Overview of Progent's Security Support Services
Progent's certified network security and compliance consultants offer a broad range of services designed to assist organizations of any size to identify and eliminate security weaknesses, defend against malicious attacks, recover from the issues resulting from a breakdown of security, and meet government mandates for guarding data and reporting security incidents. Progent offers a choice of service models:

  • On-demand remote and on-premises assistance invoiced to the nearest minute
  • On-going managed services invoiced at a low fixed monthly fee
  • Value-priced service packages for a one-time security and compliance assessment
On-demand Security and Compliance Support Services
Once you register for Progent's services (signing up is free), you can receive on-demand remote or on-premises support from a Progent security and compliance expert. This traditional support model is essentially reactive and optimized for rapidly taking care of IT issues that are affecting your productivity or that have stumped your in-house support personnel. Typical examples include replacing a firewall or VPN connection, implementing a vital security update for a Cisco switch or router, setting up compliant access to cloud-based resources, or restoring data after a ransomware assault. These services are invoiced to the nearest minute, which avoids the frustrating case of receiving big bills for quick repairs.

Delivery options for Progent's as-needed support services include:

  • Remote Security Services
    The majority security-related issues can be handled online via a mix of phone support and an Internet connection between Progent's Technical Response Center (TRC) and a client's computer. Progent's Technical Response Center can deliver remote security help by offering efficient access to consultants with the background and technical resources to resolve many of the most challenging issues quickly, making your support expenses affordable and reducing lost productivity.
  • On-premises Security Services
    For cases where on-premises assistance is necessary, Progent can send a technical professional to major cities across the U.S. Progent can also dispatch a security consultant with high-level certifications and world-class skills to any site in the country.
Progent's accredited security consultants are qualified to provide help for systems based on Microsoft, Linux, Apple Mac, Solaris, and popular versions of UNIX. Progent's broad range of services encompasses firewall configuration, email and messaging systems, secure network architecture, and information restoration. Progent's technical support team has been awarded the industry's top security accreditations including Certified Information Security Manager and ISSAP. Progent also can provide fast access to online Cisco-certified CCIE network infrastructure engineers who can provide advanced assistance with tough network configuration issues.

ProSight Fixed-price Managed Services for Information Assurance
Progent's low-cost ProSight portfolio of managed services is intended to provide small and mid-size organizations with enterprise-class support and cutting-edge technology for all facets of information assurance and compliance. ProSight managed services offered by Progent include:

  • ProSight Active Security Monitoring: Endpoint Protection and Ransomware Recovery
    ProSight Active Security Monitoring is an endpoint protection (EPP) service that incorporates next generation behavior-based machine learning technology to defend endpoint devices as well as physical and virtual servers against new malware assaults like ransomware and email phishing, which easily evade legacy signature-matching AV products. ProSight Active Security Monitoring safeguards on-premises and cloud resources and offers a unified platform to manage the complete threat lifecycle including protection, detection, mitigation, cleanup, and forensics. Key features include single-click rollback using Windows Volume Shadow Copy Service (VSS) and real-time system-wide immunization against newly discovered threats. Read more about Progent's ProSight Active Security Monitoring next-generation endpoint protection and ransomware recovery.

  • ProSight Enhanced Security Protection (ESP): Unified Endpoint Protection
    Progent's ProSight Enhanced Security Protection (ESP) services deliver affordable multi-layer protection for physical servers and virtual machines, desktops, mobile devices, and Microsoft Exchange. ProSight ESP uses contextual security and modern behavior analysis for continuously monitoring and reacting to cyber threats from all attack vectors. ProSight ESP provides firewall protection, penetration alarms, endpoint control, and web filtering via leading-edge tools packaged within a single agent managed from a single console. Progent's data protection and virtualization consultants can help you to plan and configure a ProSight ESP environment that meets your company's specific requirements and that allows you prove compliance with government and industry information protection regulations. Progent will help you define and implement security policies that ProSight ESP will enforce, and Progent will monitor your network and react to alarms that require urgent action. Progent can also help you to install and test a backup and restore solution such as ProSight Data Protection Services (DPS) so you can recover rapidly from a potentially disastrous cyber attack such as ransomware. Learn more about Progent's ProSight Enhanced Security Protection unified physical and virtual endpoint protection and Exchange email filtering.

