Overview of Progent's Security and Compliance Consulting Services
Progent's industry certified network security experts can provide a broad selection of services designed to help businesses of any size to identify and eliminate security vulnerabilities, defend against assaults, remediate the problems resulting from a breakdown of protection, and comply with government requirements for protecting data and reporting incidents. Progent offers a selection of service delivery modes:

  • As-needed online and on-premises support invoiced by the minute
  • On-going fully managed services invoiced at a low fixed monthly rate
  • Value-priced service bundles for a single security and compliance assessment
On-demand Security and Compliance Support Services
Once you register for Progent's services (registration is free), you can receive as-needed remote or onsite support from one of Progent security and compliance consultant. This classic service model is primarily reactive and geared toward quickly resolving IT problems that are impacting your network or that have stymied your own support staff. Typical scenarios are replacing a firewall appliance or VPN tunnel, implementing a vital security update for a Cisco switch, setting up secure access to cloud-based resources, or restoring data after a ransomware attack. These security services are invoiced by the minute, which eliminates the annoying case of receiving large bills for quick fixes.

Delivery alternatives for Progent's as-needed support include:

  • Online Security Support
    Most security problems can be handled remotely through a combination of phone support and an Internet connection between Progent's Technical Response Center (TRC) and a customer's network. Progent's TRC group can deliver remote security support by offering easy access to consultants with the background and resources to resolve many of the most challenging issues quickly, making your service costs affordable and minimizing downtime.
  • Onsite Security Support Services
    For instances where onsite assistance is necessary, Progent can send a technical expert to major metropolitan areas across the United States. Progent can also dispatch a security specialist with top certifications and world-class skills to any site in the U.S.
Progent's accredited security engineers are qualified to support environments powered by Microsoft, Linux, Macintosh, Sun Solaris, and major derivatives of UNIX. Progent's broad range of consulting services addresses firewall configuration, email systems, secure network design, and information recovery. Progent's technical support team has been awarded the industry's most advanced security credentials including Certified Information Systems Auditor (CISA) and Certified Information Systems Security Professional. Progent also offers immediate access to online Cisco CCIE network infrastructure engineers who can deliver advanced assistance with tough network configuration problems.

Progent's Flat-rate Managed Services for Information Assurance
Progent offers a collection of low-cost, set-price monthly managed services designed to provide small and mid-size organizations with enterprise-class support and state-of-the-art technology for all aspects of information assurance and compliance. Managed services offered by Progent include:

  • ProSight Email Guard: Inbound and Outbound Spam Filtering, Data Leakage Protection and Email Encryption
    ProSight Email Guard is Progent's email security platform that uses the services and infrastructure of top information security vendors to deliver centralized management and comprehensive protection for your email traffic. The powerful structure of Progent's Email Guard integrates a Cloud Protection Layer with a local security gateway appliance to offer complete protection against spam, viruses, Denial of Service (DoS) Attacks, Directory Harvest Attacks, and other email-based threats. Email Guard's cloud filter acts as a first line of defense and blocks most unwanted email from reaching your security perimeter. This reduces your exposure to external threats and conserves network bandwidth and storage. Email Guard's onsite security gateway appliance adds a deeper layer of analysis for incoming email. For outbound email, the onsite security gateway offers AV and anti-spam filtering, policy-based Data Loss Prevention, and email encryption. The onsite gateway can also help Exchange Server to track and safeguard internal email that stays inside your security perimeter. Learn more about Progent's ProSight Email Guard spam filtering, virus defense, content filtering and data leakage prevention.

  • ProSight Active Security Monitoring (ASM): Endpoint Protection and Ransomware Defense
    ProSight Active Security Monitoring (ASM) is an endpoint protection (EPP) solution that utilizes cutting edge behavior-based analysis technology to defend endpoint devices and servers and VMs against modern malware attacks such as ransomware and email phishing, which routinely evade legacy signature-based AV tools. ProSight ASM protects local and cloud-based resources and provides a unified platform to automate the complete malware attack progression including protection, infiltration detection, mitigation, remediation, and post-attack forensics. Key features include single-click rollback with Windows Volume Shadow Copy Service (VSS) and automatic network-wide immunization against newly discovered attacks. Find out more about Progent's ProSight Active Security Monitoring (ASM) next-generation endpoint protection and ransomware recovery.

