Overview of Progent's Security Consulting Services
Progent's certified computer security and compliance consultants can provide a wide selection of services intended to help businesses of all sizes to uncover and correct security weaknesses, block attacks, recover from the issues caused by a breakdown of protection, and meet government mandates for guarding data and reporting security incidents. Progent offers a choice of service delivery models:

  • As-needed remote and on-premises assistance invoiced by the minute
  • Continual fully managed services billed at an affordable flat monthly rate
  • Set-price service bundles for a one-time security and compliance assessment
As-needed Security Support Services
After you register for Progent's services (signing up is free), you can get on-demand remote or onsite assistance from a Progent security and compliance consultant. This classic service model is primarily reactive and optimized for rapidly resolving technical issues that are impacting your productivity or that are beyond the scope of your in-house support staff. Common scenarios include replacing a firewall or VPN connection, implementing a vital security update for a Cisco switch, designing secure access to cloud-based resources, or recovering from a ransomware assault. These services are billed to the nearest minute, which avoids the annoying situation of getting big bills for quick repairs.

Delivery options for Progent's as-needed support include:

  • Remote Security Support Services
    The majority security-related problems can be handled online via a mix of phone support and a remote Internet connection between Progent's Technical Response Center (TRC) and a customer's computer. Progent's TRC group can provide online security support by offering efficient access to consultants with the background and resources to resolve many of the most difficult issues quickly, keeping your support expenses low and reducing lost productivity.
  • On-premises Security Services
    For cases where on-premises support is necessary, Progent can dispatch a technical expert to major cities across the U.S. Progent can also send a security specialist with high-level certifications and world-class skills to any location in the U.S.
Progent's security consultants are certified to provide help for systems based on Microsoft Windows, Linux, macOS and OS X, Solaris, and major derivatives of UNIX. Progent's broad selection of consulting services encompasses firewall technology, email security, secure network architecture, and information restoration. Progent's support staff has earned the world's top security accreditations including Certified Information Systems Auditor and Certified Information Systems Security Professional (CISSP). Progent also can provide fast access to online Cisco-certified CCIE network engineers who can provide world-class assistance with tough network technology problems.

ProSight Fixed-price Managed Services for Information Assurance
Progent's low-cost ProSight family of outsourced network management services is designed to provide small and mid-size businesses with enterprise-class support and state-of-the-art technology for all facets of information assurance. Managed services offered by Progent include:

  • ProSight Active Security Monitoring: Next Generation Endpoint Protection and Ransomware Defense
    Progent's ProSight Active Security Monitoring is an endpoint protection solution that incorporates cutting edge behavior-based machine learning technology to guard endpoint devices and servers and VMs against modern malware attacks like ransomware and file-less exploits, which routinely escape legacy signature-based anti-virus tools. ProSight ASM protects local and cloud-based resources and offers a single platform to automate the entire threat progression including filtering, infiltration detection, containment, cleanup, and post-attack forensics. Key capabilities include single-click rollback with Windows Volume Shadow Copy Service (VSS) and real-time system-wide immunization against newly discovered threats. Read more about Progent's ProSight Active Security Monitoring (ASM) endpoint protection and ransomware defense.

  • ProSight Enhanced Security Protection: Unified Endpoint Security
    Progent's ProSight Enhanced Security Protection (ESP) managed services deliver ultra-affordable multi-layer protection for physical servers and virtual machines, workstations, mobile devices, and Exchange email. ProSight ESP utilizes contextual security and advanced machine learning for round-the-clock monitoring and reacting to cyber assaults from all vectors. ProSight ESP offers two-way firewall protection, intrusion alerts, device management, and web filtering through cutting-edge technologies incorporated within a single agent accessible from a unified control. Progent's data protection and virtualization consultants can assist your business to design and configure a ProSight ESP environment that meets your organization's unique requirements and that helps you demonstrate compliance with government and industry information protection regulations. Progent will help you define and implement policies that ProSight ESP will manage, and Progent will monitor your network and react to alerts that call for immediate attention. Progent's consultants can also help you to set up and verify a backup and disaster recovery system such as ProSight Data Protection Services (DPS) so you can recover quickly from a potentially disastrous cyber attack like ransomware. Learn more about Progent's ProSight Enhanced Security Protection (ESP) unified physical and virtual endpoint security and Exchange email filtering.

