Introduction to Progent's Security Consulting Services
Progent's industry certified computer security and compliance professionals can provide a broad selection of services designed to assist companies of all sizes to uncover and correct security vulnerabilities, defend against malicious attacks, remediate the problems caused by a breakdown of security, and meet government requirements for protecting data and reporting incidents. Progent offers a choice of service models:

  • As-needed remote and on-site assistance invoiced to the nearest minute
  • On-going managed services billed at an affordable flat monthly fee
  • Set-price service packages for a single security and compliance assessment
On-demand Security and Compliance Consulting Services
After you register for Progent's services (signing up is free), you can get as-needed online or onsite assistance from one of Progent security and compliance consultant. This traditional support model is primarily reactive and geared toward quickly taking care of technical problems that are disrupting your productivity or that have stumped your in-house support personnel. Typical scenarios are debugging a firewall or VPN tunnel, installing a critical security patch for a Cisco switch or router, setting up secure access to cloud-based resources, or restoring data after a ransomware attack. These services are billed by the minute, which eliminates the annoying situation of getting big invoices for quick repairs.

Delivery options for Progent's on-demand support services include:

  • Remote Security Services
    Most security issues can be resolved remotely via a mix of phone-based help and a remote connection between Progent's Technical Response Center (TRC) and a customer's network. Progent's Technical Response Center can deliver remote security support by offering efficient access to consultants who have the background and technical resources to fix some of the most difficult problems quickly, keeping your service expenses low and reducing lost productivity.
  • On-premises Security Support
    For instances where on-premises assistance is necessary, Progent can dispatch a technical expert to major metropolitan areas throughout the United States. Progent can also send a security specialist with high-level certifications and world-class skills to any location in the U.S.
Progent's security engineers are qualified to support environments based on Microsoft Windows, Linux, Apple Mac, Solaris, and popular derivatives of UNIX. Progent's wide range of consulting services addresses firewall expertise, e-mail systems, protected network design, and information restoration. Progent's support team has earned the industry's top security accreditations including Certified Information Systems Auditor and Information System Security Architecture Professional (ISSAP). Progent also offers fast access to online Cisco CCIE network infrastructure consultants who can provide advanced support with tough network integration issues.

ProSight Flat-rate Managed Services for Information Assurance
Progent's value-priced ProSight series of managed services is designed to provide small and mid-size businesses with enterprise-class support and state-of-the-art technology for all aspects of information assurance and compliance. ProSight managed services offered by Progent include:

  • ProSight Active Security Monitoring: Next Generation Endpoint Protection and Ransomware Defense
    Progent's ProSight Active Security Monitoring (ASM) is an endpoint protection (EPP) service that utilizes next generation behavior-based machine learning technology to guard endpoint devices and physical and virtual servers against modern malware attacks such as ransomware and file-less exploits, which easily evade legacy signature-based anti-virus tools. ProSight Active Security Monitoring safeguards local and cloud resources and offers a unified platform to automate the complete malware attack lifecycle including protection, infiltration detection, containment, cleanup, and post-attack forensics. Key capabilities include one-click rollback using Windows VSS and automatic system-wide immunization against newly discovered threats. Find out more about Progent's ProSight Active Security Monitoring next-generation endpoint protection and ransomware recovery.

  • ProSight Enhanced Security Protection (ESP): Unified Endpoint Security
    ProSight Enhanced Security Protection managed services offer affordable multi-layer security for physical servers and VMs, workstations, mobile devices, and Exchange Server. ProSight ESP utilizes contextual security and advanced machine learning for continuously monitoring and reacting to cyber assaults from all attack vectors. ProSight ESP delivers firewall protection, intrusion alarms, endpoint management, and web filtering via leading-edge tools packaged within a single agent accessible from a unified console. Progent's security and virtualization consultants can help your business to design and configure a ProSight ESP deployment that meets your organization's specific needs and that helps you demonstrate compliance with legal and industry data security standards. Progent will assist you define and configure policies that ProSight ESP will manage, and Progent will monitor your IT environment and react to alerts that require immediate action. Progent can also assist you to install and verify a backup and disaster recovery solution like ProSight Data Protection Services (DPS) so you can recover rapidly from a potentially disastrous security attack like ransomware. Find out more about Progent's ProSight Enhanced Security Protection unified physical and virtual endpoint security and Microsoft Exchange filtering.

