Overview of Progent's Security and Compliance Support Services
Progent's certified computer security and compliance experts can provide a broad range of support services intended to help businesses of any size to identify and eliminate security weaknesses, defend against malicious attacks, recover from the issues resulting from a breakdown of security, and comply with government requirements for protecting information and reporting security incidents. Progent can provide a choice of service modes:

  • On-demand remote and on-premises support billed to the nearest minute
  • Continual managed services invoiced at an affordable flat monthly fee
  • Value-priced service bundles for a one-time security and compliance assessment
On-demand Security Support Services
After you register for Progent's services (signing up is free), you can receive as-needed online or on-premises assistance from one of Progent security and compliance expert. This classic support model is essentially reactive and optimized for rapidly resolving IT issues that are affecting your network or that have stymied your own support staff. Common examples include replacing a firewall appliance or VPN connection, installing a vital security update for a Cisco switch, setting up compliant access to a public cloud, or recovering from a ransomware attack. These services are billed to the nearest minute, which eliminates the frustrating situation of getting big bills for quick repairs.

Delivery alternatives for Progent's on-demand support include:

  • Remote Security Support Services
    The majority security issues can be handled online via a combination of phone-based help and a remote connection between Progent's Technical Response Center (TRC) and a customer's computer. Progent's TRC group can deliver online security support by offering efficient access to consultants who have the background and resources to resolve many of the most difficult problems quickly, keeping your support costs affordable and minimizing downtime.
  • On-premises Security Services
    For cases where on-premises assistance is necessary, Progent can dispatch a technical expert to major metropolitan areas across the U.S. Progent can also dispatch a security specialist with top certifications and world-class skills to any location in the country.
Progent's accredited engineers are certified to support systems based on Microsoft, Linux, Macintosh, Sun Solaris, and major versions of UNIX. Progent's wide selection of consulting services addresses firewall technology, email and messaging security, secure network architecture, and information restoration. Progent's technical support team has earned the industry's most advanced security certifications including CISM and Information System Security Architecture Professional. Progent also can provide fast access to online Cisco CCIE network infrastructure consultants who can deliver world-class support with tough network integration problems.

ProSight Fixed-price Managed Services for Information Assurance
Progent's value-priced ProSight suite of managed services is intended to provide small and mid-size organizations with enterprise-class support and state-of-the-art technology for all facets of information assurance. ProSight managed services offered by Progent include:

  • ProSight Active Security Monitoring: Endpoint Protection and Ransomware Recovery
    ProSight Active Security Monitoring (ASM) is an endpoint protection (EPP) solution that incorporates next generation behavior analysis technology to defend endpoint devices as well as physical and virtual servers against new malware assaults such as ransomware and email phishing, which routinely get by traditional signature-based AV products. ProSight ASM protects local and cloud resources and provides a single platform to manage the complete malware attack progression including protection, infiltration detection, containment, remediation, and post-attack forensics. Key features include single-click rollback with Windows VSS and automatic system-wide immunization against newly discovered threats. Read more about Progent's ProSight Active Security Monitoring endpoint protection and ransomware recovery.

  • ProSight Enhanced Security Protection (ESP): Unified Endpoint Security
    Progent's ProSight Enhanced Security Protection (ESP) services offer ultra-affordable in-depth security for physical servers and VMs, workstations, mobile devices, and Exchange email. ProSight ESP uses contextual security and advanced heuristics for continuously monitoring and responding to security assaults from all vectors. ProSight ESP provides two-way firewall protection, penetration alarms, device control, and web filtering via cutting-edge technologies incorporated within a single agent managed from a unified console. Progent's security and virtualization consultants can help your business to plan and configure a ProSight ESP environment that meets your organization's specific needs and that allows you demonstrate compliance with government and industry data protection regulations. Progent will help you define and implement policies that ProSight ESP will manage, and Progent will monitor your network and react to alarms that call for immediate action. Progent's consultants can also help your company to set up and test a backup and restore system like ProSight Data Protection Services (DPS) so you can recover quickly from a destructive security attack like ransomware. Find out more about Progent's ProSight Enhanced Security Protection unified physical and virtual endpoint security and Microsoft Exchange email filtering.

