Overview of Progent's Security and Compliance Support Services
Progent's certified computer security and compliance professionals can provide a wide range of services designed to help companies of all sizes to identify and eliminate security vulnerabilities, defend against malicious attacks, recover from any issues caused by a breakdown of protection, and meet government requirements for protecting data and reporting security incidents. Progent can provide a selection of service delivery models:

  • On-demand online and on-premises support billed by the minute
  • On-going fully managed services billed at an affordable flat monthly fee
  • Set-price service bundles for a single security and compliance assessment
On-demand Security and Compliance Consulting Services
Once you register for Progent's services (registration is free), you can get as-needed remote or on-premises assistance from a Progent security and compliance consultant. This traditional support model is primarily reactive and geared toward quickly resolving technical issues that are affecting your productivity or that have stumped your own support personnel. Typical scenarios are replacing a firewall or VPN connection, installing a critical security patch for a Cisco switch or router, designing compliant access to cloud-based resources, or restoring data after a ransomware assault. These security services are invoiced to the nearest minute, which eliminates the annoying situation of getting large bills for quick fixes.

Delivery alternatives for Progent's as-needed support include:

  • Online Security Support Services
    The majority security-related problems can be resolved online via a combination of phone support and a remote Internet connection between Progent's Technical Response Center (TRC) and a customer's computer. Progent's Technical Response Center can provide remote security help by offering efficient access to consultants who have the background and resources to fix many of the most difficult problems quickly, keeping your service costs low and reducing downtime.
  • Onsite Security Services
    For cases where onsite assistance is required, Progent can send a technical professional to major cities throughout the U.S. Progent can also dispatch a security specialist with top certifications and world-class skills to any site in the country.
Progent's accredited engineers are qualified to support systems based on Microsoft Windows, Linux, macOS and OS X, Sun Solaris, and popular derivatives of UNIX. Progent's wide array of consulting services covers firewall expertise, email security, protected network architecture, and data restoration. Progent's support staff has been awarded the world's top security certifications including Certified Information Systems Auditor (CISA) and Certified Information Systems Security Professional (CISSP). Progent also can provide immediate access to online Cisco CCIE network infrastructure consultants who can deliver world-class assistance with complex network integration issues.

ProSight Low-Cost Managed Services for Information Assurance
Progent's low-cost ProSight line of managed services is intended to provide small and mid-size businesses with enterprise-class support and state-of-the-art technology for all facets of information assurance. ProSight managed services offered by Progent include:

  • ProSight Active Security Monitoring: Endpoint Protection and Ransomware Recovery
    ProSight Active Security Monitoring is an endpoint protection (EPP) solution that incorporates cutting edge behavior analysis tools to guard endpoints and servers and VMs against modern malware attacks like ransomware and email phishing, which routinely get by traditional signature-based anti-virus tools. ProSight ASM protects on-premises and cloud-based resources and offers a unified platform to address the complete threat progression including filtering, infiltration detection, mitigation, cleanup, and forensics. Key features include single-click rollback using Windows Volume Shadow Copy Service (VSS) and real-time system-wide immunization against new threats. Find out more about Progent's ProSight Active Security Monitoring (ASM) endpoint protection and ransomware defense.

  • ProSight Enhanced Security Protection: Unified Physical and Virtual Endpoint Security
    ProSight Enhanced Security Protection (ESP) managed services offer ultra-affordable multi-layer protection for physical and virtual servers, desktops, smartphones, and Exchange Server. ProSight ESP uses adaptive security and advanced heuristics for continuously monitoring and responding to security threats from all vectors. ProSight ESP delivers firewall protection, penetration alarms, device control, and web filtering through cutting-edge technologies packaged within one agent managed from a single control. Progent's security and virtualization consultants can help your business to plan and implement a ProSight ESP deployment that addresses your company's specific needs and that allows you demonstrate compliance with government and industry data protection standards. Progent will assist you specify and implement policies that ProSight ESP will manage, and Progent will monitor your network and respond to alerts that require immediate attention. Progent can also assist your company to set up and verify a backup and restore system such as ProSight Data Protection Services so you can get back in business quickly from a potentially disastrous cyber attack such as ransomware. Learn more about Progent's ProSight Enhanced Security Protection unified physical and virtual endpoint security and Microsoft Exchange filtering.