  • ProSight DPS: Managed Cloud Backup and Recovery
    ProSight Data Protection Services from Progent provide small and mid-sized organizations an affordable and fully managed solution for secure backup/disaster recovery. For a fixed monthly cost, ProSight DPS automates your backup activities and allows rapid recovery of vital files, apps and VMs that have become unavailable or corrupted due to hardware breakdowns, software bugs, disasters, human error, or malicious attacks like ransomware. ProSight Data Protection Services can help you protect, retrieve and restore files, folders, apps, system images, plus Hyper-V and VMware images. Important data can be protected on the cloud, to an on-promises device, or to both. Progent's backup and recovery consultants can deliver advanced expertise to configure ProSight Data Protection Services to be compliant with regulatory standards like HIPPA, FIRPA, and PCI and, when needed, can help you to recover your critical data. Learn more about ProSight DPS Managed Backup and Recovery.

  • ProSight Email Guard: Spam Filtering, Data Leakage Protection and Email Encryption
    ProSight Email Guard is Progent's email security solution that uses the services and infrastructure of top information security vendors to deliver centralized control and comprehensive security for your inbound and outbound email. The powerful structure of Progent's Email Guard managed service integrates a Cloud Protection Layer with an on-premises gateway device to offer complete defense against spam, viruses, Denial of Service (DoS) Attacks, Directory Harvest Attacks, and other email-based threats. Email Guard's cloud filter serves as a preliminary barricade and blocks the vast majority of threats from reaching your network firewall. This reduces your exposure to inbound attacks and saves network bandwidth and storage. Email Guard's on-premises gateway appliance adds a deeper layer of analysis for incoming email. For outbound email, the on-premises gateway provides anti-virus and anti-spam protection, DLP, and email encryption. The on-premises security gateway can also help Microsoft Exchange Server to track and protect internal email traffic that originates and ends inside your corporate firewall. Learn more about Progent's ProSight Email Guard spam filtering, virus blocking, content filtering and data leakage protection.

  • ProSight WAN Watch: Network Infrastructure Management
    ProSight WAN Watch is an infrastructure monitoring and management service that makes it simple and inexpensive for small and mid-sized businesses to map, track, optimize and troubleshoot their connectivity appliances such as routers, firewalls, and wireless controllers plus servers, printers, client computers and other devices. Using cutting-edge Remote Monitoring and Management (RMM) technology, ProSight WAN Watch ensures that network diagrams are kept current, copies and displays the configuration of virtually all devices on your network, tracks performance, and generates alerts when problems are discovered. By automating time-consuming network management activities, WAN Watch can cut hours off common tasks such as making network diagrams, reconfiguring your network, finding devices that require critical updates, or identifying the cause of performance problems. Find out more details about ProSight WAN Watch network infrastructure management services.

  • ProSight LAN Watch: Server and Desktop Monitoring
    ProSight LAN Watch is Progentís server and desktop remote monitoring managed service that uses state-of-the-art remote monitoring and management technology to keep your IT system operating at peak levels by tracking the state of vital assets that power your information system. When ProSight LAN Watch uncovers an issue, an alert is sent immediately to your designated IT personnel and your assigned Progent consultant so that all looming issues can be addressed before they can impact your network Learn more details about ProSight LAN Watch server and desktop remote monitoring services.

  • ProSight Virtual Hosting: Hosted Virtual Machines at Progent's World-class Data Center
    With Progent's ProSight Virtual Hosting service, a small business can have its critical servers and applications hosted in a protected fault tolerant data center on a fast virtual host set up and managed by Progent's network support experts. Under Progent's ProSight Virtual Hosting model, the client retains ownership of the data, the operating system software, and the apps. Since the environment is virtualized, it can be ported easily to a different hosting environment without requiring a lengthy and technically risky configuration procedure. With ProSight Virtual Hosting, you are not tied one hosting service. Find out more about ProSight Virtual Hosting services.