  • ProSight Data Protection Services: Managed Cloud Backup
    ProSight Data Protection Services from Progent offer small and medium-sized businesses an affordable and fully managed service for reliable backup/disaster recovery. For a fixed monthly rate, ProSight DPS automates and monitors your backup activities and allows fast restoration of critical data, apps and virtual machines that have become lost or damaged due to component breakdowns, software glitches, disasters, human error, or malicious attacks such as ransomware. ProSight DPS can help you protect, retrieve and restore files, folders, applications, system images, plus Microsoft Hyper-V and VMware images. Important data can be protected on the cloud, to a local storage device, or to both. Progent's backup and recovery specialists can deliver world-class expertise to configure ProSight Data Protection Services to to comply with government and industry regulatory requirements such as HIPPA, FINRA, and PCI and, whenever needed, can assist you to recover your business-critical data. Find out more about ProSight DPS Managed Cloud Backup.

  • ProSight Email Guard: Spam Filtering, Data Leakage Protection and Email Encryption
    ProSight Email Guard is Progent's email filtering and encryption platform that uses the technology of top information security vendors to provide web-based control and world-class protection for your email traffic. The powerful structure of Email Guard integrates cloud-based filtering with a local security gateway device to provide complete protection against spam, viruses, Dos Attacks, Directory Harvest Attacks, and other email-borne threats. Email Guard's Cloud Protection Layer acts as a first line of defense and blocks the vast majority of threats from making it to your network firewall. This reduces your exposure to external attacks and conserves network bandwidth and storage space. Email Guard's on-premises gateway device adds a deeper layer of inspection for inbound email. For outbound email, the local security gateway offers AV and anti-spam protection, DLP, and email encryption. The onsite security gateway can also assist Exchange Server to monitor and safeguard internal email that originates and ends inside your corporate firewall. Learn more about Progent's ProSight Email Guard spam filtering, virus defense, content filtering and data leakage prevention.

  • ProSight WAN Watch: Infrastructure Remote Monitoring and Management
    Progentís ProSight WAN Watch is an infrastructure management service that makes it simple and inexpensive for smaller businesses to map out, monitor, reconfigure and debug their networking hardware like routers, firewalls, and access points plus servers, endpoints and other networked devices. Using state-of-the-art RMM technology, WAN Watch ensures that network maps are always updated, captures and displays the configuration of almost all devices connected to your network, monitors performance, and sends notices when problems are discovered. By automating complex management and troubleshooting processes, ProSight WAN Watch can knock hours off common tasks like network mapping, expanding your network, locating appliances that need critical software patches, or identifying the cause of performance bottlenecks. Learn more details about ProSight WAN Watch network infrastructure monitoring and management consulting.

  • ProSight LAN Watch: Server and Desktop Remote Monitoring and Management
    ProSight LAN Watch is Progentís server and desktop remote monitoring managed service that uses advanced remote monitoring and management technology to keep your network operating at peak levels by checking the state of vital assets that drive your business network. When ProSight LAN Watch detects an issue, an alert is transmitted immediately to your specified IT staff and your assigned Progent consultant so that all potential issues can be addressed before they can disrupt productivity Learn more about ProSight LAN Watch server and desktop monitoring services.

  • ProSight Virtual Hosting: Hosted VMs at Progent's Tier III Data Center
    With Progent's ProSight Virtual Hosting service, a small or mid-size organization can have its key servers and applications hosted in a secure Tier III data center on a high-performance virtual host set up and maintained by Progent's network support professionals. Under the ProSight Virtual Hosting service model, the customer retains ownership of the data, the OS platforms, and the apps. Since the system is virtualized, it can be moved easily to a different hardware solution without requiring a time-consuming and difficult reinstallation process. With ProSight Virtual Hosting, your business is not tied a single hosting service. Find out more about ProSight Virtual Hosting services.