  • ProSight Data Protection Services: Managed Cloud Backup and Recovery
    ProSight Data Protection Services offer small and medium-sized organizations a low cost end-to-end solution for secure backup/disaster recovery. For a fixed monthly rate, ProSight DPS automates your backup activities and enables fast restoration of critical data, apps and VMs that have become unavailable or corrupted due to hardware breakdowns, software bugs, disasters, human mistakes, or malware attacks like ransomware. ProSight Data Protection Services can help you back up, retrieve and restore files, folders, applications, system images, as well as Hyper-V and VMware images. Critical data can be protected on the cloud, to a local device, or to both. Progent's backup and recovery specialists can deliver world-class support to set up ProSight Data Protection Services to be compliant with government and industry regulatory standards such as HIPPA, FINRA, and PCI and, when necessary, can help you to recover your business-critical information. Read more about ProSight DPS Managed Backup.

  • ProSight Email Guard: Inbound and Outbound Spam Filtering, Data Leakage Protection and Content Filtering
    ProSight Email Guard is Progent's email security solution that uses the services and infrastructure of leading information security vendors to provide web-based control and world-class security for your inbound and outbound email. The powerful structure of Progent's Email Guard integrates cloud-based filtering with a local gateway appliance to offer advanced protection against spam, viruses, Denial of Service (DoS) Attacks, DHAs, and other email-based malware. Email Guard's cloud filter acts as a first line of defense and keeps the vast majority of threats from reaching your security perimeter. This reduces your exposure to external attacks and saves network bandwidth and storage space. Email Guard's onsite security gateway appliance provides a further layer of inspection for incoming email. For outgoing email, the onsite security gateway offers anti-virus and anti-spam filtering, policy-based Data Loss Prevention, and encryption. The on-premises security gateway can also help Microsoft Exchange Server to track and safeguard internal email traffic that originates and ends within your security perimeter. Learn more about Progent's ProSight Email Guard spam filtering, virus defense, content filtering and data loss protection.

  • ProSight WAN Watch: Infrastructure Management
    Progentís ProSight WAN Watch is a network infrastructure management service that makes it easy and inexpensive for small and mid-sized businesses to map out, monitor, optimize and debug their connectivity hardware such as switches, firewalls, and load balancers plus servers, client computers and other devices. Incorporating state-of-the-art Remote Monitoring and Management technology, ProSight WAN Watch makes sure that infrastructure topology maps are kept updated, copies and manages the configuration of virtually all devices connected to your network, monitors performance, and generates notices when problems are discovered. By automating time-consuming management processes, WAN Watch can cut hours off ordinary chores such as network mapping, reconfiguring your network, locating appliances that need important software patches, or resolving performance problems. Learn more details about ProSight WAN Watch infrastructure management consulting.

  • ProSight LAN Watch: Server and Desktop Remote Monitoring
    ProSight LAN Watch is Progentís server and desktop remote monitoring service that incorporates state-of-the-art remote monitoring and management (RMM) technology to help keep your network running at peak levels by tracking the health of vital assets that drive your business network. When ProSight LAN Watch detects an issue, an alarm is transmitted immediately to your designated IT personnel and your assigned Progent engineering consultant so all looming issues can be resolved before they can impact your network Find out more about ProSight LAN Watch server and desktop remote monitoring services.

  • ProSight Virtual Hosting: Hosted VMs at Progent's Tier III Data Center
    With Progent's ProSight Virtual Hosting service, a small organization can have its critical servers and applications hosted in a secure fault tolerant data center on a high-performance virtual machine host set up and maintained by Progent's network support professionals. With Progent's ProSight Virtual Hosting service model, the customer owns the data, the OS platforms, and the apps. Since the environment is virtualized, it can be ported easily to a different hosting environment without requiring a time-consuming and difficult configuration procedure. With ProSight Virtual Hosting, you are not tied one hosting provider. Find out more details about ProSight Virtual Hosting services.

