Introduction to Progent's Security and Compliance Support Services
Progent's industry certified computer security and compliance professionals can provide a wide selection of services designed to assist organizations of any size to identify and eliminate security vulnerabilities, defend against malicious attacks, remediate the damage resulting from a breach of security, and meet government requirements for guarding information and reporting incidents. Progent can provide a choice of service delivery models:

  • On-demand online and on-premises support billed to the nearest minute
  • On-going managed services invoiced at an affordable fixed monthly fee
  • Set-price service packages for a one-time security evaluation
On-demand Security and Compliance Consulting Services
After you register for Progent's services (registration is free), you can get as-needed online or onsite support from a Progent security and compliance consultant. This classic service model is primarily reactive and geared toward quickly resolving technical problems that are disrupting your network or that have stymied your own support staff. Common scenarios are debugging a firewall or VPN tunnel, implementing a critical security update for a Cisco switch, designing secure access to cloud-based resources, or recovering from a ransomware assault. These security services are invoiced by the minute, which eliminates the frustrating case of receiving large invoices for fast fixes.

Delivery alternatives for Progent's as-needed support services include:

  • Remote Security Services
    Most security problems can be handled remotely through a combination of phone help and a remote connection between Progent's Technical Response Center (TRC) and a customer's network. Progent's Technical Response Center can deliver remote security support by offering efficient access to consultants who have the experience and technical resources to resolve some of the most challenging problems quickly, keeping your support expenses affordable and minimizing lost productivity.
  • Onsite Security Services
    For instances where on-premises support is necessary, Progent can send a technical expert to major cities throughout the United States. Progent can also send a security specialist with high-level certifications and advanced skills to any location in the country.
Progent's security engineers are certified to support systems powered by Microsoft Windows, Linux, macOS and OS X, Sun, and popular derivatives of UNIX. Progent's wide selection of consulting services addresses firewall expertise, e-mail security, secure network architecture, and data restoration. Progent's technical support team has earned the industry's most advanced security certifications including Certified Information Systems Auditor and ISSAP. Progent also can provide fast access to online Cisco-certified CCIE network infrastructure consultants who can provide advanced support with complex network integration issues.

ProSight Fixed-price Managed Services for Information Assurance
Progent's value-priced ProSight series of network monitoring and management services is designed to provide small and mid-size organizations with enterprise-class support and cutting-edge technology for all aspects of information assurance and compliance. Managed services available from Progent include:

  • ProSight Active Security Monitoring: Endpoint Protection and Ransomware Defense
    ProSight Active Security Monitoring (ASM) is an endpoint protection (EPP) solution that utilizes cutting edge behavior machine learning tools to guard endpoints as well as physical and virtual servers against new malware attacks like ransomware and file-less exploits, which easily evade traditional signature-based AV products. ProSight ASM safeguards local and cloud resources and provides a single platform to automate the complete malware attack progression including blocking, identification, mitigation, remediation, and forensics. Top capabilities include one-click rollback using Windows Volume Shadow Copy Service (VSS) and automatic system-wide immunization against new attacks. Read more about Progent's ProSight Active Security Monitoring (ASM) next-generation endpoint protection and ransomware recovery.

  • ProSight Enhanced Security Protection (ESP): Unified Physical and Virtual Endpoint Protection
    ProSight Enhanced Security Protection services deliver economical multi-layer security for physical servers and virtual machines, desktops, smartphones, and Exchange email. ProSight ESP uses adaptive security and advanced machine learning for continuously monitoring and responding to security assaults from all attack vectors. ProSight ESP offers firewall protection, penetration alarms, endpoint control, and web filtering through leading-edge tools incorporated within a single agent managed from a unified control. Progent's data protection and virtualization consultants can help your business to plan and configure a ProSight ESP deployment that addresses your organization's unique requirements and that allows you achieve and demonstrate compliance with legal and industry information security regulations. Progent will assist you define and configure policies that ProSight ESP will manage, and Progent will monitor your IT environment and react to alarms that require immediate attention. Progent's consultants can also help you to set up and test a backup and restore system like ProSight Data Protection Services (DPS) so you can get back in business rapidly from a destructive cyber attack like ransomware. Read more about Progent's ProSight Enhanced Security Protection unified physical and virtual endpoint protection and Microsoft Exchange filtering.

