Introduction to Progent's Security Consulting Services
Progent's certified computer security consultants can provide a wide range of professional services designed to assist companies of any size to detect and correct security vulnerabilities, defend against attacks, remediate any damage caused by a breach of protection, and meet government mandates for reporting security incidents. Progent delivers remote and in person service and also has developed economical fixed-cost security assessment bundles to complement Progent's standard time-based pricing.

Service delivery alternatives available from Progent are:

  • Remote Security Services
    Most security issues can be addressed remotely by a combination of telephone assistance and remote data access between Progent's Technical Response Center (TRC) and a customer's computer system. Progent's Technical Response support team includes network security professionals with the experience and the tools to solve even the most challenging problems quickly, making your service expenses reasonable and reducing downtime. Progent provides security assistance on a by-the-minute basis without minimum billing for remote support. Progent's pricing structure avoids scenarios where quick solutions result in major expenses. Progent also has available a number of fixed-price remote security and compliance evaluation packages that represent exceptional value by leveraging Progent's sophisticated network scanning technology and Progent's consulting experience to produce a professional and thorough picture of your information system vulnerability.

  • On-premises Security Services
    In cases where on-site support is required, Progent can dispatch a field technician to larger cities across the U.S. Progent's certified security engineers are also available to assist with projects that call for high-level security specialists to be on site anywhere in the U.S., and Progent's most comprehensive security assessment bundles for enterprises include the services of a team of qualified security engineers at your location.

  • Time-critical Security Support Services
    For urgent help with critical network security issues, your company can get in touch with a seasoned online support specialist by contacting Progent's roster of certified security professionals available at Progent's Technical Response Center. Progent's emergency online security service staff is ready to offer effective and affordable help with security crises that threaten the viability of your IT network. Progent's accredited consultants are certified to support systems based on Microsoft, Linux, Mac OS X, Sun, and popular versions of UNIX. Progent's broad range of services encompasses firewall technology, e-mail systems, secure network architecture, and information restoration. Progent's support staff has been awarded the industry's top security credentials including Global Information Assurance Certification and ISSAP. Progent also offers immediate access to online Cisco-certified CCIE network consultants who can deliver world-class assistance with complex network integration problems.

We've Been Hacked: What Do We Do Now?
Network Security ConsultantsIf your business is currently faced with a network security crisis and you do not have a detailed recovery plan, go to Progent's Remote Computer Help to see how to receive fast assistance. Progent provides remote assistance from experienced engineers and can refer problems to certified security specialists if necessary. Your company does not have to be a current Progent customer to receive emergency help for a security breakdown, but you can sign up as a Progent customer ahead of time for free and your standing as a registered client could save precious time when there is a crisis.

Typically, smaller companies have no recovery plan in the event of a successful attack. This is risky, since the damage from a serious security attack can be even more catastrophic for a small business than for a large enterprise. Progent's security specialists can assist your company to design an efficient response and incident reporting procedure that reduces the IT system disruption resulting from an attack. The step-by-step post-attack response model outlined by GIAC is Progent's recommended procedure for handling a serious security penetration.

Areas of Progent's Security Services
Coordinating data protection and planning for restoring critical data and functions after a security breach demands a continual effort involving a variety of tools and procedures. Progent's security consultants can assist your business at all levels in your attempt to guard your IT system and remain in compliance, Progent's services range from security assessments to creating a complete security strategy. Key areas supported by Progent's security engineers include Planning and Prevention, Information Restoration and Security Forensics, plus Managed Protection from Email-Borne Threats.

