Introduction to Progent's Security Support Services
Progent's certified network security consultants offer a wide range of services designed to help organizations of any size to uncover and eliminate security weaknesses, block attacks, remediate any problems resulting from a breakdown of protection, and comply with government requirements for protecting data and reporting incidents. Progent can provide a choice of service models:

  • As-needed online and on-site assistance billed by the minute
  • On-going fully managed services invoiced at an affordable flat monthly rate
  • Value-priced service bundles for a one-time security and compliance evaluation
On-demand Security Support Services
After you register for Progent's services (registration is free), you can get as-needed remote or onsite support from a Progent security and compliance expert. This classic support model is primarily reactive and geared toward rapidly taking care of technical issues that are impacting your network or that are beyond the scope of your in-house support personnel. Common scenarios are debugging a firewall or VPN tunnel, installing a vital security patch for a Cisco switch or router, designing compliant access to a public cloud, or restoring data after a ransomware assault. These services are invoiced by the minute, which eliminates the annoying situation of getting big invoices for quick fixes.

Delivery options for Progent's on-demand support include:

  • Remote Security Support Services
    Most security-related problems can be resolved online through a mix of phone help and an connection between Progent's Technical Response Center (TRC) and a client's computer. Progent's Technical Response Center can deliver remote security help by offering efficient access to consultants who have the background and technical resources to fix many of the most challenging problems quickly, keeping your service expenses affordable and reducing lost productivity.
  • On-premises Security Services
    For cases where onsite support is required, Progent can dispatch a technical professional to major metropolitan areas throughout the United States. Progent can also send a security consultant with high-level certifications and advanced skills to any site in the country.
Progent's accredited engineers are certified to support systems based on Windows, Linux, Apple, Sun, and popular versions of UNIX. Progent's broad selection of services addresses firewall expertise, email and messaging systems, secure system design, and information restoration. Progent's technical support staff has been awarded the world's top security certifications including CISA and Certified Information Systems Security Professional. Progent also can provide immediate access to remote Cisco CCIE network infrastructure consultants who can deliver world-class support with tough network integration problems.

Progent's Fixed-price Managed Services for Information Assurance
Progent's affordable ProSight series of managed services is designed to provide small and mid-size businesses with enterprise-class support and cutting-edge technology for all aspects of information assurance. Managed services available from Progent include:

  • ProSight Email Guard: Inbound and Outbound Spam Filtering, Data Leakage Protection and Email Encryption
    ProSight Email Guard is Progent's email filtering and encryption solution that incorporates the technology of top information security vendors to deliver web-based control and comprehensive protection for your email traffic. The powerful architecture of Email Guard integrates cloud-based filtering with an on-premises security gateway device to offer advanced defense against spam, viruses, Denial of Service Attacks, DHAs, and other email-borne threats. Email Guard's cloud filter acts as a first line of defense and keeps most threats from reaching your network firewall. This reduces your vulnerability to external threats and conserves system bandwidth and storage. Email Guard's onsite gateway appliance provides a further layer of analysis for inbound email. For outgoing email, the on-premises security gateway provides anti-virus and anti-spam protection, protection against data leaks, and encryption. The on-premises gateway can also assist Exchange Server to monitor and safeguard internal email that originates and ends inside your corporate firewall. Learn more about Progent's ProSight Email Guard spam filtering, virus defense, content filtering and data leakage protection.

  • ProSight Active Security Monitoring (ASM): Endpoint Protection and Ransomware Defense
    ProSight Active Security Monitoring is an endpoint protection solution that incorporates cutting edge behavior analysis technology to guard endpoints as well as physical and virtual servers against new malware attacks like ransomware and email phishing, which easily evade legacy signature-matching anti-virus products. ProSight ASM protects on-premises and cloud-based resources and offers a unified platform to manage the entire threat progression including protection, infiltration detection, mitigation, remediation, and post-attack forensics. Top features include one-click rollback with Windows Volume Shadow Copy Service (VSS) and automatic system-wide immunization against new attacks. Read more about Progent's ProSight Active Security Monitoring endpoint protection and ransomware recovery.