  • ProSight DPS: Managed Cloud Backup
    ProSight Data Protection Services from Progent provide small and mid-sized businesses an affordable and fully managed solution for secure backup/disaster recovery. For a fixed monthly price, ProSight Data Protection Services automates your backup processes and enables rapid restoration of critical files, applications and virtual machines that have become lost or damaged due to component failures, software bugs, disasters, human mistakes, or malicious attacks like ransomware. ProSight Data Protection Services can help you back up, recover and restore files, folders, apps, system images, plus Microsoft Hyper-V and VMware images. Important data can be protected on the cloud, to an on-promises storage device, or to both. Progent's backup and recovery consultants can deliver advanced expertise to configure ProSight Data Protection Services to to comply with regulatory requirements like HIPPA, FIRPA, PCI and Safe Harbor and, when necessary, can assist you to recover your critical data. Read more about ProSight Data Protection Services Managed Backup and Recovery.

  • ProSight Email Guard: Inbound and Outbound Spam Filtering, Data Leakage Protection and Email Encryption
    ProSight Email Guard is Progent's email security solution that uses the technology of top data security vendors to deliver web-based control and comprehensive security for your inbound and outbound email. The powerful architecture of Email Guard managed service combines cloud-based filtering with a local security gateway appliance to offer advanced protection against spam, viruses, Denial of Service Attacks, Directory Harvest Attacks, and other email-based threats. Email Guard's cloud filter acts as a preliminary barricade and blocks the vast majority of threats from reaching your network firewall. This reduces your exposure to external attacks and saves network bandwidth and storage space. Email Guard's onsite security gateway device adds a further level of analysis for incoming email. For outgoing email, the onsite gateway offers anti-virus and anti-spam filtering, DLP, and email encryption. The local gateway can also assist Exchange Server to monitor and safeguard internal email that originates and ends within your corporate firewall. Learn more about Progent's ProSight Email Guard spam filtering, virus defense, email content filtering and data leakage protection.

  • ProSight WAN Watch: Infrastructure Management
    ProSight WAN Watch is a network infrastructure management service that makes it simple and affordable for small and mid-sized organizations to map out, monitor, enhance and troubleshoot their connectivity hardware like switches, firewalls, and access points plus servers, client computers and other networked devices. Using state-of-the-art Remote Monitoring and Management (RMM) technology, WAN Watch makes sure that infrastructure topology maps are always updated, captures and manages the configuration information of almost all devices on your network, monitors performance, and generates notices when potential issues are discovered. By automating time-consuming management processes, WAN Watch can cut hours off ordinary chores such as network mapping, expanding your network, finding devices that need important software patches, or identifying the cause of performance issues. Find out more details about ProSight WAN Watch network infrastructure monitoring and management services.

  • ProSight LAN Watch: Server and Desktop Remote Monitoring
    ProSight LAN Watch is Progentís server and desktop remote monitoring managed service that incorporates state-of-the-art remote monitoring and management (RMM) techniques to keep your IT system running at peak levels by checking the state of critical computers that power your business network. When ProSight LAN Watch detects an issue, an alert is transmitted immediately to your specified IT staff and your Progent consultant so all looming issues can be resolved before they have a chance to disrupt your network Learn more details about ProSight LAN Watch server and desktop monitoring consulting.

  • ProSight Virtual Hosting: Hosted VMs at Progent's World-class Data Center
    With Progent's ProSight Virtual Hosting service, a small business can have its key servers and applications hosted in a secure Tier III data center on a high-performance virtual host set up and managed by Progent's IT support professionals. Under the ProSight Virtual Hosting model, the client retains ownership of the data, the OS platforms, and the apps. Because the system is virtualized, it can be ported easily to a different hosting solution without requiring a lengthy and difficult reinstallation procedure. With ProSight Virtual Hosting, your business is not locked into a single hosting provider. Find out more details about ProSight Virtual Hosting services.