  • ProSight IT Asset Management: Network Documentation Management
    ProSight IT Asset Management service is an IT infrastructure documentation management service that makes it easy to create, update, find and protect data about your network infrastructure, procedures, applications, and services. You can quickly find passwords or serial numbers and be alerted automatically about upcoming expirations of SSLs ,domains or warranties. By updating and organizing your network documentation, you can save as much as 50% of time thrown away trying to find critical information about your IT network. ProSight IT Asset Management features a centralized location for storing and collaborating on all documents required for managing your business network like standard operating procedures (SOPs) and How-To's. ProSight IT Asset Management also offers a high level of automation for gathering and relating IT data. Whether youíre making improvements, performing maintenance, or responding to an emergency, ProSight IT Asset Management gets you the information you need as soon as you need it. Learn more details about Progent's ProSight IT Asset Management service.
ProSight Network Audits
Progent's ProSight Network Audits offer a quick and low-cost way for small and medium-size organizations to get an unbiased assessment of the overall health of their information system. Powered by some of the leading remote monitoring and management platforms available, and supervised by Progent's world-class group of IT professionals, ProSight Network Audits help you see how well the deployment of your essential infrastructure devices conform to industry best practices. The Basic and Advanced versions of ProSight Network Audit services are available at a budget-friendly, one-time cost and deliver immediate benefits such as a cleaner Active Directory (AD) environment. Both also come with a year of state-of-the-art remote network monitoring and management. Advantages can include lower-cost network management, better compliance with government and industry security regulations, higher utilization of network resources, quicker problem resolution, more reliable backup and recovery, and increased uptime. Learn more about ProSight Network Audits IT infrastructure assessment.

Progent's ProSight Ransomware Preparedness Report
The ProSight Ransomware Preparedness Report service is an affordable service based on a phone interview with a Progent information assurance consultant. The interview is intended to assess your organization's preparedness either to stop or recover quickly after a ransomware attack. Progent will consult with you directly to collect information concerning your current AV defense and backup platform, and Progent will then produce a written Basic Security and Best Practices Report document describing how you can apply industry best practices to build a cost-effective AV and backup/recovery system that meets your company's needs. For additional information, visit Progent's ProSight Ransomware Preparedness Report Service.

Flat-rate Security Evaluation and Validation Bundles
Progent has put together a variety of fixed-price security assessment bundles that deliver exceptional value by utilizing Progent's enterprise-class system monitoring tools as well as Progent's consulting experience to create an objective and thorough assessment of your network security profile.

  • Security Assessment Service Packages for Small Organizations
    Progent offers two value-priced security inventory scanning service packages intended to allow small organizations to obtain a professional security evaluation from a certified security consultant. With Progent's External Security Inventory Scan, a consultant administers an extensive examination of your network from beyond your firewalled perimeter to identify possible risks in the security posture you expose to the public. With Progent's Internal Security Inventory Scan, a certified security expert runs a network scan using an authorized machine inside your firewalled perimeter to assess your vulnerability to inside threats. These two security inventory scans are configured and executed from a secured external site. The scan is administered by an engineer who has earned high-level security certifications and who produces a document that details and interprets the data captured by the security scan and suggests various improvements where appropriate.
  • Security Vulnerability Assessment Packages for Large Businesses
    Progent offers three levels of fixed-price security evaluation service packages designed for large organizations who need to meet compliance standards required by government or industry agencies. Progent's security assessment service bundles offer enterprises a chance to get a professional look at the strength of their security profile. For each security evaluation package, Progent engineers with advanced security credentials analyze and report on captured data and provide recommendations for cost-effective remediation. Each of the network security audit packages include an extra-cost option for on-premises engineers anywhere in the U.S.
  • Stealth Penetration Testing
    Stealth penetration testing, commonly called PEN testing, is an accepted tool for helping businesses to find out how vulnerable their IT systems are to current-generation threats. Progent's stealth penetration testing services check how effectively your existing security policies and technologies stand up to authorized but unannounced intrusion attempts launched by Progent's experienced security experts utilizing cutting-edge hacking techniques. Find out about Progent's stealth penetration testing (PEN Test) services.
Our Network Has Been Hacked: What Can We Do Now?
Network Security ConsultantsIf your business is currently faced with a network security crisis and you have no detailed recovery procedure, go to Progent's Online Computer Support to learn how to get immediate assistance. Progent offers online technical support from skilled engineers and can refer trouble tickets to certified security experts if required. Your company does not need to be a current Progent customer to receive urgent support for a security breakdown, but you can register as a Progent client ahead of time at no cost and your standing as a registered client could save valuable time during an emergency.

