Overview of Progent's Security and Compliance Support Services
Progent's industry certified computer security consultants offer a wide selection of services intended to assist companies of all sizes to detect and correct security vulnerabilities, block assaults, remediate the problems caused by a breach of protection, and comply with government mandates for protecting data and reporting incidents. Progent can provide a choice of service delivery models:

  • On-demand online and on-site support invoiced to the nearest minute
  • On-going fully managed services invoiced at an affordable flat monthly rate
  • Value-priced service packages for a single security assessment
As-needed Security Support Services
After you sign up for Progent's services (signing up is free), you can receive as-needed remote or on-premises support from one of Progent security expert. This classic support model is essentially reactive and geared toward quickly taking care of technical problems that are disrupting your network or that have stumped your own support personnel. Common scenarios include configuring a firewall appliance or VPN connection, installing a vital security patch for a Cisco switch, designing secure access to a public cloud, or recovering from a ransomware attack. These security services are invoiced by the minute, which eliminates the frustrating case of receiving big invoices for quick fixes.

Delivery options for Progent's on-demand support include:

  • Online Security Services
    The majority security problems can be handled online through a mix of phone support and a remote Internet connection between Progent's Technical Response Center (TRC) and a client's computer. Progent's Technical Response Center can provide remote security help by offering easy access to consultants who have the background and resources to fix some of the most difficult issues quickly, making your support costs affordable and minimizing lost productivity.
  • Onsite Security Support Services
    For instances where on-premises assistance is required, Progent can send a technical professional to major cities across the United States. Progent can also send a security consultant with high-level certifications and advanced skills to any site in the U.S.
Progent's security engineers are certified to provide help for systems powered by Microsoft Windows, Linux, Mac, Sun Solaris, and major derivatives of UNIX. Progent's wide range of services addresses firewall expertise, e-mail systems, secure network design, and information recovery. Progent's support team has been awarded the world's most advanced security accreditations including Certified Information Security Manager and Information System Security Architecture Professional (ISSAP). Progent also offers fast access to remote Cisco-certified CCIE network consultants who can deliver world-class assistance with complex network configuration problems.

ProSight Low-Cost Managed Services for Information Assurance
Progent's low-cost ProSight portfolio of outsourced network management services is intended to provide small and mid-size organizations with enterprise-class support and cutting-edge technology for all aspects of information assurance. ProSight managed services available from Progent include:

  • ProSight Email Guard: Spam Filtering, Data Leakage Protection and Email Encryption
    ProSight Email Guard is Progent's email security platform that incorporates the services and infrastructure of top information security companies to deliver web-based control and world-class security for your inbound and outbound email. The hybrid structure of Email Guard managed service integrates a Cloud Protection Layer with a local gateway device to offer advanced protection against spam, viruses, Denial of Service Attacks, Directory Harvest Attacks, and other email-based malware. The Cloud Protection Layer acts as a first line of defense and blocks the vast majority of unwanted email from reaching your network firewall. This decreases your vulnerability to inbound attacks and saves network bandwidth and storage space. Email Guard's onsite gateway device adds a deeper layer of inspection for inbound email. For outgoing email, the onsite gateway offers AV and anti-spam protection, protection against data leaks, and encryption. The local security gateway can also help Exchange Server to monitor and protect internal email traffic that stays inside your corporate firewall. Learn more about Progent's ProSight Email Guard spam filtering, virus defense, content filtering and data loss prevention.

  • ProSight Active Security Monitoring: Endpoint Protection and Ransomware Defense
    ProSight Active Security Monitoring (ASM) is an endpoint protection service that incorporates next generation behavior machine learning tools to guard endpoint devices and physical and virtual servers against modern malware attacks like ransomware and file-less exploits, which easily evade legacy signature-based AV tools. ProSight Active Security Monitoring safeguards on-premises and cloud-based resources and offers a unified platform to automate the complete threat progression including filtering, detection, mitigation, cleanup, and post-attack forensics. Top features include one-click rollback using Windows Volume Shadow Copy Service (VSS) and real-time system-wide immunization against newly discovered threats. Read more about Progent's ProSight Active Security Monitoring (ASM) next-generation endpoint protection and ransomware recovery.