  • ProSight IT Asset Management: Network Infrastructure Documentation Management
    ProSight IT Asset Management service is an IT infrastructure documentation management service that makes it easy to create, update, find and protect information related to your IT infrastructure, procedures, applications, and services. You can quickly find passwords or IP addresses and be warned about impending expirations of SSL certificates or warranties. By updating and organizing your IT infrastructure documentation, you can eliminate up to half of time wasted trying to find vital information about your network. ProSight IT Asset Management features a common location for storing and collaborating on all documents related to managing your business network like recommended procedures and How-To's. ProSight IT Asset Management also supports a high level of automation for gathering and associating IT information. Whether youíre making enhancements, performing maintenance, or reacting to an emergency, ProSight IT Asset Management gets you the data you require as soon as you need it. Find out more about ProSight IT Asset Management service.
ProSight Network Audits
Progent's ProSight Network Audits offer a fast and low-cost way for small and mid-size organizations to get an objective evaluation of the health of their network. Powered by some of the leading remote monitoring and management (RMM) tools available, and overseen by Progent's certified group of information technology professionals, ProSight Network Audits show you how well the configuration of your essential infrastructure assets adhere to best practices. Both the Basic and Advanced options for ProSight Network Audit services are offered at a budget-friendly, one-time cost and deliver instant benefits like a cleaner Active Directory (AD) environment. Both versions also come with a year of advanced remote network monitoring and management (RMM). Benefits can include simpler network management, better compliance with data security requirements, more efficient utilization of IT assets, faster troubleshooting, more dependable backup and restore, and increased uptime. Learn more about ProSight Network Audits network infrastructure assessment.

Progent's ProSight Ransomware Preparedness Report Service
The ProSight Ransomware Preparedness Report service is an affordable service built around a phone discussion with a Progent backup/recovery consultant. The fact-finding interview is designed to assess your company's ability either to stop or recover quickly after a ransomware attack. Progent will consult with you directly to gather information about your existing security profile and backup system, and Progent will then deliver a custom Basic Security and Best Practices Report describing how you can follow best practices to build a cost-effective AV and backup system that meets your business requirements. For additional information, refer to Progent's ProSight Ransomware Preparedness Report.

Fixed-price Security Evaluation and Verification Packages
Progent offers a variety of fixed-price security assessment bundles that provide exceptional value by deploying Progent's enterprise-class network monitoring software as well as Progent's consulting skills to produce an unbiased and comprehensive evaluation of your network security posture.

  • Security Assessment Service Packages for Small Businesses
    Progent offers two ultra-affordable security inventory scanning service packages intended to allow small organizations to obtain a professional security assessment from a certified security engineer. With Progent's External Security Inventory Scan, an engineer manages a comprehensive examination of your IT system from beyond your corporate firewall to identify potential risks in the security profile you present to the public. With Progent's Internal Security Inventory Scan, a security consultant executes a system scan from an authorized computer within your corporate firewall to assess your vulnerability to inside threats. The two security inventory services are set up and executed from a secured offsite location. The project is administered by an engineer who has been awarded advanced security certifications and who creates a report that details and interprets the information captured by the scan and suggests various improvements where required.
  • Security Vulnerability Assessment Packages for Large Businesses
    Progent has developed three levels of set-price security assessment service bundles intended for large organizations who need to meet compliance standards required by state or industry agencies. Progent's security assessment service bundles offer larger organizations an opportunity to get an objective look at the viability of their security profile. For each security assessment bundle, Progent engineers with advanced security credentials analyze and report on captured data and provide suggestions for efficient remediation. All the network security assessment packages include an added-cost option for onsite consultants anywhere in the U.S.
  • Stealth Penetration Testing
    Stealth penetration testing, often known as PEN testing, is a vital tool for helping businesses to find out how open their IT systems are to current-generation threats. Progent's stealth penetration testing check how well your corporate security policies and technologies stand up to authorized but unannounced intrusion attempts managed by Progent's certified security specialists utilizing advanced hacking methods. Find out about Progent's stealth penetration testing services.
We've Been Hacked: What Are We Supposed to Do?
Network Security ConsultantsIf your business is currently faced with a network security emergency and you have no formal response procedure, visit Progent's Remote Technical Help to see how to get immediate help. Progent offers online assistance from experienced network technicians and can escalate trouble tickets to high-level security experts if necessary. Your business does not have to be a registered Progent customer to receive emergency help for a security breach, but you can register as a Progent client in advance at no cost and your status as a registered client can save precious time when there is a crisis.

