn additional details about Progent's threat assessment solutions powered by on NodeZero's penetration test platform, visit Consulting Support for NodeZero's Penetration Test Platform.
- Stealth Penetration Testing
Progent can manage in-depth network penetration testing without the knowledge of internal network managers. Unannounced Penetration Testing uncovers whether in-place network security monitoring mechanisms such as penetration detection alarms and event log monitoring are properly configured and actively managed. Progent security experts can use a number of hacker tools to expand security holes to gain an understanding of the full network and detect how many internal systems can be accessed and exploited. This type of vulnerability testing can expose the entire extent of the security flaws of a network.
- Network Security Evaluation Consulting
Progent's advanced security audit and compliance testing services can help your company to validate your operations and policies and check your network environment to allow your company to design the highest degree of security into your information system. Progent's certified security consultants can also test your web-based business applications for security vulnerability and can conduct company-wide security audits to verify your compliance with major security standards including HIPAA, NIST, and ISO.
ProSight Flat-rate Managed Services for Information Assurance
Progent's value-priced ProSight family of network management outsourcing services is intended to provide small and mid-size businesses with enterprise-class support and cutting-edge technology for all facets of information assurance and compliance. Managed services offered by Progent include:
- ProSight Active Security Monitoring (ASM): Next Generation Endpoint Protection and Ransomware Defense
ProSight Active Security Monitoring (ASM) is an endpoint protection solution that utilizes SentinelOne's next generation behavior-based analysis tools to defend endpoint devices as well as servers and VMs against new malware assaults such as ransomware and file-less exploits, which easily escape legacy signature-based anti-virus products. ProSight Active Security Monitoring safeguards on-premises and cloud-based resources and offers a unified platform to manage the entire malware attack progression including protection, detection, containment, cleanup, and forensics. Key features include one-click rollback using Windows Volume Shadow Copy Service and real-time system-wide immunization against new threats. Progent is a SentinelOne Partner, dealer, and integrator. Learn more about Progent's ProSight Active Security Monitoring endpoint protection and ransomware recovery with SentinelOne technology.
- ProSight Enhanced Security Protection: Unified Physical and Virtual Endpoint Protection
Progent's ProSight Enhanced Security Protection services offer affordable multi-layer protection for physical and virtual servers, desktops, mobile devices, and Microsoft Exchange. ProSight ESP uses contextual security and modern behavior analysis for continuously monitoring and reacting to cyber assaults from all vectors. ProSight ESP provides two-way firewall protection, penetration alerts, endpoint management, and web filtering via cutting-edge technologies incorporated within a single agent managed from a unified control. Progent's security and virtualization consultants can help your business to design and configure a ProSight ESP deployment that addresses your company's unique needs and that helps you achieve and demonstrate compliance with legal and industry information security regulations. Progent will assist you define and implement security policies that ProSight ESP will enforce, and Progent will monitor your network and respond to alerts that require urgent attention. Progent's consultants can also help your company to set up and test a backup and disaster recovery solution such as ProSight Data Protection Services (DPS) so you can get back in business rapidly from a potentially disastrous cyber attack like ransomware. Learn more about Progent's ProSight Enhanced Security Protection unified endpoint security and Microsoft Exchange filtering.
- ProSight DPS: Managed Backup
Progent has partnered with leading backup/restore technology companies to create ProSight Data Protection Services, a family of management offerings that deliver backup-as-a-service. All ProSight DPS services automate and track your data backup operations and enable non-disruptive backup and fast restoration of critical files/folders, apps, images, and virtual machines. ProSight DPS lets your business protect against data loss caused by equipment breakdown, natural calamities, fire, malware like ransomware, human error, ill-intentioned insiders, or application bugs. Managed services available in the ProSight Data Protection product line include ProSight Altaro VM Backup, ProSight 365 Total Backup (formerly Altaro Office 365 Backup), ProSight DPS ECHO Backup using Barracuda dedicated hardware, and ProSight DPS MSP360 Cloud and On-prem Backup. Your Progent consultant can help you to identify which of these fully managed backup services are most appropriate for your IT environment.
- ProSight Email Guard: Inbound and Outbound Spam Filtering, Data Leakage Protection and Email Encryption
ProSight Email Guard is Progent's email filtering and encryption platform that uses the technology of top information security companies to deliver web-based management and world-class protection for your inbound and outbound email. The powerful architecture of Email Guard managed service integrates cloud-based filtering with an on-premises security gateway appliance to offer advanced protection against spam, viruses, Denial of Service Attacks, DHAs, and other email-based malware. The Cloud Protection Layer serves as a first line of defense and keeps most threats from making it to your security perimeter. This reduces your vulnerability to inbound attacks and saves network bandwidth and storage space. Email Guard's on-premises gateway device provides a further layer of analysis for inbound email. For outbound email, the on-premises gateway provides anti-virus and anti-spam protection, protection against data leaks, and encryption. The onsite gateway can also help Exchange Server to monitor and safeguard internal email traffic that stays inside your corporate firewall. Find out more about Progent's ProSight Email Guard spam filtering, virus blocking, email content filtering and data loss protection.
- ProSight WAN Watch: Infrastructure Management
ProSight WAN Watch is an infrastructure monitoring and management service that makes it simple and inexpensive for small and mid-sized businesses to map, monitor, reconfigure and troubleshoot their networking appliances like routers, firewalls, and wireless controllers plus servers, client computers and other devices. Using cutting-edge RMM technology, WAN Watch ensures that infrastructure topology diagrams are always current, copies and displays the configuration of almost all devices connected to your network, monitors performance, and generates alerts when issues are discovered. By automating complex management processes, WAN Watch can knock hours off common chores such as network mapping, reconfiguring your network, finding appliances that require important updates, or isolating performance problems. Learn more details about ProSight WAN Watch network infrastructure monitoring and management consulting.