  • ProSight DPS: Managed Cloud Backup and Recovery
    ProSight Data Protection Services provide small and medium-sized businesses an affordable and fully managed service for secure backup/disaster recovery (BDR). For a fixed monthly rate, ProSight DPS automates your backup processes and allows fast restoration of vital files, apps and VMs that have become lost or damaged due to hardware breakdowns, software glitches, natural disasters, human mistakes, or malware attacks such as ransomware. ProSight DPS can help you back up, retrieve and restore files, folders, apps, system images, plus Microsoft Hyper-V and VMware images. Important data can be backed up on the cloud, to a local storage device, or mirrored to both. Progent's backup and recovery specialists can deliver world-class support to configure ProSight Data Protection Services to be compliant with government and industry regulatory standards such as HIPPA, FIRPA, PCI and Safe Harbor and, when needed, can assist you to recover your critical data. Find out more about ProSight Data Protection Services Managed Cloud Backup and Recovery.

  • ProSight WAN Watch: Network Infrastructure Management
    ProSight WAN Watch is an infrastructure management service that makes it simple and inexpensive for small and mid-sized businesses to diagram, track, enhance and debug their connectivity appliances such as switches, firewalls, and access points as well as servers, printers, endpoints and other networked devices. Using cutting-edge Remote Monitoring and Management (RMM) technology, ProSight WAN Watch ensures that infrastructure topology diagrams are kept updated, copies and manages the configuration information of virtually all devices on your network, tracks performance, and generates notices when potential issues are discovered. By automating time-consuming management and troubleshooting activities, WAN Watch can cut hours off common chores such as network mapping, expanding your network, locating devices that require critical software patches, or isolating performance problems. Find out more about ProSight WAN Watch network infrastructure management consulting.

  • ProSight LAN Watch: Server and Desktop Monitoring and Management
    ProSight LAN Watch is Progentís server and desktop remote monitoring service that incorporates advanced remote monitoring and management (RMM) technology to help keep your IT system running efficiently by checking the state of critical computers that power your information system. When ProSight LAN Watch detects a problem, an alarm is sent immediately to your designated IT management personnel and your assigned Progent consultant so any potential issues can be resolved before they can impact your network Find out more details about ProSight LAN Watch server and desktop remote monitoring consulting.

  • ProSight Virtual Hosting: Hosted VMs at Progent's Tier III Data Center
    With Progent's ProSight Virtual Hosting service, a small or mid-size business can have its critical servers and apps hosted in a protected fault tolerant data center on a high-performance virtual host configured and maintained by Progent's network support professionals. Under the ProSight Virtual Hosting model, the customer owns the data, the OS software, and the applications. Because the system is virtualized, it can be moved easily to a different hosting environment without requiring a time-consuming and difficult configuration process. With ProSight Virtual Hosting, you are not locked into a single hosting provider. Find out more details about ProSight Virtual Hosting services.