  • ProSight Data Protection Services: Managed Backup
    ProSight Data Protection Services offer small and medium-sized businesses a low cost and fully managed solution for secure backup/disaster recovery (BDR). Available at a low monthly rate, ProSight DPS automates and monitors your backup processes and allows fast restoration of critical data, applications and virtual machines that have become unavailable or corrupted due to component failures, software bugs, natural disasters, human error, or malicious attacks like ransomware. ProSight DPS can help you protect, recover and restore files, folders, apps, system images, as well as Microsoft Hyper-V and VMware images. Critical data can be protected on the cloud, to an on-promises device, or to both. Progent's cloud backup consultants can provide advanced expertise to set up ProSight DPS to to comply with regulatory standards like HIPPA, FIRPA, PCI and Safe Harbor and, when needed, can assist you to restore your business-critical information. Read more about ProSight DPS Managed Backup and Recovery.

  • ProSight Email Guard: Spam Filtering, Data Leakage Protection and Content Filtering
    ProSight Email Guard is Progent's email filtering and encryption platform that incorporates the services and infrastructure of leading data security companies to provide centralized management and comprehensive protection for your inbound and outbound email. The hybrid structure of Email Guard managed service integrates cloud-based filtering with an on-premises gateway device to provide complete defense against spam, viruses, Denial of Service Attacks, DHAs, and other email-borne threats. Email Guard's cloud filter serves as a first line of defense and blocks most unwanted email from making it to your network firewall. This reduces your vulnerability to inbound threats and conserves system bandwidth and storage space. Email Guard's onsite gateway device provides a further level of analysis for incoming email. For outbound email, the local gateway offers anti-virus and anti-spam filtering, protection against data leaks, and email encryption. The onsite gateway can also help Exchange Server to monitor and safeguard internal email traffic that stays within your security perimeter. Find out more about Progent's ProSight Email Guard spam filtering, virus defense, content filtering and data loss prevention.

  • ProSight WAN Watch: Infrastructure Management
    ProSight WAN Watch is an infrastructure management service that makes it simple and affordable for smaller organizations to map, track, enhance and troubleshoot their networking hardware like routers, firewalls, and wireless controllers as well as servers, printers, endpoints and other networked devices. Incorporating state-of-the-art RMM technology, WAN Watch makes sure that network diagrams are always current, captures and displays the configuration information of almost all devices connected to your network, tracks performance, and generates alerts when problems are discovered. By automating time-consuming management processes, WAN Watch can cut hours off ordinary tasks like network mapping, expanding your network, finding appliances that require critical updates, or identifying the cause of performance bottlenecks. Learn more details about ProSight WAN Watch network infrastructure management services.

  • ProSight LAN Watch: Server and Desktop Monitoring
    ProSight LAN Watch is Progentís server and desktop remote monitoring service that incorporates advanced remote monitoring and management (RMM) technology to help keep your IT system running efficiently by tracking the health of critical computers that drive your business network. When ProSight LAN Watch uncovers a problem, an alert is transmitted immediately to your designated IT management personnel and your Progent consultant so that all potential problems can be resolved before they can impact your network Find out more about ProSight LAN Watch server and desktop monitoring consulting.

  • ProSight Virtual Hosting: Hosted Virtual Machines at Progent's World-class Data Center
    With Progent's ProSight Virtual Hosting service, a small organization can have its critical servers and apps hosted in a protected fault tolerant data center on a high-performance virtual host set up and maintained by Progent's IT support professionals. Under Progent's ProSight Virtual Hosting service model, the client retains ownership of the data, the OS software, and the apps. Since the environment is virtualized, it can be moved immediately to a different hosting environment without requiring a lengthy and difficult reinstallation process. With ProSight Virtual Hosting, you are not tied one hosting service. Learn more details about ProSight Virtual Hosting services.

