Introduction to Progent's Security and Compliance Consulting Services
Progent's certified computer security and compliance consultants offer a wide range of services designed to help businesses of all sizes to uncover and eliminate security weaknesses, block attacks, remediate any problems caused by a breakdown of protection, and meet government mandates for guarding data and reporting security incidents. Progent can provide a choice of service modes:

  • As-needed remote and on-premises assistance invoiced to the nearest minute
  • Continual fully managed services invoiced at an affordable flat monthly fee
  • Set-price service packages for a single security assessment
As-needed Security and Compliance Support Services
Once you sign up for Progent's services (signing up is free), you can get on-demand online or onsite support from a Progent security and compliance expert. This traditional service model is essentially reactive and geared toward rapidly taking care of IT issues that are disrupting your productivity or that are beyond the scope of your in-house support staff. Typical scenarios include replacing a firewall appliance or VPN tunnel, installing a critical security patch for a Cisco switch, setting up compliant access to cloud-based resources, or restoring data after a ransomware attack. These security services are invoiced by the minute, which eliminates the annoying situation of receiving big invoices for fast fixes.

Delivery alternatives for Progent's as-needed support include:

  • Online Security Services
    The majority security-related issues can be resolved online through a mix of phone-based support and an connection between Progent's Technical Response Center (TRC) and a customer's computer. Progent's Technical Response Center can deliver remote security support by offering efficient access to consultants who have the background and technical resources to fix some of the most challenging issues quickly, making your service costs low and reducing lost productivity.
  • On-premises Security Services
    For instances where on-premises support is necessary, Progent can dispatch a technical expert to major metropolitan areas across the U.S. Progent can also dispatch a security consultant with top certifications and world-class skills to any location in the U.S.
Progent's accredited security consultants are qualified to provide help for environments based on Microsoft Windows, Linux, Apple Mac, Solaris, and major derivatives of UNIX. Progent's wide selection of services covers firewall configuration, e-mail systems, secure system design, and information restoration. Progent's technical support staff has earned the industry's top security certifications including Certified Information Security Manager and ISSAP. Progent also offers fast access to remote Cisco-certified CCIE network consultants who can deliver advanced assistance with tough network technology problems.

ProSight Low-Cost Managed Services for Information Assurance
Progent's value-priced ProSight portfolio of network management outsourcing services is intended to provide small and mid-size businesses with enterprise-class support and state-of-the-art technology for all aspects of information assurance and compliance. ProSight managed services offered by Progent include:

  • ProSight Email Guard: Inbound and Outbound Spam Filtering, Data Leakage Protection and Content Filtering
    ProSight Email Guard is Progent's email filtering and encryption platform that incorporates the services and infrastructure of top information security vendors to provide web-based management and world-class protection for all your inbound and outbound email. The powerful architecture of Progent's Email Guard integrates a Cloud Protection Layer with an on-premises security gateway device to offer complete defense against spam, viruses, Denial of Service (DoS) Attacks, DHAs, and other email-based threats. Email Guard's cloud filter serves as a preliminary barricade and blocks most unwanted email from reaching your network firewall. This reduces your vulnerability to inbound threats and saves network bandwidth and storage. Email Guard's onsite gateway device provides a deeper layer of inspection for inbound email. For outgoing email, the local security gateway provides anti-virus and anti-spam filtering, protection against data leaks, and encryption. The on-premises security gateway can also assist Microsoft Exchange Server to track and protect internal email traffic that originates and ends within your security perimeter. Learn more about Progent's ProSight Email Guard spam filtering, virus blocking, content filtering and data leakage prevention.

  • ProSight Active Security Monitoring (ASM): Next Generation Endpoint Protection and Ransomware Recovery
    Progent's ProSight Active Security Monitoring is an endpoint protection service that utilizes cutting edge behavior machine learning tools to guard endpoint devices as well as physical and virtual servers against new malware assaults like ransomware and email phishing, which routinely get by traditional signature-based AV products. ProSight ASM protects local and cloud resources and provides a unified platform to address the entire malware attack progression including protection, identification, containment, remediation, and forensics. Top features include one-click rollback with Windows Volume Shadow Copy Service (VSS) and automatic network-wide immunization against new threats. Read more about Progent's ProSight Active Security Monitoring endpoint protection and ransomware recovery.