  • ProSight IT Asset Management: Network Infrastructure Documentation Management
    ProSight IT Asset Management service is an IT infrastructure documentation management service that allows you to create, maintain, retrieve and protect information about your network infrastructure, processes, applications, and services. You can instantly find passwords or IP addresses and be warned about impending expirations of SSL certificates ,domains or warranties. By updating and managing your IT documentation, you can eliminate as much as half of time wasted trying to find critical information about your network. ProSight IT Asset Management includes a common location for storing and collaborating on all documents required for managing your network infrastructure such as standard operating procedures and self-service instructions. ProSight IT Asset Management also offers advanced automation for collecting and associating IT data. Whether youíre making improvements, performing maintenance, or responding to a crisis, ProSight IT Asset Management gets you the information you require when you need it. Learn more about Progent's ProSight IT Asset Management service.
ProSight Network Audits
Progent's ProSight Network Audits offer a fast and low-cost alternative for small and mid-size organizations to get an unbiased evaluation of the overall health of their IT system. Powered by a selection of the leading remote monitoring and management (RMM) tools in the industry, and overseen by Progent's world-class group of IT professionals, ProSight Network Audits help you see how closely the configuration of your core infrastructure devices conform to leading practices. Both the Basic and Advanced options for ProSight Network Audit services are offered at a low, one-time cost and provide instant ROI such as a more manageable Active Directory (AD) environment. Both versions also come with one year of state-of-the-art remote network monitoring and management (RMM). Advantages can include easier management, improved compliance with information security standards, higher utilization of network resources, quicker troubleshooting, more dependable backup and recovery, and less downtime. Read more information about Progent's ProSight Network Audits IT infrastructure review.

Progent's ProSight Ransomware Preparedness Report Service
Progent's ProSight Ransomware Preparedness Report service is a low-cost service built around a brief discussion with a Progent information assurance expert. The fact-finding interview is intended to evaluate your organization's preparedness to stop or recover quickly from a ransomware incident. Progent will work with you directly to collect information concerning your current security profile and backup system, and Progent will then deliver a custom Basic Security and Best Practices Report describing how you can follow industry best practices to build a cost-effective AV and backup/recovery system that meets your company's needs. For details, refer to The ProSight Ransomware Preparedness Report Service.

Fixed-price Security Assessment and Validation Bundles
Progent has put together a selection of fixed-price security assessment bundles that deliver high value by deploying Progent's enterprise-class system monitoring and analysis software as well as Progent's technical experience to create an objective and thorough evaluation of your network security profile.

  • Security Inventory Service Bundles for Small Businesses
    Progent offers two value-priced security inventory packages intended to enable small organizations to get a professional security evaluation from a certified security consultant. With Progent's External Security Inventory Scan, a consultant administers a comprehensive examination of your IT system from beyond your corporate firewall to determine potential gaps in the security posture you present to the public. With Progent's Internal Security Inventory Scan, a security consultant runs a system scan using an authorized computer within your corporate firewall to assess your vulnerability to inside attacks. The two security inventory scanning services are configured and executed from a secured offsite location. The scan is administered by an engineer who has been awarded high-level security certifications and who creates a report that details and evaluates the information collected by the scan and suggests practical improvements where appropriate.
  • Security Vulnerability Assessment Bundles for Enterprises
    Progent offers three levels of fixed-price security assessment service bundles designed for enterprises who want to meet security standards required by state or industry agencies. Progent's security assessment service packages offer larger organizations an opportunity to obtain an objective assessment at the strength of their security posture. For each security assessment package, Progent consultants with top security credentials analyze and report on captured data and provide recommendations for efficient remediation. Each of the network security assessment bundles include an extra-cost option for onsite engineers anywhere in the U.S.
  • Stealth Penetration Testing
    Stealth penetration testing, often called PEN testing, is an accepted technique for allowing organizations to determine how open their IT environments are to current-generation attacks. Progent's stealth penetration testing services test how well your corporate security procedures and platforms resist authorized but unannounced intrusion attempts launched by Progent's certified security specialists utilizing cutting-edge hacking techniques. Read about Progent's stealth penetration testing services.
Our Network Has Been Hacked: What Are We Supposed to Do?
Network Security ConsultantsIf your business is now fighting a security crisis and you have not prepared a detailed response procedure, visit Progent's Online Network Support to find out how to get fast help. Progent offers remote assistance from experienced network technicians and can escalate problems to certified security specialists if necessary. Your organization does not need to be a registered Progent customer to receive urgent help for a security breakdown, but you can register as a Progent customer ahead of time for free and your status as a registered client can save valuable time when there is a crisis.