  • ProSight Data Protection Services: Managed Backup
    ProSight Data Protection Services offer small and mid-sized businesses an affordable and fully managed service for secure backup/disaster recovery. For a low monthly price, ProSight DPS automates and monitors your backup activities and allows fast recovery of critical files, applications and VMs that have become unavailable or damaged as a result of component breakdowns, software glitches, natural disasters, human error, or malicious attacks such as ransomware. ProSight Data Protection Services can help you back up, retrieve and restore files, folders, apps, system images, plus Hyper-V and VMware images. Important data can be protected on the cloud, to a local storage device, or mirrored to both. Progent's BDR specialists can provide advanced expertise to set up ProSight Data Protection Services to be compliant with government and industry regulatory standards such as HIPPA, FIRPA, PCI and Safe Harbor and, whenever necessary, can help you to recover your business-critical data. Find out more about ProSight Data Protection Services managed backup.

  • ProSight WAN Watch: Infrastructure Management
    ProSight WAN Watch is an infrastructure monitoring and management service that makes it simple and inexpensive for small and mid-sized organizations to diagram, track, reconfigure and troubleshoot their networking hardware like switches, firewalls, and access points plus servers, printers, endpoints and other devices. Incorporating state-of-the-art Remote Monitoring and Management technology, ProSight WAN Watch makes sure that network maps are always current, copies and displays the configuration information of almost all devices on your network, tracks performance, and generates alerts when problems are discovered. By automating complex management activities, WAN Watch can cut hours off ordinary tasks like network mapping, expanding your network, locating devices that need important updates, or identifying the cause of performance bottlenecks. Learn more about ProSight WAN Watch infrastructure management consulting.

  • ProSight Systems Watch: Server and Desktop Monitoring
    ProSight Systems Watch is Progentís server and desktop and management service that incorporates state-of-the-art remote monitoring and management (RMM) techniques to help keep your IT system running efficiently by tracking the health of critical assets that drive your information system. When ProSight Systems Watch uncovers an issue, an alert is transmitted automatically to your specified IT staff and your assigned Progent engineering consultant so that any looming problems can be addressed before they have a chance to disrupt productivity Find out more about ProSight Systems Watch server and desktop automated management consulting.
Flat-rate Security Evaluation and Validation Bundles
Progent has put together a portfolio of set-price security and compliance evaluation packages that provide high value by utilizing Progent's enterprise-class system monitoring and analysis tools as well as Progent's consulting experience to produce an objective and comprehensive evaluation of your IT environment security profile.
  • Security Assessment Service Bundles for Small Businesses
    Progent offers two ultra-affordable security inventory service packages intended to enable small businesses to obtain an objective security assessment from a certified security consultant. With Progent's External Security Inventory Scan, an engineer manages an extensive examination of your network from outside your corporate firewall to identify potential risks in the security profile you present to the public. With Progent's Internal Security Inventory Scan, a certified security expert executes a network scan using an authorized machine within your firewalled perimeter to evaluate your exposure to internal attacks. The two security inventory services are set up and run from a secured offsite location. The project is managed by an engineer who has been awarded advanced security certifications and who produces a report that details and interprets the information collected by the scan and recommend various improvements where required.
  • Security Vulnerability Evaluation Packages for Enterprises
    Progent has developed three levels of fixed-price security assessment service packages intended for enterprises who need to meet security standards required by government or industry agencies. Progent's security assessment service packages offer enterprises a chance to get an objective assessment at the strength of their security profile. For each security evaluation bundle, Progent engineers with advanced security credentials analyze and report on collected data and provide suggestions for efficient improvements. Each of the network security assessment bundles include an added-cost option for on-premises engineers anywhere in the United States.
  • Stealth Penetration Testing Services
    Stealth penetration testing, commonly referred to as PEN testing, is a critical tool for allowing organizations to find out how open their IT systems are to modern threats. Progent's stealth penetration testing test how effectively your existing security policies and technologies stand up to authorized but unannounced intrusion attempts managed by Progent's experienced security specialists using cutting-edge hacking techniques. Read about Progent's stealth penetration testing (PEN Test) services.
We've Been Hacked: What Can We Do Now?
Network Security ConsultantsIf your business is currently fighting a security crisis and you do not have a detailed recovery plan, refer to Progent's Remote Technical Support to find out how to receive immediate assistance. Progent provides online technical support from skilled network technicians and can refer trouble tickets to certified security specialists if required. Your organization does not need to be a registered Progent customer to get urgent support for a security breach, but you can register as a Progent client in advance for free and your standing as a current customer could save valuable time in a crisis.