  • ProSight Data Protection Services: Managed Cloud Backup
    ProSight Data Protection Services offer small and medium-sized organizations a low cost and fully managed solution for secure backup/disaster recovery. Available at a low monthly cost, ProSight Data Protection Services automates your backup activities and allows rapid recovery of vital data, apps and VMs that have become lost or corrupted as a result of component failures, software glitches, natural disasters, human mistakes, or malware attacks like ransomware. ProSight Data Protection Services can help you back up, recover and restore files, folders, applications, system images, plus Microsoft Hyper-V and VMware images. Important data can be protected on the cloud, to a local storage device, or to both. Progent's cloud backup specialists can deliver advanced support to configure ProSight DPS to to comply with regulatory standards such as HIPPA, FIRPA, and PCI and, whenever needed, can help you to recover your business-critical information. Learn more about ProSight DPS Managed Backup.

  • ProSight WAN Watch: Network Infrastructure Management
    Progentís ProSight WAN Watch is a network infrastructure monitoring and management service that makes it easy and inexpensive for smaller businesses to map out, track, optimize and troubleshoot their networking hardware such as switches, firewalls, and access points plus servers, printers, endpoints and other networked devices. Incorporating cutting-edge Remote Monitoring and Management technology, WAN Watch ensures that network diagrams are always current, copies and displays the configuration information of virtually all devices connected to your network, tracks performance, and sends alerts when issues are discovered. By automating complex network management processes, WAN Watch can knock hours off ordinary tasks such as making network diagrams, reconfiguring your network, locating appliances that require critical software patches, or isolating performance issues. Find out more about ProSight WAN Watch network infrastructure monitoring and management consulting.

  • ProSight LAN Watch: Server and Desktop Monitoring and Management
    ProSight LAN Watch is Progentís server and desktop monitoring service that uses advanced remote monitoring and management (RMM) techniques to keep your IT system running efficiently by tracking the state of critical computers that power your business network. When ProSight LAN Watch detects an issue, an alarm is transmitted immediately to your specified IT management personnel and your Progent engineering consultant so that any looming issues can be addressed before they have a chance to impact productivity Find out more about ProSight LAN Watch server and desktop remote monitoring consulting.

  • ProSight Virtual Hosting: Hosted VMs at Progent's Tier III Data Center
    With ProSight Virtual Hosting service, a small or mid-size business can have its critical servers and apps hosted in a protected Tier III data center on a fast virtual machine host set up and managed by Progent's IT support experts. Under the ProSight Virtual Hosting model, the customer retains ownership of the data, the operating system platforms, and the apps. Because the environment is virtualized, it can be moved easily to a different hosting solution without a time-consuming and difficult reinstallation process. With ProSight Virtual Hosting, you are not tied one hosting provider. Learn more details about ProSight Virtual Hosting services.

  • ProSight IT Asset Management: Network Infrastructure Documentation Management
    ProSight IT Asset Management service is a cloud-based IT documentation management service that allows you to create, maintain, retrieve and safeguard information related to your network infrastructure, processes, business apps, and services. You can quickly locate passwords or IP addresses and be alerted about upcoming expirations of SSLs ,domains or warranties. By cleaning up and managing your IT infrastructure documentation, you can save as much as half of time thrown away searching for vital information about your IT network. ProSight IT Asset Management includes a centralized repository for storing and collaborating on all documents related to managing your network infrastructure like standard operating procedures and How-To's. ProSight IT Asset Management also supports a high level of automation for gathering and relating IT data. Whether youíre making enhancements, performing regular maintenance, or responding to an emergency, ProSight IT Asset Management delivers the data you need the instant you need it. Find out more about Progent's ProSight IT Asset Management service.
ProSight Network Audits
Progent's ProSight Network Audits are a fast and low-cost alternative for small and medium-size businesses to get an objective evaluation of the overall health of their IT system. Powered by a selection of the top remote monitoring and management (RMM) platforms in the industry, and overseen by Progent's certified team of information technology experts, ProSight Network Audits help you see how closely the deployment of your essential network devices conform to industry best practices. The Basic and Advanced versions of ProSight Network Audit services are available at a low, one-time cost and deliver immediate benefits like a cleaner Active Directory system. Both versions also include one year of state-of-the-art remote network monitoring and management (RMM). Benefits can include simpler network management, better compliance with data security regulations, higher utilization of network resources, faster troubleshooting, more reliable backup and recovery, and less downtime. Read more information about ProSight Network Audits IT infrastructure assessment.

Set-price Security Assessment and Validation Bundles
Progent offers a number of fixed-price security and compliance assessment packages that deliver high value by utilizing Progent's advanced system monitoring and analysis tools plus Progent's consulting skills to create an unbiased and thorough assessment of your network security profile.