Typically, smaller organizations do not have a recovery plan in the event of a damaging security breach. This is risky, because the damage from a serious security attack can be more devastating for a small business than for a big enterprise. Progent's security specialists can assist your you to create a practical response and event reporting plan that minimizes the IT system downtime following an attack. The step-by-step post-attack response procedure outlined by GIAC (Global Information Assurance Certification) is Progent's recommended procedure for responding to a serious security penetration.

Advanced Security Expertise Offered by Progent
Progent's veteran consultants can provide advanced support in vital facets of network protection such as:

  • Vulnerability Evaluation and Compliance Testing
    Progent offers expertise with information risk auditing tools like Microsoft Baseline Security Analyzer and LANguard from GFI for performing a set of comprehensive system scans to uncover possible security gaps. Progent has broad experience with scanning tools and can assist you to understand assessment reports and react efficiently. Progent's security consultants also can perform web application testing and can perform thorough assessments of enterprise-wide security to verify your organization's compliance with important global security specifications such as HIPAA, NIST, and ISO. Also, Progent can assess the strength of your wireless protection including stationary wireless equipment as well as portable handsets. Find out additional details about Progent's Information Risk Audits and Compliance Assessment.
  • Designing, Building, and Testing Protected Networks
    Any organization should have a thoroughly considered security strategy that incorporates both proactive and reactive steps. The pre-attack plan is a collection of precautions that works to reduce security holes. The reactive strategy defines activities to assist security personnel to inventory the losses caused by an attack, remediate the damage, document the experience, and revive business activity as quickly as feasible. Progent can advise you how to design security into your business processes, install auditing utilities, define and execute a safe IT architecture, and recommend procedures and policies that will optimize the safety of your information system. Progent's security professionals are available to assist you to set up a firewall, deploy secure remote access to e-mail and files, and install an efficient VPN. If your company is looking for an economical option for jobbing out your network security management, Progent's 24x7 Monitoring Options include non-stop online server monitoring and fast resolution of emergencies.
  • Data Restoration and Security Forensics
    Progent has expertise in recovering networks and computers that have been hacked, are quarantined, or have stopped working as a result of a security breakdown. Progent can show you how to evaluate the losses resulting from the attack, return your company to normal functions, and retrieve data compromised owing to the event. Progent's security specialists can also perform a comprehensive failure evaluation by examining activity logs and using other proven assessment tools. Progent's experience with security issues minimizes your downtime and permits Progent to recommend effective strategies to prevent or mitigate future attacks.
  • Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Firewalls, and PIX 500 Firewalls Integration and Debugging
    Cisco CCIE Security ExpertsThe new Cisco ASA 5500-X Series of firewalls with Firepower Services provide significantly more performance than Cisco's earlier PIX and ASA 5500 firewalls and have replaced the ASA 5500 and PIX firewalls for all new deployments. Since Cisco's purchase of Sourcefire, the whole line of ASA 5500-X firewalls can be configured to enable Firepower Services, built on Sourcefire's Snort technology, which is the market's most deployed intrusion protection system. Firepower services bring enhanced features including advanced malware protection (AMP), URL filtering, real-time threat analytics, and security automation. Progent's Cisco-qualified CCIE network consultants can assist your company to maintain your existing PIX or Cisco ASA 5500 security appliances or migrate to Cisco ASA 5500-X firewalls with Firepower Services. Progent's consultants offer online and on-premises help with ASA 5500-X firewalls with Firepower Services and can assist your business to design, integrate, tune, manage and troubleshoot firewall environments built on Cisco ASA 5500-X firewalls with Firepower Services. Read additional information about Cisco ASA Firewalls with Firepower Services configuration and debugging services.
  • Additional Firewall and VPN Consulting Services
    In addition to being expert in a wide range of protection technologies from Microsoft and Cisco, Progent can provide small businesses top-level engineering services for solutions from other important firewall and Virtual Private Network (VPN) suppliers including:
  • SIEM Integration and Support
    Security information and event management (SIEM) software and services are intended to digest the massive quantity of data represented by security incident logs generated by a wide range of sources such as network infrastructure appliances, operating systems, and application software and tools. SIEM applications analyzes the security logs from these various sources and creates summary reports of security events as mandated by state regulations and business compliance guidelines. Progent's GIAC-certified computer security consultants and Cisco-certified network infrastructure experts can assist organizations to design, deploy and manage a SIEM solution that enables them to see the progress of security incidents and comply with event reporting requirements. (Visit Progent's SIEM solutions.)
Progent's Security Accreditations
Progent's security engineers have earned the most prestigious accreditations offered in the industry. All of these accreditations require extensive examinations and proven field experience to guarantee that recipients have acquired expertise with a significant amount of security information and techniques and can offer high-level security solutions to information networks of any complexity.
  • CISM Security Consulting Expertise
    Certified Information Security Manager defines the fundamental skills and international standards of service that computer security managers are expected to achieve. It provides business management the assurance that those who have earned their accreditation possess the experience and knowledge to offer effective security administration and engineering services. Progent can provide a CISM-certified expert to help your organization in vital security disciplines such as information protection governance, risk management, information protection process control, and incident response support. Learn additional details about Progent's Certified Information Security Manager Security Support Services.

