Introduction to Progent's Security Support Services
Progent's industry certified network security consultants can provide a broad selection of support services intended to help organizations of any size to identify and correct security weaknesses, defend against attacks, recover from any damage resulting from a breach of security, and comply with regulatory requirements for reporting incidents. Progent delivers online and in person support and also has developed economical fixed-cost security assessment packages to supplement Progent's standard by-the-minute pricing.

Service delivery options available from Progent are:

  • Remote Security Services
    Most security problems can be addressed remotely by a mix of telephone support and remote data access between Progent's Technical Response Center and the client's computer system. Progent's TRC support team includes network security engineers with the knowledge and experience and the tools to fix even the most challenging issues quickly, keeping your support costs reasonable and minimizing downtime. Progent offers security support on a per-minute model without minimum billing for remote consulting support. Progent's pricing policy eliminates scenarios where quick solutions entail big charges. Progent also offers a number of fixed-price online security and compliance evaluation packages that represent extraordinary value by leveraging Progent's advanced network scanning technology and Progent's consulting expertise to deliver an objective and actionable analysis of your network security profile.

  • On-premises Security Options
    In cases in which on-site support is required, Progent can send a field technician to major metropolitan areas across the United States Progent's certified security engineers are also available to help with projects that call for high-level security professionals to be on premises anywhere in the U.S., and Progent's most advanced security assessment packages for large businesses feature the services of several certified security engineers at your location.

  • Urgent Security Support Services
    For immediate assistance with network security problems, your company can get in touch with a seasoned online support expert by contacting Progent's team of security engineers available at Progent's TRC. Progent's urgent remote security service consultants are ready to offer fast and affordable assistance with security problems that threaten the productivity of your IT network. Progent's security consultants are qualified to support systems powered by Microsoft Windows, Linux, Apple Mac, Sun, and popular versions of UNIX. Progent's broad range of services addresses firewall expertise, email security, protected network architecture, and data restoration. Progent's support staff has been awarded the industry's top security accreditations including CISA and Certified Information Systems Security Professional (CISSP). Progent also offers immediate access to online Cisco-certified CCIE network infrastructure engineers who can deliver world-class support with tough network configuration issues.

Our Network Has Been Hacked: What Can We Do Now?
Network Security ConsultantsIf your company is currently experiencing a security emergency and you do not have a detailed response plan, visit Progent's Remote Computer Help to find out how to get fast help. Progent provides remote assistance from skilled network technicians and can refer problems to certified security experts if required. Your organization does not have to be a current Progent client to receive urgent support for a security problem, but you can register as a Progent customer in advance for free and your status as a current customer can save valuable time during an emergency.

Usually, smaller businesses have no response plan in the event of a damaging security breach. This is not good, since the cost of a serious security assault can be more devastating for a small company than for a large enterprise. Progent's security consultants can assist your you to create an efficient response and event reporting plan that reduces the network disruption resulting from an attack. The step-by-step incident handling procedure promoted by Global Information Assurance Certification is Progent's preferred method for responding to a major security attack.

Practice Areas of Progent's Security Expertise
Coordinating network security and planning for recovering critical information and functions following a security breach requires a continual program that entails an array of technologies and processes. Progent's certified security experts can assist your organization at all levels in your attempt to guard your information network and stay in compliance, Services range from security assessments to designing a comprehensive security strategy. Important technologies supported by Progent's security engineers include Planning and Implementation, Information Restoration and Security Failure Analysis, plus Managed Protection from E-mail-Borne Spam and Viruses.