Typically, smaller companies have not documented a response plan in the event of a successful security breach. This is risky, since the cost of a successful security assault can be more catastrophic for a small business than for a large enterprise. Progent's security consultants can help your company to create an effective response and incident reporting plan that reduces the network downtime resulting from an attack. The step-by-step incident handling procedure outlined by GIAC is Progent's preferred method for handling a serious security penetration.

Advanced Security Expertise Available from Progent
Progent's certified security engineers can provide advanced support in vital areas of IT security such as:

  • Information Risk Evaluation and Security Compliance Assessment
    Progent offers experience with information risk evaluation utilities such as MS Baseline Security Analyzer or LANguard from GFI for conducting a set of comprehensive system scans to identify possible security holes. Progent has broad experience with these and similar utilities and can help you to analyze assessment reports and react appropriately. Progent's certified security consultants also can perform web application validation and can conduct thorough evaluation of corporate-wide security to validate your organization's compliance with important industry security specifications such as HIPAA, NIST, and ISO. In addition, Progent can assess the strength of your wireless security including stationary wireless appliances plus portable handsets. Find out more information concerning Progent's Vulnerability Audits and Compliance Testing.
  • Designing, Implementing, and Testing Protected Networks
    Any organization ought to develop a thoroughly considered security plan that includes both proactive and responsive activity. The pre-attack strategy is a set of precautions that works to minimize vulnerabilities. The post-attack strategy defines procedures to assist IT personnel to assess the damage caused by an attack, repair the damage, document the experience, and revive business activity as soon as feasible. Progent can advise you how to incorporate security into your business operations, install scanning software, create and execute a secure computer architecture, and recommend processes and policies to maximize the protection of your network. Progent's security professionals are available to help you to set up a firewall, deploy protected remote connectivity to e-mail and data, and install an efficient virtual private network (VPN). If you are looking for an economical way for jobbing out your network security administration, Progent's Round-the-clock Monitoring Packages include continual online system monitoring and immediate resolution of emergencies.
  • System Recovery and Failure Analysis
    Progent offers skill in recovering systems and servers that have been compromised, are suspect, or have ceased to function because of a security attack. Progent can help determine the damage resulting from the breach, restore ordinary business operations, and recover information compromised as a result of the breach. Progent's certified engineers can also perform a comprehensive failure evaluation by examining event logs and utilizing a variety of proven forensics techniques. Progent's experience with security problems minimizes your off-air time and permits Progent to suggest efficient measures to prevent or mitigate new assaults.
  • Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Firewalls, and PIX 500 Security Appliances Configuration and Troubleshooting
    Cisco Certified CCIE Security ConsultantsThe latest generation of Cisco ASA 5500-X Series of firewalls with Firepower Services offer significantly more performance than Cisco's previous firewalls and have replaced the ASA 5500 and PIX security appliances for new deployments. Since Cisco's acquisition of Sourcefire, the whole line of ASA 5500-X devices can be configured to enable Firepower Services, based on Sourcefire's Snort product, which is the market's most deployed network intrusion protection system. Firepower services bring powerful new capabilities such as advanced malware protection (AMP), URL filtering, real-time threat analytics, and security automation. Progent's Cisco-certified CCIE network experts can assist your company to maintain your existing PIX or Cisco ASA 5500 firewalls or upgrade efficiently to Cisco ASA 5500-X firewalls with Firepower Services. Progent's consultants can provide remote and on-premises support for ASA 5500-X firewalls with Firepower Services and can assist your company to design, configure, optimize, administer and troubleshoot firewall solutions built on Cisco ASA 5500-X firewalls with Firepower Services. Learn more information about ASA Firewalls with Firepower integration and troubleshooting services.
  • Other Firewall and VPN Solutions
    As well as being expert in a broad range of network security technologies available from Microsoft and Cisco, Progent offers small and mid-size organizations expert consulting for security products from other important firewall and Virtual Private Network suppliers such as:
  • SIEM Security Information and Event Management Solutions
    Security information and event management (SIEM) software and services are designed to make sense the enormous quantity of information represented by security event logs generated by multiple sources including network appliances, operating systems, and application software and monitoring tools. SIEM software organizes the security event records from these various sources and produces consolidated reports of security events as mandated by government regulations and industry compliance standards. Progent's GIAC-certified information assurance experts and Cisco-certified network infrastructure consultants can assist businesses to design, install and operate a SIEM solution that enables them to understand the behavior of attacks and comply with event reporting requirements. (Visit Progent's Security information and Event Management (SIEM) solutions.)
Progent's Security Certifications
Progent's security professionals have earned some of the most prestigious certifications available in the security industry. These accreditations require extensive examinations and proven field experience to guarantee that recipients have acquired expertise with a significant amount of security information and methodologies and can offer advanced security solutions to information environments of any size.
  • Certified Information Security Manager Security Support Services
    Certified Information Security Manager (CISM) identifies the basic competencies and worldwide standards of performance that information technology security professionals are required to master. It provides executive management the confidence that consultants who have been awarded their CISM have the background and skill to provide effective security management and engineering support. Progent can offer a CISM-certified support professional to assist your organization in critical security disciplines including information security governance, risk management, data protection program management, and crisis response management. Find out more details about Progent's Certified Information Security Manager Security Support Services.