  • ProSight DPS: Managed Backup
    ProSight Data Protection Services from Progent provide small and mid-sized organizations a low cost end-to-end solution for reliable backup/disaster recovery. For a low monthly cost, ProSight DPS automates your backup processes and enables rapid recovery of critical files, apps and virtual machines that have become unavailable or corrupted due to hardware breakdowns, software bugs, natural disasters, human mistakes, or malicious attacks such as ransomware. ProSight Data Protection Services can help you protect, recover and restore files, folders, apps, system images, as well as Microsoft Hyper-V and VMware virtual machine images. Important data can be backed up on the cloud, to an on-promises device, or to both. Progent's BDR specialists can provide world-class expertise to configure ProSight DPS to to comply with government and industry regulatory standards like HIPPA, FINRA, and PCI and, when necessary, can assist you to recover your business-critical information. Read more about ProSight DPS Managed Backup.

  • ProSight Email Guard: Inbound and Outbound Spam Filtering, Data Leakage Protection and Content Filtering
    ProSight Email Guard is Progent's email security solution that uses the services and infrastructure of top information security companies to provide centralized control and world-class security for all your inbound and outbound email. The powerful architecture of Progent's Email Guard managed service combines a Cloud Protection Layer with an on-premises gateway device to offer complete protection against spam, viruses, Denial of Service Attacks, Directory Harvest Attacks, and other email-based threats. Email Guard's cloud filter serves as a preliminary barricade and keeps the vast majority of threats from reaching your security perimeter. This decreases your exposure to inbound threats and saves system bandwidth and storage. Email Guard's on-premises security gateway device adds a further layer of analysis for inbound email. For outgoing email, the local gateway offers AV and anti-spam filtering, DLP, and email encryption. The on-premises security gateway can also help Exchange Server to monitor and safeguard internal email that originates and ends within your security perimeter. Find out more about Progent's ProSight Email Guard spam filtering, virus defense, content filtering and data loss prevention.

  • ProSight WAN Watch: Network Infrastructure Remote Monitoring and Management
    Progentís ProSight WAN Watch is an infrastructure monitoring and management service that makes it simple and inexpensive for smaller businesses to map, track, enhance and debug their connectivity appliances like routers and switches, firewalls, and access points plus servers, endpoints and other networked devices. Using cutting-edge Remote Monitoring and Management technology, ProSight WAN Watch makes sure that network diagrams are always updated, copies and manages the configuration information of almost all devices on your network, tracks performance, and generates alerts when potential issues are discovered. By automating time-consuming network management activities, ProSight WAN Watch can cut hours off ordinary tasks such as network mapping, expanding your network, locating devices that require important software patches, or isolating performance bottlenecks. Find out more about ProSight WAN Watch infrastructure management consulting.

  • ProSight LAN Watch: Server and Desktop Remote Monitoring and Management
    ProSight LAN Watch is Progentís server and desktop remote monitoring managed service that uses state-of-the-art remote monitoring and management techniques to help keep your network running at peak levels by tracking the state of vital assets that power your information system. When ProSight LAN Watch detects an issue, an alert is transmitted automatically to your specified IT personnel and your Progent engineering consultant so that any potential issues can be resolved before they have a chance to impact your network Learn more about ProSight LAN Watch server and desktop monitoring services.

  • ProSight Virtual Hosting: Hosted VMs at Progent's World-class Data Center
    With Progent's ProSight Virtual Hosting service, a small organization can have its key servers and apps hosted in a secure Tier III data center on a high-performance virtual machine host set up and managed by Progent's IT support professionals. With the ProSight Virtual Hosting service model, the customer retains ownership of the data, the operating system platforms, and the applications. Since the environment is virtualized, it can be ported immediately to a different hosting solution without a lengthy and difficult configuration procedure. With ProSight Virtual Hosting, you are not tied a single hosting service. Learn more details about ProSight Virtual Hosting services.