  • Certified Information Systems Security Professionals (CISSP) Security Support Expertise
    Progent's CISSP experts are security specialists who have been awarded CISSP accreditation as a result of verified experience, rigorous study, and formal examination. CISSP qualification indicates mastery of a worldwide standard for information security. ANSI has granted the CISSP credential accreditation in the field of information security under ISO/IEC 17024. Fields of knowledge covered within CISSP include security administration procedures, security design and models, connection permission systems, software development security, operations security, hardware security, cryptography, communications, network security, and business continuity planning. Learn additional information concerning Progent's Certified Information Systems Security Professionals (CISSP) Support Expertise.

  • ISSAP Engineering Support
    Progent's ISSAP qualified security consultants are consultants who have earned ISSAP status following rigorous examination and substantial experience. field experience with information security design. ISSAP consultants possess in-depth knowledge of access control mechanisms and techniques, phone system and network infrastructure security, cryptography, requirements analysis, business continuity planning (BCP) and DRP, and physical security. Progent's ISSAP-qualified security consultants can help your company with all phases of architecture security. Find out additional information about Progent's ISSAP Accredited Protected System Infrastructure Consulting Services.

  • CISA Consulting Services
    The Certified Information Systems Auditor accreditation is a globally recognized qualification that represents expertise in information system security audit and control. Accredited by the American National Standards Institute, the CISA accreditation requires that consultants undergo a comprehensive examination administered by the ISACA international professional group. Progent can provide the services of a CISA-certified security audit consultant trained to assist businesses in the fields of information systems audit services, information technology governance, network assets and infrastructure planned useful life, information technology service delivery, safeguarding data resources, and business continuity planning. Find out more details about Progent's Certified Information Systems Auditor (CISA) Support Services.

  • GIAC Support Services
    GIAC (Global Information Assurance Certification) was founded in 1999 to validate the skill of information technology security engineers. GIAC's mission is to assure that a certified security consultant possesses the knowledge needed to deliver support in critical categories of network, information, and application program security. GIAC accreditations are acknowledged by businesses and government organizations around the world including and the United States National Security Agency. Progent offers the assistance of GIAC certified consultants for any of the network security capabilities covered within GIAC certification programs including auditing IT infrastructure, security incident handling, traffic analysis, and web-based application security. Read more details concerning Progent's GIAC (Global Information Assurance Certification) Consulting Expertise.
Get in Touch with Progent for Computer Security Support
If you're looking for network security consulting expertise, call Progent at 800-993-9400 or refer to Contact Progent.
















© 2002- 2018 Progent Corporation. All rights reserved.