Typically, smaller organizations have not documented a recovery procedure in the event of a successful security breach. This is not good, because the damage from a serious security attack can be more catastrophic for a small company than for a large corporation. Progent's security consultants can assist your you to create a sensible response and event reporting procedure that reduces the network disruption following a security breach. The step-by-step incident handling procedure promoted by GIAC (Global Information Assurance Certification) is Progent's suggested procedure for responding to a major security incident.

High-value Security Services Available from Progent
Progent's certified engineers can provide expertise in vital facets of IT protection such as:

  • Vulnerability Evaluation and Security Compliance Assessment
    Progent provides experience with security auditing utilities like Microsoft Baseline Security Analyzer and LANguard for performing a variety of automatic network scans to uncover possible security holes. Progent has extensive skills with monitoring utilities and can assist you to analyze assessment results and react efficiently. Progent's security engineers also offer web software validation and can conduct expert evaluation of enterprise-wide security to verify your organization's compliance with important industry security standards including HIPAA, PCI, and ISO. Also, Progent can evaluate the strength of your wireless security covering stationary wireless appliances plus portable devices. Get additional details about Progent's Vulnerability Audits and Security Compliance Assessment.
  • Planning, Implementing, and Validating Secure Networks
    Any organization should develop a thoroughly thought out security strategy that includes both preventive and responsive steps. The proactive strategy is a collection of steps that helps to reduce security holes. The reactive strategy specifies activities to help security staff to assess the damage resulting from an attack, repair the damage, record the event, and restore business functions as quickly as possible. Progent can show you how to incorporate security into your company processes, set up scanning software, create and implement a secure IT infrastructure, and propose processes and policies that will maximize the safety of your information system. Progent's security experts are available to help you to configure a firewall, deploy secure offsite connectivity to e-mail and data, and configure an efficient VPN. If you are interested in an economical way for outsourcing your network security management, Progent's Round-the-clock Network Support Services include continual remote network tracking and immediate response to emergencies.
  • Data Recovery and Security Forensics
    Progent has skill in recovering networks and computers that have been compromised, are in question, or have stopped working because of a security breach. Progent can help evaluate the damage resulting from the assault, restore normal functions, and retrieve data compromised owing to the attack. Progent's certified specialists can also perform a comprehensive forensic evaluation by examining event logs and using a variety of advanced forensics tools. Progent's background with security consulting reduces your business disruption and allows Progent to recommend efficient ways to avoid or mitigate future attacks.
  • Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Firewalls, and PIX Security Appliances Integration and Troubleshooting
    Cisco CCIE Security EngineersThe new Cisco ASA 5500-X Family of firewalls with Firepower Services provide substantially more value than Cisco's legacy firewalls and have replaced the ASA 5500 and PIX security appliances for all new deployments. Following Cisco's purchase of Sourcefire, the whole line of Cisco ASA 5500-X devices can be provisioned to enable Firepower Services, based on Sourcefire's Snort product, which is the market's most deployed network intrusion protection system. Firepower services provide powerful new features including advanced malware protection (AMP), URL filtering, dynamic threat analytics, and automation. Progent's Cisco-qualified CCIE network experts can assist your company to maintain your current PIX or Cisco ASA 5500 security appliances or upgrade to Cisco ASA 5500-X firewalls with Firepower Services. Progent's consultants can provide remote and onsite support for ASA 5500-X firewalls with Firepower Services and can help your company to design, integrate, tune, manage and troubleshoot firewall environments built on Cisco ASA 5500-X firewalls with Firepower Services. Find out additional information about ASA 5500-X Firewalls with Firepower Services integration and troubleshooting services.
  • Additional Firewall and Virtual Private Network (VPN) Solutions
    In addition to being expert in a wide range of security technologies from Microsoft and Cisco, Progent can provide small and mid-size businesses expert engineering services for technologies from other popular firewall and Virtual Private Network suppliers including:
  • SIEM Solutions
    Security information and event management (SIEM) applications and services are intended to make sense the massive quantity of information collected in security event records generated by multiple sources including network infrastructure appliances, servers, and application software and monitoring tools. SIEM software organizes the security event records from these diverse sources and produces summary reports of security incidents as mandated by government regulations and business compliance standards. Progent's GIAC-certified information assurance experts and Cisco-certified network infrastructure experts can assist businesses to design, install and manage a SIEM system that helps them to see the progress of security incidents and comply with security incident reporting regulations. (Visit Progent's SIEM solutions.)
Progent's Security Certifications
Progent's security specialists have earned the most prestigious accreditations offered in the industry. All of these certifications require exhaustive examinations and proven work background to guarantee that recipients have acquired expertise with a substantial amount of security information and techniques and can offer advanced security solutions to computer networks of any size.
  • Certified Information Security Manager (CISM) Security Consulting Services
    Certified Information Security Manager defines the basic skills and international benchmarks of service that information security professionals are expected to achieve. CISM offers executive management the assurance that consultants who have been awarded their certification have the background and skill to offer effective security management and engineering services. Progent can offer a CISM-certified support professional to help your organization in vital security disciplines including information protection governance, risk management, information protection process management, and crisis handling support. Find out additional information about Progent's Certified Information Security Manager (CISM) Security Consulting Assistance.