  • ProSight DPS: Managed Backup and Recovery
    ProSight Data Protection Services provide small and mid-sized organizations a low cost end-to-end solution for reliable backup/disaster recovery (BDR). For a low monthly rate, ProSight Data Protection Services automates your backup processes and allows rapid restoration of vital files, apps and virtual machines that have become unavailable or corrupted due to hardware breakdowns, software glitches, natural disasters, human mistakes, or malicious attacks such as ransomware. ProSight Data Protection Services can help you protect, retrieve and restore files, folders, applications, system images, plus Hyper-V and VMware virtual machine images. Important data can be backed up on the cloud, to a local storage device, or to both. Progent's backup and recovery consultants can deliver world-class support to configure ProSight DPS to to comply with regulatory standards such as HIPPA, FINRA, and PCI and, whenever necessary, can assist you to recover your critical data. Read more about ProSight Data Protection Services managed cloud backup and recovery.

  • ProSight WAN Watch: Infrastructure Remote Monitoring and Management
    Progentís ProSight WAN Watch is a network infrastructure monitoring and management service that makes it simple and affordable for small and mid-sized businesses to map out, monitor, optimize and debug their networking appliances such as switches, firewalls, and access points plus servers, printers, endpoints and other networked devices. Incorporating cutting-edge Remote Monitoring and Management (RMM) technology, WAN Watch ensures that network maps are kept current, captures and manages the configuration of almost all devices on your network, tracks performance, and generates alerts when issues are discovered. By automating time-consuming management and troubleshooting processes, ProSight WAN Watch can knock hours off common tasks like making network diagrams, reconfiguring your network, finding appliances that require critical updates, or identifying the cause of performance problems. Learn more details about ProSight WAN Watch network infrastructure management services.

  • ProSight LAN Watch: Server and Desktop Monitoring
    ProSight LAN Watch is Progentís server and desktop monitoring managed service that uses advanced remote monitoring and management (RMM) technology to help keep your IT system operating efficiently by checking the state of vital assets that power your business network. When ProSight LAN Watch detects a problem, an alarm is transmitted automatically to your designated IT staff and your Progent engineering consultant so all looming problems can be addressed before they have a chance to impact productivity Find out more details about ProSight LAN Watch server and desktop remote monitoring services.

  • ProSight Virtual Hosting: Hosted VMs at Progent's Tier III Data Center
    With Progent's ProSight Virtual Hosting service, a small business can have its critical servers and apps hosted in a secure fault tolerant data center on a fast virtual host set up and maintained by Progent's network support experts. Under the ProSight Virtual Hosting service model, the customer retains ownership of the data, the operating system platforms, and the applications. Because the system is virtualized, it can be ported immediately to a different hosting solution without requiring a time-consuming and technically risky reinstallation procedure. With ProSight Virtual Hosting, your business is not locked into a single hosting service. Learn more about ProSight Virtual Hosting services.
Flat-rate Security Assessment and Validation Packages
Progent has put together a portfolio of set-price security and compliance evaluation packages that provide high value by utilizing Progent's advanced system monitoring tools as well as Progent's consulting skills to create an objective and comprehensive assessment of your network security profile.
  • Security Assessment Service Packages for Small Organizations
    Progent offers two value-priced security inventory scanning packages intended to allow small businesses to get a professional security evaluation from a certified security engineer. With Progent's External Security Inventory Scan, a consultant manages an extensive examination of your IT system from outside your firewalled perimeter to identify possible risks in the security posture you present to the outside world. With Progent's Internal Security Inventory Scan, a certified security expert executes a system scan using an authorized machine within your company firewall to evaluate your exposure to inside threats. These two security inventory scanning services are configured and run from a secured offsite location. The project is managed by a consultant who has earned high-level security certifications and who creates a document that describes and evaluates the information captured by the scan and suggests various improvements where required.
  • Security Vulnerability Evaluation Bundles for Large Businesses
    Progent has developed three levels of fixed-price security assessment service packages intended for large organizations who need to meet compliance standards required by government or industry regulators. Progent's security assessment service bundles offer larger businesses an opportunity to get a professional assessment at the strength of their security posture. For each security assessment bundle, Progent engineers with top security credentials study and report on collected data and offer recommendations for cost-effective improvements. All the network security assessment bundles include an added-cost option for on-premises consultants anywhere in the U.S.
  • Stealth Penetration Testing
    Stealth penetration testing, commonly referred to as PEN testing, is a critical tool for helping businesses to find out how open their IT environments are to current-generation threats. Progent's stealth penetration testing test how well your existing security policies and technologies stand up to authorized but unannounced penetration attempts launched by Progent's veteran security experts utilizing cutting-edge hacking methods. Read about Progent's stealth penetration testing services.
Our System Has Been Hacked: What Should We Do?
Network Security ConsultantsIf your company is now fighting a security crisis and you have not prepared a detailed response procedure, go to Progent's Remote Technical Help to learn how to receive fast help. Progent offers online assistance from experienced network technicians and can refer problems to certified security specialists if necessary. Your business does not need to be a registered Progent customer to receive emergency help for a security breakdown, but you can sign up as a Progent client in advance for free and your status as a registered customer could save valuable time when there is a crisis.