  • Certified Information Systems Security Professionals (CISSP) Security Consulting Services
    Progent's Certified Information Systems Security Professionals (CISSPs) are security specialists who have been awarded CISSP status as a result of demonstrated professional work, rigorous study, and formal testing. CISSP qualification recognizes expertise in an international standard for information security. American National Standards Institute has given the CISSP credential official recognition in the field of information security under ISO/IEC 17024. Areas of knowledge included under CISSP include security management practices, security architecture and models, connection permission systems, applications development security, operations security, hardware security, encryption, telecommunications, network security, and business continuity planning. Get more details about Progent's Certified Information Systems Security Professionals (CISSP) Consulting Services.

  • ISSAP Engineering Support
    Progent's ISSAP qualified security experts are experts who have been awarded ISSAP certification following thorough examination and significant experience. field experience with network security design. ISSAP security experts have comprehensive knowledge of access management mechanisms and methodologies, phone system and network infrastructure protection, cryptography, needs evaluation, BCP and disaster recovery, and physical security integration. Progent's ISSAP-certified security specialists can assist your company with all aspects of architecture security. Learn the details concerning Progent's ISSAP Certified Protected IT Architecture Engineering Services.

  • Certified Information Systems Auditor Professional Expertise
    The CISA accreditation is a prestigious qualification that represents mastery in information system security audit and control. Accredited by the American National Standards Institute, the CISA credential has candidates undergo a comprehensive test given by the ISACA professional association. Progent can provide the services of a CISA-certified security audit professional able to help businesses in the areas of information systems audit process, information technology administration, network assets and architecture lifecycle, IT support, safeguarding data resources, and disaster recovery preparedness. Get the details concerning Progent's Certified Information Systems Auditor Professional Assistance.

  • Global Information Assurance Certification Consulting Expertise
    GIAC (Global Information Assurance Certification) was founded in 1999 to certify the skill of information technology security engineers. GIAC's goal is to assure that a certified security consultant has the knowledge needed to provide support in vital areas of network, information, and software security. GIAC accreditations are recognized by companies and institutions throughout the world including and the United States NSA. Progent can provide the assistance of GIAC certified security engineers for any of the security capabilities covered under GIAC accreditation programs including auditing perimeters, incident response, traffic analysis, and web-based application security. Get additional information concerning Progent's GIAC Consulting Assistance.
Contact Progent for Computer Security Expertise
If you want security expertise, call Progent at 800-993-9400 or refer to Contact Progent.
















© 2002- 2018 Progent Corporation. All rights reserved.