  • ProSight IT Asset Management: Network Infrastructure Documentation Management
    ProSight IT Asset Management service is a cloud-based IT documentation management service that makes it easy to create, update, retrieve and protect information about your network infrastructure, processes, applications, and services. You can quickly locate passwords or IP addresses and be warned about upcoming expirations of SSL certificates ,domains or warranties. By updating and managing your IT infrastructure documentation, you can eliminate up to half of time thrown away trying to find vital information about your IT network. ProSight IT Asset Management includes a common repository for holding and sharing all documents related to managing your business network like standard operating procedures and self-service instructions. ProSight IT Asset Management also offers a high level of automation for collecting and relating IT data. Whether youíre making improvements, doing regular maintenance, or responding to a crisis, ProSight IT Asset Management gets you the knowledge you require as soon as you need it. Learn more details about ProSight IT Asset Management service.
ProSight Network Audits
Progent's ProSight Network Audits are a quick and affordable way for small and mid-size organizations to get an objective evaluation of the overall health of their network. Based on a selection of the leading remote monitoring and management platforms in the industry, and supervised by Progent's world-class team of IT experts, ProSight Network Audits show you how well the deployment of your essential infrastructure assets adhere to best practices. The Basic and Advanced options for ProSight Network Audit services are offered at a low, one-time cost and deliver instant benefits such as a more manageable Active Directory (AD) system. Both versions also come with a year of advanced remote network monitoring and management. Advantages can include easier management, better compliance with data security regulations, more efficient utilization of network assets, quicker problem resolution, more reliable backup and recovery, and less downtime. Learn more information about Progent's ProSight Network Audits IT infrastructure assessment.

The ProSight Ransomware Preparedness Report
The ProSight Ransomware Preparedness Report service is a low-cost service centered on a brief interview with a Progent backup/recovery consultant. The fact-finding interview is designed to help assess your organization's preparedness to stop or recover rapidly after a ransomware incident. Progent will work with you directly to gather information concerning your current security profile and backup system, and Progent will then deliver a written Basic Security and Best Practices Report describing how you can follow industry best practices to deploy an efficient security and backup/recovery environment that aligns with your company's needs. For details, see The ProSight Ransomware Preparedness Report Service.

Set-price Security Assessment and Verification Packages
Progent offers a number of fixed-price security and compliance assessment packages that provide exceptional value by utilizing Progent's enterprise-class system monitoring software plus Progent's consulting skills to create an objective and comprehensive assessment of your IT environment security posture.

  • Security Inventory Service Bundles for Small Businesses
    Progent offers two value-priced security inventory service packages designed to allow small organizations to obtain a professional security assessment from a certified security consultant. With Progent's External Security Inventory Scan, an engineer manages a comprehensive assessment of your IT system from beyond your corporate firewall to determine possible risks in the security posture you present to the outside world. With Progent's Internal Security Inventory Scan, a certified security consultant runs a system scan from an authorized computer inside your company firewall to assess your vulnerability to inside attacks. The two security inventory scanning services are set up and run from a secured offsite location. The project is administered by an engineer who has earned advanced security certifications and who produces a document that details and interprets the data collected by the scan and suggests various improvements where appropriate.
  • Security Vulnerability Assessment Bundles for Large Businesses
    Progent offers three levels of set-price security evaluation service bundles designed for enterprises who need to meet security standards required by government or industry regulators. Progent's security assessment service packages offer enterprises a chance to get an objective look at the strength of their security profile. For every security evaluation bundle, Progent consultants with advanced security credentials study and report on captured data and provide suggestions for cost-effective remediation. Each of the network security audit packages include an added-cost option for on-premises engineers at any location in the United States.
  • Stealth Penetration Testing Services
    Stealth penetration testing, often known as PEN testing, is a critical technique for allowing businesses to find out how open their IT systems are to modern attacks. Progent's stealth penetration testing services test how effectively your existing security policies and technologies stand up to authorized but unannounced intrusion attempts launched by Progent's veteran security specialists utilizing advanced hacking techniques. Read about Progent's stealth penetration testing services.
Our Network Has Been Hacked: What Can We Do Now?
Network Security ConsultantsIf your business is currently faced with a network security crisis and you have not prepared a formal recovery plan, refer to Progent's Online Network Support to see how to receive immediate assistance. Progent provides online assistance from experienced network technicians and can escalate trouble tickets to certified security experts if necessary. Your organization does not have to be a current Progent customer to get urgent help for a security problem, but you can sign up as a Progent client ahead of time for free and your standing as a registered customer could save valuable time in case of an emergency.