  • Designing, Building, and Testing Secure Environments
    Every business should have a thoroughly thought out security strategy that includes both proactive and responsive elements. The pre-attack strategy is a set of steps that helps to minimize security holes. The reactive strategy defines activities to help IT personnel to inventory the damage caused by a breach, remediate the damage, record the event, and restore network activity as soon as possible. Progent can advise you how to build protection into your business processes, set up auditing utilities, define and implement a secure computer architecture, and recommend procedures and policies that will maximize the safety of your computing environment. Progent's security professionals are ready to help you to set up a firewall, deploy protected online and mobile connectivity to email and data, and configure an effective VPN. If your company is looking for an affordable option for jobbing out your security management, Progent's Round-the-clock Monitoring Packages include non-stop online network monitoring and quick resolution of problems.
  • System Restoration and Failure Analysis
    Progent offers skill in restoring networks and servers that have been hacked, are in question, or have ceased to function because of a security attack. Progent can show you how to assess the losses caused by the breach, return your company to normal functions, and retrieve information compromised as a result of the attack. Progent's security engineers can also perform a thorough forensic analysis by examining event logs and using a variety of proven assessment techniques. Progent's background with security consulting minimizes your off-air time and allows Progent to recommend effective strategies to avoid or contain new attacks.
  • Email Security with Spam Filtering, Virus Protection, Content Filtering, and Data Loss Protection
    Email Guard is Progent's email filtering and encryption solution that incorporates the technology of leading information security vendors to provide centralized management and comprehensive protection for all your inbound and outbound email. The powerful architecture of Progent's Email Guard combines a Cloud Protection Layer with a local security gateway device to offer advanced protection against spam, viruses, Denial of Service (DoS) Attacks, DHAs, and other email-based threats. Email Guard's cloud filter acts as a first line of defense and keeps the vast majority of unwanted email from making it to your network firewall. This reduces your exposure to inbound attacks and saves network bandwidth and storage. Email Guard's on-premises gateway device provides a deeper layer of inspection for inbound email. For outgoing email, the local security gateway provides AV and anti-spam protection, policy-based Data Loss Prevention, and email encryption. The local gateway can also help Microsoft Exchange Server to monitor and protect internal email that originates and ends within your security perimeter. Learn more about Progent's Email Guard Spam Filtering, Virus Blocking, Content Filtering and Data Loss Prevention.
Advanced Security Expertise Offered by Progent
Progent's security engineers offer consulting support in vital areas of computer protection including:
  • Security Vulnerability Evaluation and Security Compliance Assessment
    Progent provides experience with information risk evaluation software such as Microsoft Baseline Security Analyzer and LANguard from GFI for performing a set of automatic network scans to identify potential security problems. Progent has broad experience with monitoring tools and can assist your company to understand assessment results and respond appropriately. Progent's security engineers also provide web application validation and can perform expert evaluation of enterprise-wide security to verify your organization's compliance with major industry security standards such as HIPAA, PCI, and ISO. In addition, Progent can evaluate the effectiveness of your wireless protection covering stationary wireless appliances plus mobile handsets. Find out more information about Progent's Vulnerability Evaluation and Compliance Assessment.
  • Security Inventory Scanning Bundles for Small Businesses
    Progent has put together two low-cost security inventory scanning packages intended to allow small companies to get an objective security evaluation from a qualified security engineer. With Progent's External Security Inventory Checkup, a security engineer administers an extensive examination of your IT infrastructure from beyond your company firewall to determine potential risks in the security profile you expose to the public. With Progent's Internal Network Security Inventory Checkup, a security engineer executes a network scan from a secure computer within your company firewall to evaluate vulnerabilities to internal assaults. Both security inventory packages are configured and run from a protected remote location. The project is implemented by a consultant who has earned high-level security accreditations who generates a document that summarizes and analyzes the information captured by the security scan and proposes cost-effective remediation where call for.
  • Security Vulnerability Assessment Bundles for Large Companies
    Progent's certified security engineers can deliver a range of fixed-cost security assessment packages created for corporations who have to comply with security levels demanded by government agencies or by customers. Progent's security evaluation service packages give larger businesses a chance to get a professional opinion about the quality of their security environment. For every security evaluation bundle, Progent consultants with high-level security accreditations analyze and report on scanned information and provide recommendations for efficient improvements. The different network security assessment packages include an added-cost option for onsite security engineers United States.
  • Upgrading from Microsoft ISA Server 2006 and Forefront Threat Management Gateway 2010
    Microsoft Internet Security and Acceleration (ISA) Server and its replacement Forefront Threat Management Gateway are software platforms that include an application-layer firewall that can defend networks from external and internal threats. Both platforms perform in-depth inspection of network protocols to uncover exploits that can get by early-generation firewalls. ISA Server 2006 was replaced by Forefront TMG 2010, which is built on ISA Server 2006's architecture while delivering a number of improved capabilities. Forefront TMG 2010 has in turn been discontinued by Microsoft, and the security functions offered by the product are now commonly taken over by dedicated physical devices from companies that include Cisco, Barracuda, Juniper and WatchGuard. (See ASA Firewall with Firepower Services configuration and management.) Progent provides advanced Forefront TMG support services and Microsoft ISA Server expertise to help you maintain and debug your legacy firewall environment, and Progent can help you to upgrade efficiently to a modern firewall solution by providing planning, integration, optimization, training and debugging.
  • Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Series Firewalls, and PIX 500 Firewalls Configuration and Debugging
    Cisco CCIE Network Security ConsultantsThe new ASA 5500-X Series of firewalls with Firepower Services provide significantly more bang for the buck than Cisco's earlier PIX and ASA 5500 firewalls and have superseded the ASA 5500 and PIX 500 security appliances for new deployments. After Cisco's purchase of Sourcefire, the whole family of Cisco ASA 5500-X devices can be provisioned to enable Firepower Services, based on Sourcefire's Snort technology, which is the world's most popular network intrusion protection system. Firepower services bring powerful new features including advanced malware protection (AMP), URL filtering, real-time threat analytics, and automation. Progent's Cisco-qualified CCIE network experts can assist your company to maintain your legacy PIX or ASA 5500 firewalls or migrate efficiently to ASA 5500-X firewalls with Firepower Services. Progent's consultants offer online and onsite support for ASA 5500-X firewalls with Firepower Services and can assist your organization to design, configure, tune, manage and debug firewall solutions built on Cisco ASA 5500-X firewalls with Firepower Services. Learn more details about Cisco ASA 5500-X Firewalls with Firepower integration and debugging services.
  • Other Firewall and Virtual Private Network (VPN) Solutions
    In addition to supporting a wide array of security technologies available from Microsoft and Cisco, Progent can provide small businesses top-level support for security products from other major firewall and VPN vendors including:
  • SIEM Solutions
    Security information and event management (SIEM) applications and services are designed to digest the enormous quantity of data collected in security event logs generated by multiple sources including network infrastructure appliances, operating systems, and application software and tools. SIEM applications analyzes the security logs from these diverse sources and produces summary reports of security events as required by government regulations and industry compliance guidelines. Progent's GIAC-certified information assurance experts and Cisco-certified network consultants can help businesses to plan, deploy and manage a SIEM solution that helps them to understand the progress of security incidents and comply with event reporting regulations. (Visit Progent's Security information and Event Management (SIEM) solutions.)
Progent's Security Certifications
Progent's security engineers have been awarded some of the most respected accreditations available in the security industry. These certifications demand extensive examinations and demonstrated field background to guarantee that recipients have mastered a substantial body of security information and techniques and can offer high-level security solutions to computer networks of any complexity.
  • Certified Information Security Manager (CISM) Security Support Expertise
    Certified Information Security Manager identifies the basic competencies and worldwide standards of performance that information technology security professionals are expected to master. It provides business management the confidence that consultants who have earned their accreditation possess the background and knowledge to provide effective security management and engineering support. Progent can provide a CISM support professional to help your organization in key security areas such as information security governance, risk assessment, data security program management, and crisis handling management. Find out more details about Progent's Certified Information Security Manager (CISM) Security Consulting Services.
  • Certified Information Systems Security Professionals (CISSP) Security Support Services
    Progent's CISSP consultants are security engineers who have earned CISSP certification through demonstrated experience, extensive study, and formal examination. CISSP Certification recognizes mastery of a worldwide standard for information security. American National Standards Institute has granted the CISSP status official recognition in the field of information security under ISO/IEC 17024. Fields of knowledge included within CISSP include security management practices, security design and test systems, access permission methodology, software development security, operations security, hardware security, encryption, telecommunications, Internet security, and business continuity planning. Find out the details concerning Progent's Certified Information Systems Security Professionals (CISSP) Consulting Assistance.
  • Information Systems Security Architecture Professionals (ISSAP) Consulting Services
    Progent's ISSAP certified security experts are consultants who have been awarded ISSAP status as a result of rigorous examination and substantial experience. field experience with network security architecture. ISSAP consultants have in-depth understanding of access management mechanisms and techniques, phone system and network infrastructure security, cryptography, requirements analysis, business continuity planning (BCP) and DRP, and physical security integration. Progent's ISSAP-certified security specialists can help your company with all aspects of secure network architecture. Find out additional details concerning Progent's ISSAP Certified Protected IT Infrastructure Consulting Assistance.
  • Certified Information Systems Auditor Consulting Expertise
    The Certified Information Systems Auditor (CISA) accreditation is an important achievement that signifies expertise in information system security auditing. Certified by ANSI, the CISA accreditation has consultants undergo an extensive test administered by the ISACA professional association. Progent can provide the services of a CISA-qualified security audit engineer able to assist businesses in the fields of information systems audit process, information technology administration, network assets and architecture lifecycle, IT service delivery, safeguarding information resources, and business continuity planning. Learn additional details concerning Progent's Certified Information Systems Auditor (CISA) Consulting Services.
  • GIAC (Global Information Assurance Certification) Consulting Expertise
    Global Information Assurance Certification was established in 1999 to certify the knowledge of IT security professionals. GIAC's mission is to assure that a certified professional has the knowledge appropriate to deliver support in critical categories of system, information, and program security. GIAC accreditations are recognized by businesses and government organizations all over the world including and the U.S. NSA. Progent offers the help of certified security engineers for all of the network security capabilities covered within GIAC accreditation topics such as auditing security systems, security incident handling, intrusion detection, and web-based services security. Learn more details about Progent's GIAC Professional Expertise.
Contact Progent for Computer Security Help
If you want computer security consulting, phone Progent at 800-993-9400 or see Contact Progent.

© 2002- 2017 Progent Corporation. All rights reserved.