  • Security Assessment Service Packages for Small Organizations
    Progent offers two ultra-affordable security inventory scanning service packages designed to allow small businesses to get an objective security evaluation from a certified security consultant. With Progent's External Security Inventory Scan, a consultant manages a comprehensive assessment of your IT system from outside your firewalled perimeter to identify potential risks in the security profile you present to the outside. With Progent's Internal Security Inventory Scan, a certified security consultant runs a system scan using an authorized computer inside your corporate firewall to assess your exposure to inside attacks. The two security inventory services are set up and run from a secured external site. The project is managed by a consultant who has earned advanced security certifications and who creates a report that describes and evaluates the information captured by the scan and recommend various enhancements where appropriate.
  • Security Vulnerability Assessment Packages for Enterprises
    Progent offers three levels of fixed-price security assessment service bundles intended for enterprises who want to meet security standards required by government or industry regulators. Progent's security evaluation service packages offer larger businesses a chance to obtain a professional assessment at the strength of their security profile. For each security assessment bundle, Progent engineers with top security credentials analyze and report on captured data and offer recommendations for cost-effective improvements. Each of the network security audit packages include an added-cost option for onsite engineers at any location in the U.S.
  • Stealth Penetration Testing Services
    Stealth penetration testing, often referred to as PEN testing, is a critical technique for allowing businesses to determine how open their network systems are to modern attacks. Progent's stealth penetration testing test how effectively your corporate security policies and platforms stand up to authorized but unannounced intrusion attempts managed by Progent's veteran security experts using advanced hacking methods. Find out about Progent's stealth penetration testing (PEN Test) services.
We've Been Hacked: What Are We Supposed to Do Now?
Network Security ConsultantsIf your business is currently fighting a security emergency and you do not have a formal recovery plan, refer to Progent's Remote Technical Help to see how to receive immediate help. Progent provides remote help from skilled engineers and can refer problems to certified security specialists if required. Your company does not need to be a current Progent client to get emergency support for a security problem, but you can sign up as a Progent client in advance for free and your status as a registered client could save valuable time in an emergency.

Usually, smaller companies have not documented a response plan in the event of a damaging attack. This is not good, since the damage from a successful security attack can be even more catastrophic for a small company than for a big corporation. Progent's security consultants can help your business to design an efficient response and incident reporting plan that minimizes the network disruption following an attack. The step-by-step post-attack handling model promoted by Global Information Assurance Certification is Progent's suggested procedure for reacting to a serious security attack.

High-value Security Expertise Available from Progent
Progent's veteran engineers can provide world-class consulting in vital areas of network compliance such as:

  • Vulnerability Evaluation and Compliance Assessment
    Progent provides experience with security evaluation software such as MS Baseline Security Analyzer or LANguard for performing a variety of comprehensive system tests to uncover possible security problems. Progent has extensive experience with scanning tools and can help your company to analyze audit results and respond efficiently. Progent's certified security engineers also can perform web application validation and can conduct expert assessments of enterprise-wide security to validate your company's compliance with key worldwide security standards such as HIPAA, NIST, and ISO. Also, Progent can assess the strength of your wireless protection including fixed wireless equipment plus portable handsets. Read more details about Progent's Security Vulnerability Audits and Security Compliance Testing.
  • Designing, Building, and Testing Secure Environments
    Any company should have a carefully thought out security strategy that includes both proactive and responsive activity. The pre-attack strategy is a set of steps that works to reduce vulnerabilities. The post-attack plan defines activities to help IT staff to inventory the losses resulting from a breach, repair the damage, document the experience, and restore business functions as quickly as possible. Progent can show you how to design security into your company operations, set up scanning software, create and build a secure IT architecture, and propose procedures and policies to optimize the safety of your network. Progent's security professionals are available to help you to configure a firewall, design safe offsite connectivity to e-mail and data, and install an efficient virtual private network (VPN). If your company is looking for an economical option for outsourcing your security administration, Progent's Round-the-clock Monitoring Packages include non-stop remote server tracking and immediate resolution of problems.
  • Data Recovery and Security Forensics
    Progent provides expertise in restoring systems and devices that have been compromised, are quarantined, or have failed following a security penetration. Progent can show you how to evaluate the losses caused by the assault, restore ordinary functions, and recover information compromised owing to the assault. Progent's security specialists can also manage a thorough failure evaluation by examining event logs and using a variety of proven forensics techniques. Progent's experience with security issues reduces your off-air time and allows Progent to suggest efficient ways to avoid or contain new attacks.
  • Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Firewalls, and PIX 500 Security Appliances Integration and Debugging
    Cisco Certified CCIE Network Security ConsultantsThe latest generation of Cisco ASA 5500-X Family of firewalls with Firepower Services provide significantly more performance than Cisco's legacy PIX and ASA 5500 firewalls and have superseded the ASA 5500 and PIX security appliances for new installations. Following Cisco's purchase of Sourcefire, the entire family of ASA 5500-X firewalls can be configured to support Firepower Services, based on Sourcefire's Snort technology, which is the world's most popular network intrusion protection system (IPS). Firepower services provide powerful new features such as advanced malware protection (AMP), URL filtering, real-time threat analytics, and automation. Progent's Cisco-qualified CCIE network experts can assist your company to maintain your legacy PIX or ASA 5500 security appliances or upgrade to Cisco ASA 5500-X firewalls with Firepower Services. Progent's consultants offer remote and onsite help with ASA 5500-X firewalls with Firepower Services and can assist you to design, configure, tune, manage and debug firewall environments based around Cisco ASA 5500-X firewalls with Firepower Services. Read additional details about ASA 5500-X Firewalls with Firepower Services configuration and debugging support.
  • Additional Firewall and VPN Technologies
    In addition to supporting a wide range of security solutions from Microsoft and Cisco, Progent can provide small companies top-level consulting for solutions from other popular firewall and Virtual Private Network (VPN) vendors such as:
  • SIEM Integration and Support
    Security information and event management (SIEM) applications and services are intended to make sense the massive quantity of information collected in security incident logs created by a wide range of sources including network infrastructure appliances, operating systems, and applications and tools. SIEM software analyzes the security event records from these various sources and produces summary reports of security events as required by state regulations and industry compliance standards. Progent's GIAC-certified computer security consultants and Cisco-certified network consultants can help organizations to plan, deploy and operate a SIEM solution that helps them to understand the progress of security incidents and comply with security incident reporting regulations. (Visit Progent's SIEM solutions.)
Progent's Security Credentials
Progent's security professionals have earned some of the most prestigious certifications available in the industry. These certifications demand exhaustive examinations and demonstrated field experience to ensure that candidates have acquired expertise with a substantial body of security information and methodologies and can provide advanced solutions to information networks of any complexity.
  • Certified Information Security Manager Security Support Expertise
    Certified Information Security Manager defines the fundamental skills and worldwide benchmarks of performance that IT security managers are expected to achieve. It offers business management the assurance that consultants who have been awarded their certification possess the background and skill to offer effective security management and consulting support. Progent can provide a CISM support professional to help your enterprise in critical security disciplines including information protection governance, risk management, data protection process management, and incident handling management. Find out the details concerning Progent's CISM Security Consulting Expertise.