  • ProSight IT Asset Management: Network Documentation Management
    Progent's ProSight IT Asset Management service is an IT infrastructure documentation management service that makes it easy to capture, update, find and protect data about your IT infrastructure, processes, applications, and services. You can quickly find passwords or IP addresses and be warned about impending expirations of SSL certificates or domains. By cleaning up and managing your network documentation, you can save up to 50% of time spent trying to find critical information about your network. ProSight IT Asset Management includes a common repository for holding and sharing all documents required for managing your business network such as recommended procedures and self-service instructions. ProSight IT Asset Management also offers a high level of automation for gathering and associating IT information. Whether youíre making enhancements, doing regular maintenance, or responding to an emergency, ProSight IT Asset Management gets you the data you need as soon as you need it. Find out more about ProSight IT Asset Management service.
ProSight Network Audits
Progent's ProSight Network Audits offer a fast and low-cost alternative for small and medium-size organizations to get an unbiased assessment of the health of their information system. Powered by some of the leading remote monitoring and management (RMM) tools available, and supervised by Progent's certified team of IT experts, ProSight Network Audits help you see how closely the deployment of your core infrastructure assets adhere to industry best practices. The Basic and Advanced options for ProSight Network Audit services are offered at a budget-friendly, one-time cost and deliver immediate ROI like a cleaner Active Directory environment. Both also include a year of state-of-the-art remote network monitoring and management (RMM). Benefits can include lower-cost network management, better compliance with government and industry security standards, more efficient utilization of network assets, faster problem resolution, more dependable backup and restore, and increased uptime. See more information about ProSight Network Audits network infrastructure review.

Progent's ProSight Ransomware Preparedness Report
Progent's ProSight Ransomware Preparedness Report is an affordable service centered on a brief phone discussion with a Progent backup/recovery expert. The interview is intended to assess your company's preparedness to stop or recover rapidly from a ransomware incident. Progent will consult with you personally to collect information concerning your existing AV defense and backup system, and Progent will then produce a custom Basic Security and Best Practices Report detailing how you can apply best practices to create a cost-effective AV and backup environment that aligns with your company's requirements. For details, refer to Progent's ProSight Ransomware Preparedness Report Service.

Fixed-price Security Evaluation and Verification Bundles
Progent offers a number of set-price security and compliance evaluation bundles that provide exceptional value by deploying Progent's advanced system monitoring and analysis software as well as Progent's consulting skills to produce an objective and thorough evaluation of your network security posture.

  • Security Inventory Service Bundles for Small Organizations
    Progent offers two ultra-affordable security inventory scanning packages intended to enable small businesses to obtain an objective security evaluation from an accredited security engineer. With Progent's External Security Inventory Scan, a consultant administers an extensive assessment of your IT system from beyond your firewalled perimeter to identify potential gaps in the security profile you present to the outside. With Progent's Internal Security Inventory Scan, a security expert executes a system scan from an authorized computer within your company firewall to evaluate your exposure to internal threats. The two security inventory services are configured and executed from a secured external site. The project is managed by an engineer who has been awarded high-level security certifications and who produces a document that describes and interprets the data collected by the scan and suggests various improvements where appropriate.
  • Security Vulnerability Assessment Packages for Large Businesses
    Progent offers three levels of set-price security assessment service packages designed for enterprises who need to meet security standards required by state or industry regulators. Progent's security assessment service packages offer larger organizations a chance to obtain a professional look at the strength of their security posture. For each security evaluation package, Progent engineers with top security credentials analyze and report on captured data and provide recommendations for cost-effective improvements. All the network security assessment packages include an extra-cost option for on-premises engineers anywhere in the U.S.
  • Stealth Penetration Testing Services
    Stealth penetration testing, commonly known as PEN testing, is a vital tool for helping businesses to determine how vulnerable their IT environments are to current-generation threats. Progent's stealth penetration testing services check how well your existing security policies and platforms stand up to authorized but unannounced intrusion attempts managed by Progent's experienced security experts using advanced hacking methods. Read about Progent's stealth penetration testing services.
Our System Has Been Hacked: What Can We Do Now?
Network Security ConsultantsIf you are currently faced with a network security emergency and you have not prepared a detailed recovery plan, go to Progent's Remote Technical Help to see how to receive immediate assistance. Progent offers online technical support from experienced engineers and can escalate trouble tickets to high-level security specialists if required. Your business does not need to be a current Progent client to get urgent help for a security problem, but you can sign up as a Progent customer in advance at no cost and your status as a registered customer can save valuable time in case of a crisis.