- ProSight LAN Watch: Server and Desktop Monitoring and Management
ProSight LAN Watch is Progent's server and desktop monitoring service that incorporates state-of-the-art remote monitoring and management (RMM) technology to keep your network running at peak levels by checking the health of vital computers that drive your business network. When ProSight LAN Watch uncovers an issue, an alarm is sent immediately to your specified IT staff and your assigned Progent engineering consultant so that all potential issues can be addressed before they have a chance to disrupt your network Learn more about ProSight LAN Watch server and desktop remote monitoring services.
- ProSight Virtual Hosting: Hosted VMs at Progent's World-class Data Center
With ProSight Virtual Hosting service, a small business can have its critical servers and applications hosted in a protected fault tolerant data center on a high-performance virtual machine host configured and managed by Progent's network support professionals. With the ProSight Virtual Hosting service model, the client owns the data, the OS platforms, and the apps. Because the system is virtualized, it can be ported easily to an alternate hardware solution without a time-consuming and difficult configuration process. With ProSight Virtual Hosting, you are not locked into a single hosting service. Find out more details about ProSight Virtual Hosting services.
- ProSight IT Asset Management: Network Infrastructure Documentation Management
ProSight IT Asset Management service is a cloud-based IT documentation management service that makes it easy to capture, maintain, find and safeguard information about your IT infrastructure, processes, business apps, and services. You can instantly locate passwords or IP addresses and be warned automatically about upcoming expirations of SSL certificates or warranties. By updating and organizing your network documentation, you can save up to 50% of time thrown away looking for critical information about your network. ProSight IT Asset Management includes a centralized location for storing and sharing all documents required for managing your network infrastructure like standard operating procedures (SOPs) and How-To's. ProSight IT Asset Management also offers a high level of automation for gathering and relating IT data. Whether you're making improvements, doing regular maintenance, or reacting to a crisis, ProSight IT Asset Management gets you the knowledge you need as soon as you need it. Learn more details about Progent's ProSight IT Asset Management service.
- Progent's Patch Management: Software/Firmware Update Management Services
Progent's support services for software and firmware patch management provide organizations of any size a flexible and affordable alternative for assessing, testing, scheduling, implementing, and tracking software and firmware updates to your dynamic IT system. In addition to optimizing the protection and functionality of your computer environment, Progent's software/firmware update management services allow your IT staff to focus on more strategic initiatives and tasks that deliver the highest business value from your information network. Find out more about Progent's patch management support services.
- ProSight Duo Two-Factor Authentication: ID Confirmation, Endpoint Policy Enforcement, and Secure Single Sign-on
Progent's Duo authentication managed services utilize Cisco's Duo technology to defend against stolen passwords through the use of two-factor authentication. Duo enables one-tap identity verification on iOS, Android, and other personal devices. With 2FA, whenever you sign into a secured online account and give your password you are asked to verify who you are via a unit that only you possess and that uses a different ("out-of-band") network channel. A wide range of out-of-band devices can be used as this added means of ID validation including a smartphone or watch, a hardware token, a landline telephone, etc. You can designate several validation devices. To find out more about Duo two-factor identity validation services, see Cisco Duo MFA two-factor authentication services.
ProSight Network Audits
Progent's ProSight Network Audits are a fast and low-cost alternative for small and mid-size organizations to obtain an unbiased assessment of the overall health of their IT system. Powered by a selection of the leading remote monitoring and management platforms in the industry, and supervised by Progent's world-class group of information technology experts, ProSight Network Audits show you how well the deployment of your core network assets adhere to leading practices. Both the Basic and Advanced versions of ProSight Network Audit services are offered at a budget-friendly, one-time cost and provide instant benefits such as a cleaner Active Directory (AD) system. Both also include a year of advanced remote network monitoring and management. Advantages can include simpler management, better compliance with information security regulations, more efficient utilization of network resources, quicker problem resolution, more reliable backup and recovery, and higher availability. Learn more about ProSight Network Audits network infrastructure review.
The ProSight Ransomware Preparedness Report Service
Progent's ProSight Ransomware Preparedness Report service is a low-cost service based on a phone discussion with a Progent backup/recovery expert. The interview is designed to help assess your company's ability to block or recover rapidly following an attack by a ransomware strain such as Ryuk, WannaCry, NotPetya, or Hermes. Progent will consult with you directly to gather information about your existing AV defense and backup system, and Progent will then produce a custom Basic Security and Best Practices Report describing how you can apply best practices to create a cost-effective security and backup system that meets your company's needs. For additional information, visit Progent's ProSight Ransomware Preparedness Report Service.
Contact Progent for Network Security Auditing
For more information concerning Progent's computer security inventory packages, phone Progent at 800-993-9400 or go to Contact Progent.
Ransomware 24x7 Hot Line: Call 800-462-8800
Progent's Ransomware 24x7 Hot Line is intended to assist organizations to carry out the time-critical first step in mitigating a ransomware attack by stopping the bleeding. Progent's remote ransomware engineer can assist you to identify and quarantine breached servers and endpoints and guard undamaged assets from being penetrated. If your network has been penetrated by any version of ransomware, don't panic. Get immediate help by calling Progent's Ransomware Hot Line at 800-462-8800. For more information, see Progent's Ransomware 24x7 Hot Line.