Typically, smaller organizations do not have a recovery plan in the event of a successful attack. This is not good, because the damage from a successful security attack can be even more catastrophic for a small company than for a big enterprise. Progent's security specialists can help your you to create a sensible recovery and incident reporting plan that reduces the network disruption resulting from a security breach. The formal incident handling procedure promoted by Global Information Assurance Certification is Progent's suggested procedure for responding to a major security attack.

High-value Security Expertise Offered by Progent
Progent's veteran engineers can provide advanced support in key areas of IT security such as:

  • Security Vulnerability Audits and Security Compliance Testing
    Progent provides expertise with information risk auditing utilities like Microsoft Baseline Security Analyzer and LANguard from GFI for conducting a variety of comprehensive system tests to reveal potential security holes. Progent has broad experience with scanning utilities and can help you to understand audit results and respond efficiently. Progent's certified security engineers also offer web application testing and can conduct thorough assessments of enterprise-wide security to validate your company's compliance with key worldwide security specifications such as FISMA, NIST, and ISO 17799. Also, Progent can evaluate the effectiveness of your wireless protection including fixed wireless equipment plus mobile handsets. Get the details concerning Progent's Vulnerability Audits and Compliance Assessment.
  • Planning, Implementing, and Validating Secure Environments
    Every organization should have a carefully considered security strategy that includes both proactive and reactive steps. The proactive plan is a collection of steps that works to reduce vulnerabilities. The reactive strategy specifies activities to assist security staff to evaluate the damage resulting from a breach, repair the damage, document the event, and restore business functions as quickly as possible. Progent can advise you how to incorporate security into your business operations, set up auditing software, define and implement a safe network architecture, and propose processes and policies that will maximize the safety of your information system. Progent's security experts are available to assist you to set up a firewall, design protected offsite connectivity to e-mail and files, and install an efficient virtual private network. If you are looking for an economical option for jobbing out your network security administration, Progent's 24x7 Network Support Packages include non-stop remote server monitoring and immediate response to problems.
  • Data Restoration and Security Forensics
    Progent provides skill in recovering systems and computers that have been hacked, are suspect, or have ceased to function because of a security breach. Progent can help assess the losses resulting from the assault, restore normal business operations, and retrieve information compromised owing to the breach. Progent's certified specialists can also oversee a thorough forensic evaluation by examining event logs and using a variety of proven forensics techniques. Progent's background with security problems minimizes your off-air time and permits Progent to suggest effective measures to avoid or contain new attacks.
  • Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Firewalls, and PIX 500 Security Appliances Integration and Debugging
    Cisco Certified CCIE Network Security SpecialistsThe latest generation of ASA 5500-X Family of firewalls with Firepower Services offer substantially more performance than Cisco's legacy PIX and ASA 5500 firewalls and have replaced the ASA 5500 and PIX security appliances for all new installations. Since Cisco's acquisition of Sourcefire, the whole line of Cisco ASA 5500-X firewalls can be provisioned to enable Firepower Services, based on Sourcefire's Snort product, which is the world's most popular network intrusion protection system (IPS). Firepower services provide powerful new features such as advanced malware protection (AMP), URL filtering, real-time threat analytics, and security automation. Progent's Cisco-qualified CCIE network consultants can assist you to maintain your current PIX or ASA 5500 security appliances or upgrade to ASA 5500-X firewalls with Firepower Services. Progent's consultants offer online and on-premises support for ASA 5500-X firewalls with Firepower Services and can assist you to plan, deploy, tune, administer and debug firewall environments built around Cisco ASA 5500-X firewalls with Firepower Services. See more details about ASA Firewalls with Firepower integration and troubleshooting services.
  • Other Firewall and Virtual Private Network (VPN) Solutions
    In addition to being expert in a wide range of network security technologies from Microsoft and Cisco, Progent offers small companies top-level support for solutions from other important firewall and Virtual Private Network (VPN) suppliers including:
  • SIEM Integration and Support
    Security information and event management (SIEM) software and services are intended to digest the enormous quantity of data represented by security incident logs created by a wide range of sources such as network infrastructure appliances, servers, and application software and tools. SIEM applications analyzes the security event records from these various sources and creates consolidated reports of security events as required by government regulations and business compliance standards. Progent's GIAC-certified information assurance consultants and Cisco-certified network consultants can help organizations to plan, install and operate a SIEM system that enables them to understand the behavior of security incidents and comply with event reporting regulations. (Visit Progent's SIEM solutions.)
Progent's Security Accreditations
Progent's security specialists have earned some of the most respected accreditations offered in the security industry. These certifications require exhaustive examinations and proven field experience to ensure that candidates have acquired expertise with a substantial body of security knowledge and methodologies and can offer high-level solutions to information networks of any size.
  • Certified Information Security Manager Security Support Expertise
    CISM defines the fundamental skills and international benchmarks of performance that information technology security professionals are required to achieve. CISM provides executive management the confidence that those who have earned their certification possess the experience and knowledge to offer efficient security management and consulting support. Progent can offer a CISM consultant to assist your enterprise in key security areas such as data protection governance, vulnerability management, information security program management, and crisis handling management. Read more details concerning Progent's Certified Information Security Manager (CISM) Security Consulting Assistance.