Typically, smaller companies have not documented a response plan in the event of a damaging attack. This is not good, since the cost of a serious security assault can be even more devastating for a small company than for a big enterprise. Progent's security specialists can help your business to design an efficient recovery and event reporting procedure that reduces the network downtime following an attack. The step-by-step post-attack handling procedure outlined by GIAC is Progent's preferred procedure for responding to a major security penetration.

High-value Security Expertise Available from Progent
Progent's certified consultants offer expertise in key areas of computer protection including:

  • Information Risk Audits and Compliance Assessment
    Progent offers experience with security evaluation software like Microsoft Baseline Security Analyzer or LANguard from GFI for performing a variety of automatic network scans to uncover possible security gaps. Progent has extensive skills with monitoring utilities and can help you to understand audit results and respond efficiently. Progent's security engineers also can perform web application testing and can perform thorough evaluation of enterprise-wide security to confirm your company's compliance with key industry security standards such as FISMA, PCI, and ISO 17799. In addition, Progent can assess the strength of your wireless security covering stationary wireless equipment as well as mobile handsets. Get more information about Progent's Vulnerability Evaluation and Security Compliance Testing.
  • Planning, Building, and Testing Secure Environments
    Any company ought to develop a carefully thought out security strategy that includes both preventive and responsive activity. The proactive plan is a collection of steps that works to minimize security holes. The reactive plan defines activities to help IT staff to evaluate the damage caused by an attack, repair the damage, record the event, and revive network functions as soon as possible. Progent can show you how to incorporate protection into your business operations, configure auditing utilities, define and execute a secure computer architecture, and propose procedures and policies to maximize the safety of your network. Progent's security professionals are ready to assist you to configure a firewall, deploy safe online and mobile access to email and data, and configure an efficient virtual private network (VPN). If your company is looking for an affordable way for outsourcing your security administration, Progent's Round-the-clock Monitoring Services include continual remote system tracking and quick resolution of problems.
  • System Restoration and Security Forensics
    Progent has skill in recovering systems and computers that have been hacked, are in question, or have failed because of a security breach. Progent can help determine the losses caused by the breach, restore normal business operations, and retrieve data lost owing to the event. Progent's security engineers can also manage a comprehensive forensic evaluation by going over event logs and using other advanced assessment techniques. Progent's background with security issues reduces your off-air time and permits Progent to suggest efficient ways to prevent or contain new attacks.
  • Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Series Firewalls, and PIX Firewalls Integration and Debugging
    Cisco CCIE Network Security ExpertsThe latest generation of ASA 5500-X Series Next-Generation Firewalls with Firepower Services provide significantly more performance than Cisco's legacy PIX and ASA 5500 firewalls and have replaced the ASA 5500 and PIX security appliances for all new installations. Following Cisco's purchase of Sourcefire, the whole line of ASA 5500-X firewalls can be provisioned to support Firepower Services, built on Sourcefire's Snort product, which is the world's most deployed network intrusion protection system. Firepower services provide powerful new capabilities including advanced malware protection (AMP), URL filtering, dynamic threat analytics, and automation. Progent's Cisco-qualified CCIE network experts can help your company to maintain your legacy PIX or ASA 5500 security appliances or migrate efficiently to ASA 5500-X firewalls with Firepower Services. Progent's consultants offer remote and onsite support for ASA 5500-X firewalls with Firepower Services and can help your company to plan, configure, tune, administer and debug firewall solutions built around Cisco ASA 5500-X firewalls with Firepower Services. See additional information about Cisco ASA Firewalls with Firepower Services configuration and debugging services.
  • Additional Firewall and VPN Solutions
    As well as supporting a wide array of protection solutions from Microsoft and Cisco, Progent can provide small businesses top-level consulting for products from other major firewall and Virtual Private Network (VPN) vendors such as:
  • SIEM Security Information and Event Management Solutions
    Security information and event management (SIEM) applications and services are designed to digest the enormous quantity of data collected in security incident logs generated by a wide range of sources including network infrastructure appliances, servers, and applications and tools. SIEM applications analyzes the security logs from these various sources and creates consolidated reports of security incidents as mandated by government regulations and industry compliance standards. Progent's GIAC-certified network security consultants and Cisco-certified network consultants can assist businesses to design, deploy and manage a SIEM solution that enables them to understand the progress of security incidents and comply with event reporting requirements. (See Progent's Security information and Event Management (SIEM) solutions.)
Progent's Security Accreditations
Progent's security specialists have been awarded some of the most respected accreditations offered in the industry. All of these certifications demand exhaustive testing and proven work experience to guarantee that recipients have acquired expertise with a significant amount of security information and techniques and can provide high-level solutions to computer environments of any complexity.
  • Certified Information Security Manager (CISM) Security Support Services
    CISM identifies the fundamental competencies and international standards of service that information technology security professionals are required to master. CISM provides business management the assurance that consultants who have earned their accreditation possess the background and knowledge to provide efficient security administration and consulting support. Progent can offer a CISM expert to assist your enterprise in critical security disciplines such as information protection governance, vulnerability assessment, data protection process management, and incident response management. Find out additional details about Progent's CISM Security Consulting Expertise.