  • ProSight IT Asset Management: Network Infrastructure Documentation Management
    Progent's ProSight IT Asset Management service is an IT infrastructure documentation management service that makes it easy to create, maintain, retrieve and safeguard information about your network infrastructure, procedures, business apps, and services. You can instantly locate passwords or IP addresses and be alerted automatically about impending expirations of SSL certificates or domains. By updating and managing your IT documentation, you can save up to 50% of time thrown away looking for critical information about your IT network. ProSight IT Asset Management features a centralized repository for holding and collaborating on all documents required for managing your network infrastructure like standard operating procedures and self-service instructions. ProSight IT Asset Management also offers a high level of automation for gathering and relating IT information. Whether youíre making improvements, performing regular maintenance, or responding to an emergency, ProSight IT Asset Management delivers the knowledge you need the instant you need it. Learn more details about ProSight IT Asset Management service.
ProSight Network Audits
Progent's ProSight Network Audits offer a quick and affordable way for small and mid-size organizations to obtain an unbiased assessment of the overall health of their IT system. Based on a selection of the top remote monitoring and management platforms in the industry, and supervised by Progent's certified team of information technology professionals, ProSight Network Audits show you how well the deployment of your core infrastructure devices conform to industry best practices. Both the Basic and Advanced versions of ProSight Network Audit services are offered at a budget-friendly, one-time cost and deliver immediate benefits such as a cleaner Active Directory (AD) system. Both also come with a year of state-of-the-art remote network monitoring and management (RMM). Benefits can include simpler management, improved compliance with information security standards, more efficient utilization of IT resources, quicker problem resolution, more reliable backup and restore, and less downtime. Read more about Progent's ProSight Network Audits network infrastructure assessment.

The ProSight Ransomware Preparedness Report Service
The ProSight Ransomware Preparedness Report is an affordable service built around a brief interview with a Progent backup/recovery expert. The interview is intended to evaluate your organization's preparedness either to stop or recover quickly from a ransomware attack. Progent will consult with you directly to gather information concerning your existing security profile and backup/recovery system, and Progent will then produce a written Basic Security and Best Practices Report describing how you can follow industry best practices to build an efficient AV and backup/recovery system that meets your company's needs. For details, refer to Progent's ProSight Ransomware Preparedness Report.

Set-price Security Assessment and Verification Packages
Progent has put together a portfolio of fixed-price security evaluation packages that deliver exceptional value by deploying Progent's advanced network monitoring and analysis software as well as Progent's technical experience to create an unbiased and comprehensive evaluation of your IT environment security profile.

  • Security Assessment Service Bundles for Small Businesses
    Progent offers two ultra-affordable security inventory service packages intended to enable small businesses to obtain a professional security evaluation from a certified security engineer. With Progent's External Security Inventory Scan, a consultant manages an extensive assessment of your IT system from outside your corporate firewall to determine possible gaps in the security posture you expose to the outside world. With Progent's Internal Security Inventory Scan, a security expert runs a network scan from an authorized machine within your firewalled perimeter to evaluate your vulnerability to internal attacks. These two security inventory scans are set up and executed from a secured offsite location. The project is administered by a consultant who has earned high-level security certifications and who produces a document that describes and interprets the information collected by the security scan and recommend various enhancements where appropriate.
  • Security Vulnerability Evaluation Packages for Large Organizations
    Progent has developed three levels of flat-rate security assessment service bundles designed for enterprises who want to meet compliance standards required by government or industry regulators. Progent's security evaluation service bundles offer larger businesses an opportunity to get a professional assessment at the viability of their security profile. For each security assessment package, Progent consultants with advanced security credentials analyze and report on collected data and provide suggestions for cost-effective remediation. Each of the network security audit packages include an added-cost option for on-premises consultants at any location in the U.S.
  • Stealth Penetration Testing Services
    Stealth penetration testing, commonly referred to as PEN testing, is a critical technique for allowing organizations to find out how open their network systems are to modern threats. Progent's stealth penetration testing services check how effectively your existing security procedures and platforms stand up to authorized but unannounced penetration attempts managed by Progent's certified security experts using advanced hacking techniques. Read about Progent's stealth penetration testing services.
We've Been Hacked: What Do We Do?
Network Security ConsultantsIf you are currently experiencing a security crisis and you have not prepared a detailed recovery procedure, refer to Progent's Remote Computer Support to find out how to receive immediate help. Progent offers online help from skilled engineers and can escalate trouble tickets to high-level security specialists if necessary. Your organization does not have to be a current Progent client to get urgent support for a security breakdown, but you can register as a Progent customer in advance at no cost and your standing as a current customer can save valuable time during an emergency.