Usually, smaller organizations have no response plan in case of a damaging penetration. This is not good, because the damage from a serious security attack can be even more catastrophic for a small company than for a big corporation. Progent's security engineers can assist your business to create an efficient recovery and event reporting plan that minimizes the IT system downtime resulting from a security breach. The formal post-attack response procedure outlined by GIAC (Global Information Assurance Certification) is Progent's preferred method for responding to a serious security incident.

Advanced Security Expertise Available from Progent
Progent's certified security engineers offer advanced support in vital facets of network protection such as:

  • Security Vulnerability Evaluation and Compliance Assessment
    Progent offers expertise with information risk evaluation utilities like MS Baseline Security Analyzer and LANguard from GFI for performing a variety of comprehensive network scans to reveal possible security gaps. Progent has extensive experience with scanning utilities and can assist your company to analyze assessment reports and react appropriately. Progent's security engineers also can perform web application testing and can perform expert evaluation of enterprise-wide security to verify your organization's compliance with important worldwide security standards such as HIPAA, NIST, and ISO. Also, Progent can evaluate the effectiveness of your wireless protection covering stationary wireless equipment plus portable devices. Get more details about Progent's Vulnerability Audits and Security Compliance Testing.
  • Designing, Implementing, and Validating Protected Networks
    Any organization should develop a thoroughly thought out security strategy that includes both proactive and reactive activity. The pre-attack strategy is a collection of steps that helps to minimize vulnerabilities. The reactive strategy specifies procedures to assist IT personnel to inventory the losses resulting from a breach, repair the damage, document the experience, and revive network activity as soon as feasible. Progent can advise you how to incorporate protection into your business processes, configure scanning utilities, define and implement a safe computer architecture, and propose procedures and policies to maximize the protection of your computing environment. Progent's security professionals are ready to assist you to set up a firewall, design protected offsite connectivity to e-mail and data, and install an efficient VPN. If you are interested in an economical way for outsourcing your network security management, Progent's Round-the-clock Monitoring Services include non-stop remote server tracking and quick response to emergencies.
  • System Restoration and Security Forensics
    Progent provides skill in recovering networks and servers that have been compromised, are in question, or have ceased to function as a result of a security breakdown. Progent can help assess the losses caused by the breach, restore normal functions, and retrieve data compromised as a result of the breach. Progent's certified engineers can also oversee a comprehensive forensic evaluation by going over activity logs and using other proven forensics tools. Progent's experience with security consulting reduces your downtime and allows Progent to recommend efficient measures to prevent or mitigate future attacks.
  • Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Firewalls, and PIX Security Appliances Configuration and Debugging
    Cisco Certified CCIE Network Security SpecialistsThe new Cisco ASA 5500-X Family Next-Generation Firewalls with Firepower Services offer significantly more value than Cisco's previous PIX and ASA 5500 firewalls and have replaced the ASA 5500 and PIX firewalls for all new deployments. Following Cisco's acquisition of Sourcefire, the entire family of Cisco ASA 5500-X firewalls can be configured to enable Firepower Services, based on Sourcefire's Snort technology, which is the world's most deployed intrusion protection system (IPS). Firepower services provide enhanced features including advanced malware protection (AMP), URL filtering, real-time threat analytics, and automation. Progent's Cisco-certified CCIE network consultants can assist your company to maintain your legacy PIX or ASA 5500 security appliances and migrate to Cisco ASA 5500-X firewalls with Firepower Services. Progent's consultants offer remote and on-premises help with ASA 5500-X firewalls with Firepower Services and can assist your company to plan, integrate, optimize, administer and debug firewall environments based on Cisco ASA 5500-X firewalls with Firepower Services. Find out additional details about Cisco ASA 5500-X Firewalls with Firepower Services configuration and debugging services.
  • Additional Firewall and Virtual Private Network (VPN) Consulting Services
    In addition to supporting a wide range of protection technologies from Microsoft and Cisco, Progent offers small organizations top-level support for solutions from other important firewall and Virtual Private Network vendors such as:
  • SIEM Security Information and Event Management Integration and Support
    Security information and event management (SIEM) applications and services are intended to make sense the enormous quantity of data collected in security event logs generated by multiple sources including network infrastructure appliances, servers, and application software and monitoring tools. SIEM software organizes the security event records from these various sources and creates consolidated reports of security incidents as mandated by government regulations and business compliance guidelines. Progent's GIAC-certified information assurance consultants and Cisco CCIE certified network infrastructure experts can help businesses to plan, install and operate a SIEM solution that enables them to see the behavior of security incidents and comply with event reporting requirements. (Visit Progent's Security information and Event Management (SIEM) solutions.)
Progent's Security Certifications
Progent's security professionals have been awarded some of the most prestigious accreditations available in the security industry. These certifications require exhaustive testing and proven field background to ensure that recipients have mastered a substantial body of security knowledge and techniques and can provide advanced security solutions to computer environments of any size.
  • CISM Security Support Services
    CISM identifies the basic competencies and worldwide benchmarks of service that information technology security professionals are expected to master. It offers executive management the confidence that consultants who have earned their accreditation possess the experience and knowledge to offer effective security administration and engineering support. Progent can offer a CISM-certified consultant to assist your organization in vital security areas such as information protection governance, vulnerability management, data security process control, and crisis handling management. Get the details concerning Progent's Certified Information Security Manager Security Consulting Expertise.