Usually, smaller organizations have not documented a recovery plan in case of a successful penetration. This is risky, because the cost of a serious security assault can be even more devastating for a small business than for a large enterprise. Progent's security engineers can assist your business to create an effective recovery and event reporting plan that reduces the IT system downtime resulting from a security breach. The formal post-attack response model outlined by Global Information Assurance Certification is Progent's recommended method for handling a major security incident.

High-value Security Expertise Offered by Progent
Progent's veteran consultants offer advanced support in key facets of computer compliance including:

  • Vulnerability Audits and Security Compliance Assessment
    Progent provides experience with information risk auditing tools such as MS Baseline Security Analyzer or LANguard from GFI for performing a set of comprehensive system scans to uncover possible security problems. Progent has broad experience with scanning tools and can help your company to understand audit reports and respond appropriately. Progent's certified security consultants also can perform web software validation and can perform expert assessments of enterprise-wide security to determine your company's compliance with key worldwide security standards including HIPAA, PCI, and ISO. In addition, Progent can assess the strength of your wireless security covering stationary wireless equipment as well as mobile handsets. Read more details concerning Progent's Vulnerability Evaluation and Compliance Testing.
  • Planning, Building, and Validating Secure Environments
    Any business ought to develop a thoroughly considered security strategy that includes both proactive and responsive elements. The pre-attack strategy is a collection of steps that helps to minimize security holes. The reactive strategy specifies activities to help security staff to inventory the losses caused by an attack, remediate the damage, record the event, and revive network activity as quickly as possible. Progent can show you how to design security into your company operations, set up auditing utilities, define and execute a safe network architecture, and recommend processes and policies to maximize the safety of your network. Progent's security professionals are ready to assist you to set up a firewall, deploy safe offsite access to email and data, and install an effective virtual private network (VPN). If your company is looking for an affordable way for outsourcing your security management, Progent's 24x7 Monitoring Packages include automated online server tracking and immediate response to emergencies.
  • System Restoration and Security Forensics
    Progent provides expertise in recovering systems and servers that have been hacked, are suspect, or have ceased to function following a security penetration. Progent can help evaluate the damage resulting from the assault, restore normal functions, and retrieve information compromised as a result of the event. Progent's certified specialists can also oversee a comprehensive forensic evaluation by examining activity logs and using other advanced assessment tools. Progent's experience with security consulting minimizes your business disruption and allows Progent to suggest effective measures to avoid or contain new attacks.
  • Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Series Firewalls, and PIX Security Appliances Configuration and Troubleshooting
    Cisco CCIE Network Security ConsultantsThe latest generation of ASA 5500-X Series of firewalls with Firepower Services deliver significantly more value than Cisco's legacy firewalls and have replaced the ASA 5500 and PIX 500 security appliances for new deployments. Since Cisco's acquisition of Sourcefire, the entire line of ASA 5500-X devices can be provisioned to enable Firepower Services, based on Sourcefire's Snort product, which is the world's most deployed network intrusion protection system (IPS). Firepower services provide powerful new features such as advanced malware protection (AMP), URL filtering, dynamic threat analytics, and automation. Progent's Cisco-qualified CCIE network experts can help your company to maintain your legacy PIX or Cisco ASA 5500 firewalls and migrate efficiently to Cisco ASA 5500-X firewalls with Firepower Services. Progent's consultants can provide remote and onsite support for ASA 5500-X firewalls with Firepower Services and can help your business to design, integrate, optimize, administer and debug firewall environments based on Cisco ASA 5500-X firewalls with Firepower Services. See additional details about ASA Firewalls with Firepower Services configuration and troubleshooting support.
  • Other Firewall and VPN Consulting Services
    In addition to supporting a wide array of protection solutions from Microsoft and Cisco, Progent can provide small organizations expert engineering services for security products from other important firewall and Virtual Private Network suppliers such as:
  • SIEM Integration and Support
    Security information and event management (SIEM) software and services are designed to interpret the enormous amounts of information represented by security event logs created by a wide range of sources including network infrastructure appliances, servers, and application software and monitoring tools. SIEM applications organizes the security event records from these various sources and produces summary reports of security events as mandated by government regulations and business compliance guidelines. Progent's GIAC-certified information assurance experts and Cisco CCIE certified network consultants can help organizations to plan, deploy and manage a SIEM system that helps them to understand the behavior of attacks and comply with security incident reporting requirements. (See Progent's SIEM solutions.)
Progent's Security Certifications
Progent's security engineers have earned the most prestigious accreditations available in the security industry. These certifications demand exhaustive testing and demonstrated work experience to ensure that recipients have acquired expertise with a substantial amount of security knowledge and methodologies and can provide high-level security solutions to computer networks of any size.
  • CISM Security Consulting Expertise
    Certified Information Security Manager identifies the fundamental skills and worldwide benchmarks of performance that information security professionals are required to master. CISM provides business management the confidence that consultants who have been awarded their CISM have the experience and skill to offer efficient security administration and engineering services. Progent can provide a CISM expert to help your enterprise in key security disciplines including data protection governance, risk assessment, data protection process control, and incident response support. Get additional details about Progent's Certified Information Security Manager Security Consulting Expertise.