Typically, smaller organizations have no response plan in the event of a damaging penetration. This is not good, because the cost of a serious security assault can be more devastating for a small company than for a big enterprise. Progent's security consultants can help your you to design an efficient recovery and incident reporting procedure that minimizes the IT system disruption resulting from an attack. The formal incident handling model promoted by Global Information Assurance Certification is Progent's recommended procedure for handling a serious security attack.

Advanced Security Expertise Offered by Progent
Progent's certified security engineers offer world-class consulting in key facets of network protection such as:

  • Vulnerability Audits and Compliance Testing
    Progent provides experience with security auditing utilities like MS Baseline Security Analyzer or LANguard from GFI for performing a set of automatic system tests to reveal potential security holes. Progent has broad skills with monitoring utilities and can help you to understand assessment reports and respond efficiently. Progent's security engineers also offer web software validation and can conduct thorough evaluation of enterprise-wide security to validate your company's compliance with important global security standards such as HIPAA, NIST, and ISO 17799. Also, Progent can assess the strength of your wireless security including fixed wireless appliances as well as mobile handsets. Get more details about Progent's Information Risk Evaluation and Security Compliance Assessment.
  • Designing, Building, and Validating Secure Environments
    Every business ought to have a thoroughly thought out security strategy that includes both preventive and reactive elements. The proactive strategy is a collection of precautions that helps to reduce security holes. The reactive plan specifies procedures to assist security staff to evaluate the losses caused by a breach, remediate the damage, record the experience, and revive network activity as quickly as possible. Progent can show you how to incorporate security into your company processes, configure auditing utilities, create and build a safe network architecture, and recommend procedures and policies to enhance the protection of your information system. Progent's security experts are ready to assist you to set up a firewall, design safe online and mobile access to e-mail and data, and install an effective virtual private network (VPN). If you are interested in an economical way for jobbing out your security administration, Progent's Round-the-clock Network Support Options include automated remote network monitoring and quick resolution of problems.
  • Data Restoration and Failure Analysis
    Progent has expertise in restoring networks and servers that have been compromised, are quarantined, or have ceased to function following a security breakdown. Progent can help evaluate the damage caused by the breach, return your company to normal functions, and retrieve data compromised owing to the breach. Progent's certified specialists can also perform a comprehensive failure analysis by going over activity logs and utilizing a variety of advanced forensics techniques. Progent's background with security consulting minimizes your downtime and allows Progent to recommend efficient measures to prevent or contain future assaults.
  • Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Series Firewalls, and PIX 500 Firewalls Integration and Debugging
    Cisco CCIE Security ConsultantsThe new ASA 5500-X Family of firewalls with Firepower Services provide significantly more bang for the buck than Cisco's legacy PIX and ASA 5500 firewalls and have superseded the ASA 5500 and PIX 500 firewalls for new installations. Since Cisco's acquisition of Sourcefire, the entire line of Cisco ASA 5500-X devices can be provisioned to enable Firepower Services, based on Sourcefire's Snort technology, which is the world's most popular intrusion protection system (IPS). Firepower services provide powerful new capabilities such as advanced malware protection (AMP), URL filtering, real-time threat analytics, and automation. Progent's Cisco-qualified CCIE network experts can help you to maintain your current PIX or ASA 5500 security appliances and migrate efficiently to ASA 5500-X firewalls with Firepower Services. Progent's consultants can provide remote and onsite help with ASA 5500-X firewalls with Firepower Services and can help your organization to plan, deploy, optimize, administer and debug firewall solutions built around Cisco ASA 5500-X firewalls with Firepower Services. See more information about ASA Firewalls with Firepower Services configuration and troubleshooting services.
  • Additional Firewall and Virtual Private Network (VPN) Solutions
    In addition to supporting a wide array of security solutions available from Microsoft and Cisco, Progent can provide small and mid-size companies expert support for technologies from other popular firewall and VPN vendors including:
  • SIEM Integration and Support
    Security information and event management (SIEM) software and services are designed to make sense the enormous amounts of information represented by security incident logs generated by multiple sources such as network appliances, operating systems, and application software and tools. SIEM software analyzes the security event records from these various sources and creates consolidated reports of security incidents as mandated by government regulations and industry compliance standards. Progent's GIAC-certified information assurance consultants and Cisco CCIE certified network infrastructure consultants can assist organizations to plan, install and manage a SIEM system that enables them to understand the progress of security incidents and comply with event reporting regulations. (See Progent's Security information and Event Management solutions.)
Progent's Security Accreditations
Progent's security consultants have earned some of the most respected certifications available in the industry. All of these accreditations demand exhaustive examinations and proven work experience to guarantee that candidates have mastered a significant body of security information and methodologies and can offer high-level consulting to information networks of any complexity.
  • CISM Security Consulting Expertise
    CISM defines the core skills and international benchmarks of performance that information security professionals are required to master. It offers executive management the assurance that consultants who have earned their accreditation have the experience and knowledge to offer efficient security management and consulting services. Progent can offer a CISM support professional to help your organization in vital security disciplines including data protection governance, risk management, data protection process control, and crisis response support. Read more details concerning Progent's Certified Information Security Manager (CISM) Security Support Expertise.