  • ProSight IT Asset Management: Network Documentation Management
    ProSight IT Asset Management service is an IT infrastructure documentation management service that allows you to create, update, retrieve and safeguard data related to your network infrastructure, procedures, business apps, and services. You can instantly find passwords or IP addresses and be alerted automatically about upcoming expirations of SSL certificates ,domains or warranties. By cleaning up and organizing your IT infrastructure documentation, you can save as much as 50% of time spent trying to find vital information about your network. ProSight IT Asset Management includes a common location for holding and collaborating on all documents required for managing your network infrastructure like standard operating procedures (SOPs) and self-service instructions. ProSight IT Asset Management also offers advanced automation for collecting and relating IT data. Whether youíre making improvements, performing regular maintenance, or reacting to an emergency, ProSight IT Asset Management delivers the information you need when you need it. Learn more details about Progent's ProSight IT Asset Management service.
ProSight Network Audits
Progent's ProSight Network Audits are a quick and affordable way for small and medium-size businesses to get an objective evaluation of the overall health of their information system. Powered by some of the top remote monitoring and management (RMM) tools available, and overseen by Progent's certified group of information technology experts, ProSight Network Audits help you see how well the deployment of your core infrastructure devices conform to industry leading practices. Both the Basic and Advanced options for ProSight Network Audit services are offered at a budget-friendly, one-time cost and provide instant benefits such as a cleaner Active Directory environment. Both versions also include one year of state-of-the-art remote network monitoring and management. Benefits can include easier network management, better compliance with information security standards, more efficient utilization of IT assets, quicker problem resolution, more reliable backup and recovery, and increased uptime. Read more about Progent's ProSight Network Audits IT infrastructure assessment.

Progent's ProSight Ransomware Preparedness Report
Progent's ProSight Ransomware Preparedness Report is an affordable service built around a phone discussion with a Progent backup/recovery consultant. The interview is designed to help evaluate your company's ability to block or recover rapidly from a ransomware incident. Progent will consult with you personally to gather information about your existing antivirus tools and backup system, and Progent will then produce a custom Basic Security and Best Practices Report describing how you can apply best practices to build an efficient security and backup system that meets your company's requirements. For additional information, see The ProSight Ransomware Preparedness Report Service.

Set-price Security Evaluation and Validation Packages
Progent offers a selection of fixed-price security assessment bundles that provide high value by utilizing Progent's advanced network monitoring and analysis tools as well as Progent's consulting skills to create an objective and comprehensive assessment of your network security profile.

  • Security Inventory Service Bundles for Small Businesses
    Progent offers two ultra-affordable security inventory scanning service packages designed to enable small businesses to get a professional security evaluation from an accredited security engineer. With Progent's External Security Inventory Scan, a consultant manages an extensive examination of your IT system from beyond your firewalled perimeter to identify possible risks in the security profile you expose to the outside world. With Progent's Internal Security Inventory Scan, a certified security consultant runs a network scan using an authorized machine within your firewalled perimeter to evaluate your vulnerability to internal threats. The two security inventory services are set up and executed from a secured offsite location. The project is administered by a consultant who has earned advanced security certifications and who creates a report that details and evaluates the information captured by the scan and suggests practical improvements where appropriate.
  • Security Vulnerability Evaluation Bundles for Enterprises
    Progent offers three levels of fixed-price security evaluation service packages designed for enterprises who want to meet compliance standards required by government or industry agencies. Progent's security assessment service bundles offer enterprises a chance to obtain a professional look at the strength of their security posture. For each security evaluation package, Progent consultants with advanced security credentials analyze and report on collected data and provide suggestions for cost-effective improvements. All the network security audit bundles include an extra-cost option for onsite consultants anywhere in the United States.
  • Stealth Penetration Testing
    Stealth penetration testing, often called PEN testing, is an accepted technique for helping organizations to find out how open their network systems are to modern attacks. Progent's stealth penetration testing test how well your existing security procedures and technologies stand up to authorized but unannounced intrusion attempts launched by Progent's certified security specialists utilizing cutting-edge hacking methods. Read about Progent's stealth penetration testing (PEN Test) services.
Our System Has Been Hacked: What Should We Do?
Network Security ConsultantsIf you are now fighting a security emergency and you have not prepared a detailed response plan, go to Progent's Remote Network Support to find out how to receive fast help. Progent provides online assistance from skilled network technicians and can escalate trouble tickets to certified security specialists if required. Your business does not have to be a current Progent client to receive urgent help for a security breakdown, but you can sign up as a Progent client in advance for free and your status as a current customer can save valuable time in an emergency.