  • CISSP Security Consulting Expertise
    Progent's Certified Information Systems Security Professionals (CISSPs) are security specialists who have earned CISSP accreditation as a result of demonstrated experience, rigorous study, and formal testing. CISSP qualification indicates expertise in an international standard for information security. ANSI has granted the CISSP status accreditation in the area of IT security under ISO/IEC 17024. Areas of knowledge included within CISSP include security administration procedures, security design and models, access permission methodology, applications development security, business processes security, hardware security, cryptography, telecommunications, Internet security, and business continuity planning. Learn additional information concerning Progent's Certified Information Systems Security Professionals (CISSP) Consulting Expertise.

  • Information Systems Security Architecture Professionals (ISSAP) Engineering Services
    Progent's ISSAP qualified security consultants are consultants who have been awarded ISSAP certification after rigorous examination and substantial experience. field experience with information security architecture. ISSAP consultants have acquired comprehensive understanding of access control mechanisms and techniques, telecommunications and network infrastructure protection, cryptography, requirements analysis, BCP and disaster recovery, and physical security. Progent's ISSAP-certified security experts can assist your company with all aspects of secure network architecture. Find out additional information about Progent's ISSAP Accredited Protected IT Architecture Engineering Services.

  • Certified Information Systems Auditor (CISA) Professional Expertise
    The Certified Information Systems Auditor (CISA) accreditation is a recognized qualification that represents mastery in information system security audit and control. Accredited by the American National Standards Institute (ANSI), the CISA credential requires that candidates undergo a comprehensive test administered by the ISACA professional association. Progent can provide the expertise of a CISA-qualified security audit professional able to assist companies in the areas of information systems audit services, information technology governance, systems and architecture lifecycle, IT service delivery, safeguarding data assets, and disaster recovery preparedness. Learn additional information about Progent's Certified Information Systems Auditor Support Assistance.

  • GIAC Consulting Services
    GIAC was established in 1999 to certify the skill of network security professionals. GIAC's mission is to assure that a certified professional has the knowledge necessary to provide services in critical areas of system, data, and software security. GIAC accreditations are recognized by businesses and institutions around the world including and the United States National Security Agency (NSA). Progent offers the help of GIAC certified security engineers for all of the security disciplines addressed within GIAC accreditation topics such as assessing perimeters, incident handling, intrusion detection, and web services security. Read more details about Progent's GIAC (Global Information Assurance Certification) Support Assistance.
Depend on Progent for Network Security Help
If you're looking for computer security consulting expertise, phone Progent at 800-993-9400 or go to Contact Progent.
















© 2002- 2018 Progent Corporation. All rights reserved.