  • Certified Information Systems Security Professionals (CISSP) Security Support Expertise
    Progent's CISSP experts are security engineers who have earned CISSP certification as a result of verified experience, extensive study, and formal examination. CISSP qualification indicates expertise in a worldwide standard for IT security. American National Standards Institute has given the CISSP status accreditation in the field of IT security under ISO/IEC 17024. Areas of knowledge included within CISSP include security management practices, security design and test systems, access control methodology, software development security, operations security, hardware security, encryption, communications, network security, and business continuity planning. Read additional details about Progent's CISSP Consulting Assistance.

  • ISSAP Consulting Support
    Progent's ISSAP certified security consultants are consultants who have earned ISSAP status after rigorous examination and extensive experience. field experience with information security architecture. ISSAP security experts have acquired comprehensive understanding of access management mechanisms and methodologies, phone system and network protection, cryptography, requirements analysis, business continuity planning (BCP) and disaster recovery planning (DRP), and physical security. Progent's ISSAP-certified security experts can help your company with all phases of architecture security. Get more information about Progent's ISSAP Certified Protected Network Infrastructure Consulting Support.

  • Certified Information Systems Auditor Professional Services
    The CISA accreditation is an important achievement that signifies mastery in IS security auditing. Accredited by the American National Standards Institute, the CISA credential requires that consultants undergo an extensive examination given by the ISACA professional association. Progent offers the expertise of a CISA-certified security audit consultant trained to assist businesses in the fields of information systems audit process, IT administration, network assets and architecture planned useful life, IT support, protecting information resources, and business continuity planning. Get additional details concerning Progent's Certified Information Systems Auditor (CISA) Support Assistance.

  • GIAC (Global Information Assurance Certification) Consulting Services
    GIAC was founded in 1999 to certify the knowledge of computer security engineers. GIAC's mission is to make sure that an accredited professional has the knowledge necessary to provide services in key areas of network, information, and application program security. GIAC certifications are acknowledged by businesses and government organizations all over the world including and the United States National Security Agency. Progent can provide the support of GIAC certified consultants for all of the security services covered within GIAC certification programs such as auditing IT infrastructure, security incident response, traffic analysis, and web-based services security. Get additional information concerning Progent's GIAC Professional Assistance.
Get in Touch with Progent for Computer Security Support
If you're looking for security consulting, call Progent at 800-993-9400 or refer to Contact Progent.

© 2002- 2018 Progent Corporation. All rights reserved.