Usually, smaller businesses do not have a recovery plan in the event of a successful attack. This is not good, because the damage from a serious security assault can be even more devastating for a small company than for a big corporation. Progent's security engineers can assist your company to create an efficient recovery and event reporting procedure that minimizes the IT system disruption following an attack. The step-by-step post-attack handling procedure outlined by GIAC (Global Information Assurance Certification) is Progent's preferred method for responding to a serious security attack.

High-value Security Services Offered by Progent
Progent's certified security consultants offer specialized help in key facets of network protection such as:

  • Information Risk Audits and Compliance Assessment
    Progent offers expertise with information risk evaluation utilities such as Microsoft Baseline Security Analyzer or LANguard from GFI for performing a variety of automatic network scans to reveal possible security gaps. Progent has broad experience with these utilities and can assist you to understand assessment results and respond efficiently. Progent's security engineers also can perform web application testing and can perform expert assessments of corporate-wide security to validate your organization's compliance with key industry security standards including FISMA, NIST, and ISO. Also, Progent can evaluate the effectiveness of your wireless security including stationary wireless appliances plus portable handsets. Learn more information about Progent's Vulnerability Audits and Compliance Testing.
  • Designing, Building, and Validating Secure Environments
    Any organization ought to have a carefully considered security strategy that incorporates both preventive and reactive steps. The proactive plan is a set of precautions that works to minimize security holes. The post-attack plan specifies activities to assist security personnel to evaluate the damage resulting from an attack, remediate the damage, document the event, and restore business functions as quickly as possible. Progent can advise you how to design security into your company operations, set up scanning software, create and build a safe IT infrastructure, and propose processes and policies to optimize the safety of your information system. Progent's security professionals are available to assist you to configure a firewall, deploy secure online and mobile access to email and files, and configure an effective VPN. If you are interested in an affordable option for outsourcing your network security management, Progent's Round-the-clock Network Support Services include continual online network tracking and quick resolution of emergencies.
  • System Restoration and Failure Analysis
    Progent has expertise in restoring networks and servers that have been hacked, are quarantined, or have ceased to function as a result of a security penetration. Progent can show you how to determine the damage caused by the breach, restore normal business operations, and recover information compromised as a result of the breach. Progent's security specialists can also oversee a comprehensive forensic evaluation by examining activity logs and utilizing other advanced assessment techniques. Progent's experience with security issues reduces your business disruption and permits Progent to propose efficient strategies to prevent or contain new attacks.
  • Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Series Firewalls, and PIX Security Appliances Configuration and Debugging
    Cisco Certified CCIE Network Security SpecialistsThe new Cisco ASA 5500-X Family Next-Generation Firewalls with Firepower Services offer significantly more performance than Cisco's earlier PIX and ASA 5500 firewalls and have replaced the ASA 5500 and PIX firewalls for new deployments. After Cisco's acquisition of Sourcefire, the entire family of ASA 5500-X devices can be configured to enable Firepower Services, based on Sourcefire's Snort technology, which is the market's most deployed intrusion protection system (IPS). Firepower services provide enhanced features such as advanced malware protection (AMP), URL filtering, real-time threat analytics, and security automation. Progent's Cisco-qualified CCIE network experts can assist your company to maintain your legacy PIX or ASA 5500 security appliances or migrate to Cisco ASA 5500-X firewalls with Firepower Services. Progent's consultants offer online and on-premises support for ASA 5500-X firewalls with Firepower Services and can assist your organization to plan, configure, optimize, manage and debug firewall solutions built on Cisco ASA 5500-X firewalls with Firepower Services. Learn additional information about Cisco ASA 5500-X Firewalls with Firepower integration and troubleshooting support.
  • Additional Firewall and Virtual Private Network Solutions
    In addition to being expert in a broad array of network security technologies from Microsoft and Cisco, Progent can provide small businesses top-level support for solutions from other important firewall and VPN suppliers such as:
  • SIEM Security Information and Event Management Integration and Support
    Security information and event management (SIEM) software and services are intended to digest the massive quantity of information collected in security incident logs created by multiple sources including network infrastructure appliances, operating systems, and application software and tools. SIEM software analyzes the security logs from these various sources and creates summary reports of security incidents as mandated by government regulations and industry compliance standards. Progent's GIAC-certified network security consultants and Cisco-certified network experts can assist organizations to plan, deploy and manage a SIEM solution that helps them to see the behavior of security incidents and comply with event reporting regulations. (See Progent's Security information and Event Management (SIEM) solutions.)
Progent's Security Credentials
Progent's security engineers have earned some of the most prestigious accreditations offered in the industry. These certifications demand exhaustive testing and proven field experience to guarantee that candidates have acquired expertise with a significant body of security information and techniques and can offer advanced solutions to information environments of any size.
  • CISM Security Support Expertise
    Certified Information Security Manager (CISM) defines the core skills and international standards of service that IT security professionals are required to master. CISM offers executive management the confidence that consultants who have earned their accreditation possess the background and skill to provide efficient security management and engineering support. Progent can offer a CISM-certified expert to assist your enterprise in key security disciplines including information security governance, risk assessment, data security program control, and incident handling support. Read additional details about Progent's Certified Information Security Manager (CISM) Security Support Services.