  • Certified Information Systems Security Professionals (CISSP) Security Consulting Services
    Progent's Certified Information Systems Security Professionals (CISSPs) are security specialists who have been awarded CISSP accreditation through verified experience, rigorous study, and formal examination. CISSP qualification recognizes expertise in a worldwide standard for IT security. American National Standards Institute has given the CISSP credential official recognition in the area of information security under ISO/IEC 17024. Fields of knowledge covered under CISSP include security management procedures, security architecture and models, connection control systems, applications development security, business processes security, physical security, encryption, communications, Internet security, and business continuity planning. Get more information concerning Progent's CISSP Consulting Assistance.

  • ISSAP Engineering Services
    Progent's ISSAP qualified security experts are experts who have been awarded ISSAP status after thorough testing and substantial hands-on work with information security architecture. ISSAP consultants have comprehensive understanding of access management systems and techniques, phone system and network protection, cryptography, needs evaluation, business continuity planning (BCP) and disaster recovery planning (DRP), and physical security integration. Progent's ISSAP-qualified security experts can assist your company with all aspects of architecture security. Read additional information concerning Progent's ISSAP Certified Secure Network Architecture Engineering Support.

  • Certified Information Systems Auditor (CISA) Consulting Services
    The CISA credential is a globally recognized achievement that indicates expertise in information system security auditing. Certified by the American National Standards Institute, the CISA accreditation requires that consultants undergo an extensive test administered by the ISACA professional group. Progent offers the expertise of a CISA-qualified security professional able to help businesses in the fields of information systems audit process, IT administration, network assets and architecture planned useful life, information technology support, protecting data assets, and business continuity preparedness. Find out more information about Progent's CISA Professional Services.

  • GIAC (Global Information Assurance Certification) Professional Services
    Global Information Assurance Certification was established in 1999 to validate the skill of information technology security engineers. GIAC's goal is to assure that an accredited professional possesses the knowledge appropriate to deliver support in critical categories of network, information, and software security. GIAC accreditations are recognized by companies and government organizations throughout the world including and the United States National Security Agency. Progent offers the assistance of GIAC certified consultants for all of the security capabilities addressed under GIAC accreditation programs including assessing security systems, incident response, intrusion detection, and web services security. Read the details concerning Progent's GIAC Consulting Expertise.
Contact Progent for Computer Security Support
If you need security expertise, phone Progent at 800-993-9400 or refer to Contact Progent.
















© 2002- 2018 Progent Corporation. All rights reserved.