  • Certified Information Systems Security Professionals (CISSP) Security Support Services
    Progent's CISSP experts are security engineers who have earned CISSP certification through verified professional work, extensive study, and exhaustive examination. CISSP qualification indicates mastery of a worldwide standard for IT security. American National Standards Institute has granted the CISSP credential official recognition in the area of IT security under ISO/IEC 17024. Fields of expertise covered within CISSP include security administration procedures, security design and models, connection control systems, applications development security, operations security, hardware security, encryption, telecommunications, network security, and disaster recovery planning. Read more information concerning Progent's CISSP Consulting Services.

  • ISSAP Consulting Support
    Progent's ISSAP certified security consultants are experts who have earned ISSAP accreditation as a result of rigorous testing and extensive experience. field experience with network security architecture. ISSAP security experts possess comprehensive understanding of access management mechanisms and methodologies, telecommunications and network protection, cryptography, needs evaluation, business continuity and DRP, and physical security. Progent's ISSAP-certified security specialists can assist your company with all aspects of secure network architecture. Read more details about Progent's ISSAP Certified Secure Network Infrastructure Engineering Support.

  • Certified Information Systems Auditor (CISA) Consulting Services
    The Certified Information Systems Auditor (CISA) accreditation is an important achievement that indicates mastery in IS security auditing. Certified by ANSI, the CISA credential requires that consultants undergo a comprehensive test administered by the ISACA professional association. Progent can provide the expertise of a CISA-certified security professional able to help businesses in the areas of information systems audit services, IT governance, network assets and infrastructure lifecycle, IT service delivery, safeguarding data resources, and business continuity preparedness. Get additional details about Progent's Certified Information Systems Auditor (CISA) Support Expertise.

  • GIAC (Global Information Assurance Certification) Support Services
    Global Information Assurance Certification was established in 1999 to certify the skill of network security professionals. GIAC's goal is to ensure that a certified security consultant has the knowledge necessary to deliver support in important areas of network, data, and application software security. GIAC accreditations are recognized by businesses and institutions throughout the world including and the U.S. National Security Agency (NSA). Progent can provide the assistance of GIAC certified professionals for any of the network security disciplines addressed under GIAC certification programs such as assessing networks, incident handling, intrusion detection, and web-based application security. Read more information about Progent's GIAC (Global Information Assurance Certification) Support Assistance.
Contact Progent for Computer Security Help
If you're looking for computer security engineering help, call Progent at 800-993-9400 or see Contact Progent.

© 2002- 2018 Progent Corporation. All rights reserved.