  • CISSP Security Consulting Expertise
    Progent's CISSP consultants are security engineers who have been awarded CISSP status through verified experience, extensive study, and exhaustive examination. CISSP Certification recognizes expertise in an international standard for IT security. ANSI has given the CISSP credential official recognition in the area of information security under ISO/IEC 17024. Fields of expertise included within CISSP include security management practices, security architecture and test systems, connection permission methodology, applications development security, business processes security, hardware security, cryptography, communications, network security, and business continuity planning. Get additional information concerning Progent's Certified Information Systems Security Professionals (CISSP) Support Assistance.

  • Information Systems Security Architecture Professionals (ISSAP) Consulting Services
    Progent's ISSAP qualified security experts are consultants who have been awarded ISSAP status as a result of thorough testing and extensive hands-on work with network security design. ISSAP security experts have acquired in-depth knowledge of access control systems and techniques, telecommunications and network protection, cryptography, needs evaluation, business continuity planning (BCP) and DRP, and physical security. Progent's ISSAP-certified security specialists can assist your company with all aspects of architecture security. Get the details concerning Progent's ISSAP Certified Protected IT Infrastructure Engineering Services.

  • CISA Support Expertise
    The Certified Information Systems Auditor accreditation is an important achievement that represents expertise in IS security audit and control. Accredited by ANSI, the CISA credential has candidates undergo an extensive examination given by the ISACA international professional group. Progent offers the expertise of a CISA-certified security audit consultant trained to assist businesses in the areas of information systems audit services, IT administration, systems and architecture lifecycle, IT support, safeguarding data assets, and disaster recovery planning. Learn more details about Progent's Certified Information Systems Auditor Support Services.

  • GIAC Consulting Expertise
    GIAC was established in 1999 to validate the skill of information technology security experts. GIAC's goal is to verify that a certified professional possesses the knowledge necessary to deliver services in key categories of network, information, and application program security. GIAC accreditations are recognized by companies and institutions all over the world including and the U.S. National Security Agency. Progent can provide the expertise of certified consultants for any of the network security capabilities covered under GIAC accreditation programs such as auditing IT infrastructure, incident handling, traffic analysis, and web services security. Learn more details about Progent's GIAC Consulting Expertise.
Depend on Progent for Computer Security Consulting Services
If you need network security help, telephone Progent at 800-993-9400 or see Contact Progent.

© 2002- 2018 Progent Corporation. All rights reserved.