  • CISSP Security Consulting Expertise
    Progent's CISSP consultants are security specialists who have been awarded CISSP accreditation through verified experience, rigorous study, and exhaustive examination. CISSP qualification indicates mastery of an international standard for information security. ANSI has given the CISSP status accreditation in the field of information security under ISO/IEC 17024. Areas of expertise included under CISSP include security management practices, security architecture and models, connection permission systems, software development security, operations security, physical security, encryption, telecommunications, network security, and business continuity planning. Get additional details concerning Progent's Certified Information Systems Security Professionals (CISSP) Consulting Services.

  • Information Systems Security Architecture Professionals (ISSAP) Engineering Support
    Progent's ISSAP qualified security consultants are consultants who have earned ISSAP accreditation after thorough testing and extensive hands-on work with network security design. ISSAP consultants have acquired comprehensive understanding of access management mechanisms and methodologies, phone system and network security, cryptography, requirements analysis, business continuity planning (BCP) and DRP, and physical security. Progent's ISSAP-certified security consultants can assist your company with all phases of secure network architecture. Read additional information concerning Progent's ISSAP Certified Protected System Architecture Engineering Assistance.

  • Certified Information Systems Auditor Consulting Expertise
    The Certified Information Systems Auditor (CISA) accreditation is an important achievement that indicates expertise in information system security auditing. Accredited by ANSI, the CISA accreditation requires that candidates undergo a comprehensive examination given by the ISACA international professional association. Progent can provide the services of a CISA-qualified security audit engineer able to assist companies in the areas of IS audit services, information technology administration, systems and infrastructure planned useful life, information technology support, safeguarding data assets, and business continuity planning. Get additional information about Progent's Certified Information Systems Auditor Consulting Services.

  • GIAC Consulting Services
    Global Information Assurance Certification was founded in 1999 to certify the skill of information technology security professionals. GIAC's goal is to ensure that an accredited professional possesses the skills necessary to deliver support in key areas of network, data, and application security. GIAC accreditations are recognized by businesses and government organizations all over the world including and the U.S. National Security Agency (NSA). Progent offers the support of GIAC certified professionals for any of the security capabilities addressed within GIAC certification topics including auditing security systems, security incident handling, intrusion detection, and web application security. Read more information concerning Progent's GIAC Support Expertise.
Contact Progent for Computer Security Support
If you're trying to find network security expertise, telephone Progent at 800-993-9400 or visit Contact Progent.
















© 2002- 2018 Progent Corporation. All rights reserved.