  • Planning, Implementing, and Validating Secure Environments
    Every organization ought to develop a carefully considered security strategy that incorporates both preventive and responsive elements. The pre-attack plan is a set of precautions that works to minimize vulnerabilities. The post-attack plan specifies activities to help security personnel to inventory the damage caused by an attack, remediate the damage, record the event, and revive network activity as soon as feasible. Progent can advise you how to design protection into your company processes, install scanning utilities, create and implement a safe network infrastructure, and recommend procedures and policies to enhance the protection of your network. Progent's security professionals are available to assist you to set up a firewall, deploy safe remote connectivity to email and files, and install an effective VPN. If your company is looking for an affordable way for outsourcing your security management, Progent's Round-the-clock Monitoring Options include automated online network monitoring and fast resolution of emergencies.
  • System Recovery and Failure Analysis
    Progent provides expertise in restoring networks and devices that have been hacked, are suspect, or have ceased to function as a result of a security breakdown. Progent can help evaluate the damage caused by the attack, restore ordinary functions, and retrieve data compromised owing to the attack. Progent's certified specialists can also oversee a comprehensive forensic evaluation by going over activity logs and utilizing a variety of proven assessment techniques. Progent's background with security consulting reduces your off-air time and allows Progent to recommend efficient strategies to prevent or contain new attacks.
  • Email Security with Spam Filtering, Virus Protection, Content Filtering, and Data Leakage Prevention
    Email Guard is Progent's email security platform that incorporates the services and infrastructure of top data security vendors to provide centralized management and comprehensive security for all your inbound and outbound email. The powerful architecture of Email Guard managed service combines cloud-based filtering with an on-premises security gateway appliance to offer advanced protection against spam, viruses, Dos Attacks, Directory Harvest Attacks, and other email-based threats. The Cloud Protection Layer acts as a preliminary barricade and keeps the vast majority of threats from reaching your security perimeter. This decreases your vulnerability to external attacks and saves system bandwidth and storage space. Email Guard's onsite gateway device provides a deeper level of inspection for incoming email. For outbound email, the on-premises gateway provides AV and anti-spam protection, protection against data leaks, and encryption. The local security gateway can also help Exchange Server to monitor and safeguard internal email traffic that stays inside your security perimeter. Learn more about Progent's Email Guard Spam Filtering, Virus Defense, Content Filtering and Data Loss Prevention.
Advanced Security Expertise Offered by Progent
Progent's security consultants offer advanced support in key areas of IT security including:
  • Vulnerability Evaluation and Compliance Testing
    Progent offers experience with security auditing software such as Microsoft Baseline Security Analyzer or LANguard from GFI for performing a set of automatic network scans to uncover possible security gaps. Progent has extensive experience with scanning utilities and can assist your company to analyze assessment results and respond efficiently. Progent's security consultants also offer web software validation and can conduct expert evaluation of enterprise-wide security to validate your company's compliance with key global security standards including HIPAA, NIST, and ISO 17799. Also, Progent can evaluate the effectiveness of your wireless security including stationary wireless equipment as well as mobile devices. Get more details concerning Progent's Security Vulnerability Audits and Security Compliance Assessment.
  • Security Inventory Packages for Small Businesses
    Progent offers two ultra-affordable security inventory scanning bundles intended to allow small companies to get an independent network security assessment from an accredited security expert. With Progent's External Security Inventory Checkup, an engineer administers an extensive examination of your network from outside your firewall to determine possible weaknesses in the security posture you expose to the public. With Progent's Internal Security Inventory Checkup, a certified security professional runs a network scan from an authorized machine within your company firewall to determine your exposure to inside attacks. The two security inventory services are set up and run from a protected remote site. The project is implemented by a consultant who has earned high-level security accreditations who produces a report that summarizes and analyzes the data collected by the scan and suggests cost-effective remediation where call for.
  • Security Vulnerability Evaluation Packages for Large Businesses
    Progent's qualified security consultants can provide a selection of set-price network security audit service packages created for institutions who need to comply with security standards required by state agencies or by vendors. Progent's security evaluation packages offer larger businesses an opportunity to get a professional look at the strength of their security environment. For each security evaluation bundle, Progent engineers with top security credentials evaluate and report on scanned information and provide recommendations for effective improvements. The different security evaluation packages include an extra-cost alternative for on-premises security engineers anywhere in the U.S.
  • Migrating from Microsoft Internet Security and Acceleration (ISA) Server and Microsoft Forefront Threat Management Gateway 2010
    Microsoft ISA Server and the newer Forefront TMG 2010 are software solutions that contain an application-aware firewall able to defend networks from external and internal threats. The two platforms provide in-depth inspection of network protocols to detect threats that can elude legacy firewalls. ISA Server 2006 was superseded by Forefront TMG 2010, which is based on ISA Server 2006's architecture while providing a number of enhanced capabilities. Forefront TMG 2010 has in turn been retired by Microsoft, and the security features provided by the platform are now usually handled by purpose-built hardware devices from companies such as Cisco, Check Point, Juniper and WatchGuard. (See Cisco ASA 5500-X Firewall with Firepower Services configuration and support.) Progent provides advanced Microsoft Forefront TMG 2010 support services and ISA Server 2006 consulting services to help you manage and debug your legacy firewall environment, and Progent can help your organization to upgrade smoothly to a modern security solution by providing planning, configuration, optimization, training and debugging.
  • Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Series Firewalls, and PIX Security Appliances Configuration and Debugging
    Cisco CCIE Network Security EngineersThe new Cisco ASA 5500-X Series of firewalls with Firepower Services offer significantly more performance than Cisco's legacy firewalls and have superseded the ASA 5500 and PIX 500 firewalls for new installations. Following Cisco's purchase of Sourcefire, the whole family of ASA 5500-X devices can be configured to enable Firepower Services, based on Sourcefire's Snort technology, which is the world's most popular intrusion protection system. Firepower services provide powerful new features including advanced malware protection (AMP), URL filtering, dynamic threat analytics, and automation. Progent's Cisco-qualified CCIE network consultants can help you to maintain your legacy PIX or Cisco ASA 5500 firewalls or upgrade to Cisco ASA 5500-X firewalls with Firepower Services. Progent's consultants offer online and on-premises support for ASA 5500-X firewalls with Firepower Services and can help your business to plan, configure, tune, administer and debug firewall solutions built around Cisco ASA 5500-X firewalls with Firepower Services. Learn more details about Cisco ASA Firewalls with Firepower Services integration and debugging services.
  • Additional Firewall and Virtual Private Network (VPN) Solutions
    In addition to being expert in a broad array of protection solutions available from Microsoft and Cisco, Progent offers small and mid-size businesses expert engineering services for products from other popular firewall and Virtual Private Network vendors including:
  • SIEM Integration and Support
    Security information and event management (SIEM) software and services are designed to interpret the enormous amounts of information collected in security event records created by multiple sources including network appliances, servers, and applications and tools. SIEM applications analyzes the security logs from these various sources and produces consolidated reports of security incidents as required by government regulations and industry compliance guidelines. Progent's GIAC-certified network security experts and Cisco-certified network consultants can help organizations to design, install and manage a SIEM solution that helps them to understand the behavior of attacks and comply with event reporting requirements. (See Progent's Security information and Event Management solutions.)
Progent's Security Certifications
Progent's security specialists have earned some of the most respected accreditations offered in the security industry. All of these certifications demand extensive testing and proven work background to guarantee that candidates have mastered a substantial amount of security knowledge and methodologies and can provide high-level solutions to information networks of any size.
  • Certified Information Security Manager Security Support Services
    CISM identifies the fundamental competencies and worldwide benchmarks of service that IT security professionals are required to achieve. It provides business management the confidence that those who have been awarded their accreditation have the experience and knowledge to offer effective security administration and engineering support. Progent can offer a CISM-certified expert to help your organization in vital security disciplines such as information security governance, vulnerability management, information security process management, and crisis response support. Get more information about Progent's CISM Security Consulting Services.
  • Certified Information Systems Security Professionals (CISSP) Security Consulting Expertise
    Progent's Certified Information Systems Security Professionals (CISSPs) are security specialists who have been awarded CISSP accreditation as a result of demonstrated experience, extensive study, and exhaustive testing. CISSP qualification indicates mastery of a worldwide standard for information security. American National Standards Institute has given the CISSP status official recognition in the area of information security under ISO/IEC 17024. Areas of expertise covered within CISSP include security administration practices, security architecture and models, access permission methodology, software development security, business processes security, physical security, encryption, communications, Internet security, and business continuity planning. Learn the details about Progent's Certified Information Systems Security Professionals (CISSP) Consulting Expertise.
  • ISSAP Consulting Services
    Progent's ISSAP certified security consultants are experts who have been awarded ISSAP status as a result of rigorous testing and extensive hands-on work with network security design. ISSAP consultants have acquired in-depth understanding of access management systems and methodologies, telecommunications and network security, cryptography, requirements analysis, business continuity planning (BCP) and DRP, and physical security integration. Progent's ISSAP-qualified security experts can assist your company with all phases of architecture security. Read more details about Progent's ISSAP Accredited Secure Network Infrastructure Consulting Support.
  • Certified Information Systems Auditor (CISA) Professional Services
    The CISA credential is an important qualification that represents expertise in information system security audit and control. Accredited by the American National Standards Institute, the CISA accreditation requires that candidates pass a comprehensive examination administered by the ISACA international professional association. Progent offers the expertise of a CISA-qualified security engineer trained to assist businesses in the fields of information systems audit services, IT enforcement, network assets and infrastructure planned useful life, IT service delivery, protecting data assets, and business continuity preparedness. Read more information about Progent's CISA Professional Assistance.
  • Global Information Assurance Certification Consulting Expertise
    Global Information Assurance Certification was established in 1999 to certify the skill of computer security professionals. GIAC's mission is to assure that an accredited security consultant has the skills necessary to deliver services in key categories of network, data, and application program security. GIAC certifications are acknowledged by companies and government organizations all over the world including and the U.S. National Security Agency. Progent can provide the support of certified security engineers for any of the security services addressed under GIAC accreditation programs such as auditing networks, incident response, intrusion detection, and web application security. Learn the details concerning Progent's Global Information Assurance Certification Professional Expertise.
Depend on Progent for Computer Security Consulting Services
If you need security consulting, phone Progent at 800-993-9400 or visit Contact Progent.

© 2002- 2017 Progent Corporation. All rights reserved.