  • Certified Information Systems Security Professionals (CISSP) Security Support Services
    Progent's Certified Information Systems Security Professionals (CISSPs) are security engineers who have been awarded CISSP status as a result of demonstrated experience, rigorous study, and formal testing. CISSP qualification recognizes mastery of an international standard for information security. ANSI has given the CISSP status official recognition in the area of information security under ISO/IEC 17024. Areas of expertise included under CISSP include security management procedures, security architecture and test systems, connection permission methodology, software development security, business processes security, physical security, cryptography, communications, Internet security, and business continuity planning. Read more details concerning Progent's Certified Information Systems Security Professionals (CISSP) Support Expertise.

  • ISSAP Engineering Services
    Progent's ISSAP certified security consultants are consultants who have earned ISSAP accreditation as a result of thorough testing and significant experience. field experience with information security design. ISSAP security experts possess in-depth knowledge of access control systems and methodologies, telecommunications and network infrastructure protection, cryptography, requirements analysis, business continuity planning (BCP) and disaster recovery planning (DRP), and physical security. Progent's ISSAP-qualified security experts can help your business with all aspects of secure network architecture. Get additional information concerning Progent's ISSAP Accredited Protected IT Architecture Engineering Services.

  • Certified Information Systems Auditor (CISA) Support Expertise
    The CISA accreditation is a recognized achievement that represents mastery in information system security auditing. Certified by the American National Standards Institute, the CISA credential requires that consultants undergo an extensive test administered by the ISACA international professional association. Progent can provide the services of a CISA-certified security audit professional trained to assist businesses in the fields of IS audit process, IT enforcement, network assets and architecture planned useful life, IT support, safeguarding data assets, and disaster recovery planning. Find out more details about Progent's Certified Information Systems Auditor (CISA) Support Assistance.

  • GIAC Consulting Expertise
    GIAC was founded in 1999 to certify the skill of information technology security experts. GIAC's goal is to ensure that an accredited security consultant has the skills needed to deliver support in vital areas of system, information, and software security. GIAC certifications are acknowledged by companies and government organizations all over the world including and the United States National Security Agency (NSA). Progent offers the support of certified consultants for any of the network security services addressed within GIAC certification topics including auditing networks, security incident handling, intrusion detection, and web-based services security. Read additional details concerning Progent's GIAC Professional Assistance.
Depend on Progent for Network Security Expertise
If you need network security expertise, phone Progent at 800-993-9400 or go to Contact Progent.

© 2002- 2018 Progent Corporation. All rights reserved.