  • CISSP Security Support Services
    Progent's Certified Information Systems Security Professionals (CISSPs) are security specialists who have been awarded CISSP accreditation as a result of demonstrated professional work, rigorous study, and formal testing. CISSP qualification indicates mastery of an international standard for IT security. ANSI has given the CISSP status accreditation in the field of information security under ISO/IEC 17024. Fields of knowledge included within CISSP include security management procedures, security design and models, connection permission methodology, applications development security, business processes security, hardware security, cryptography, communications, Internet security, and disaster recovery planning. Read more information about Progent's CISSP Consulting Assistance.

  • CISSP-ISSAP} Cybersecurity Architecture Consulting Services
    Progent's CISSP-ISSAP qualified cybersecurity architecture experts have been awarded ISSAP accreditation as a result of rigorous examination and extensive experience. field experience with information security design. ISSAP consultants have acquired comprehensive knowledge of access management mechanisms and methodologies, telecommunications and network protection, cryptography, requirements analysis, business continuity planning (BCP) and disaster recovery, and physical security. Progent's CISSP-ISSAP-qualified security experts can help your business with all aspects of architecture security. Find out additional information concerning Progent's ISSAP Certified Protected Network Architecture Consulting Services.

  • CISA Consulting Expertise
    The Certified Information Systems Auditor (CISA) accreditation is a recognized achievement that represents mastery in IS security audit and control. Certified by the American National Standards Institute (ANSI), the CISA accreditation has consultants pass an exhaustive examination administered by the ISACA professional group. Progent offers the expertise of a CISA-certified security audit consultant able to assist businesses in the areas of IS audit process, information technology enforcement, systems and architecture lifecycle, information technology service delivery, safeguarding data resources, and disaster recovery planning. Read additional information about Progent's Certified Information Systems Auditor Consulting Assistance.

  • CRISC Risk Mitigation Specialists
    The CRISC certification program was initiated by ISACA in 2010 to validate an IT professional's skills to design, implement, and maintain information system controls to mitigate network risk. Progent can provide the expertise of a CRISC-certified consultant to help your company to develop and carry out a workplace continuity or disaster recovery strategy that follows industry best practices promoted by CRISC and geared to align with your organization's risk appetite, business goals, and IT budget. Progent's network risk mitigation services are complementary to the support available from Progent's CISA-certified security engineers for impartially evaluating your IS control design and also with the services of Progent's CISM-certified experts for defining security policies and procedures. Find out additional information concerning Progent's CRISC-certified Risk Management Consulting.

  • GIAC Professional Expertise
    GIAC was established in 1999 to certify the skill of network security experts. GIAC's mission is to ensure that an accredited security consultant possesses the knowledge necessary to deliver support in important categories of system, information, and application program security. GIAC accreditations are acknowledged by companies and government organizations throughout the world including and the U.S. NSA. Progent offers the expertise of GIAC certified professionals for all of the network security capabilities covered under GIAC accreditation programs including auditing networks, security incident handling, traffic analysis, and web-based services security. Get more details about Progent's GIAC Professional Services.
Get in Touch with Progent for Computer Security Support
If you're trying to find computer security engineering help, call Progent at 800-993-9400 or see Contact Progent.
















© 2002- 2019 Progent Corporation. All rights reserved.