Overview of Progent's Security and Compliance Consulting Services
Progent's industry certified computer security and compliance experts offer a broad range of support services designed to assist companies of any size to detect and eliminate security weaknesses, defend against malicious attacks, recover from the problems resulting from a breakdown of security, and comply with regulatory requirements for protecting information and reporting security incidents. Progent can provide a choice of service delivery models:

  • On-demand remote and on-premises assistance invoiced by the minute
  • On-going fully managed services invoiced at an affordable flat monthly fee
  • Set-price service packages for a single security and compliance evaluation
As-needed Security and Compliance Support Services
Once you sign up for Progent's services (registration is free), you can get as-needed remote or on-premises support from a Progent security and compliance consultant. This classic support model is primarily reactive and geared toward rapidly resolving IT problems that are disrupting your network or that have stymied your own support personnel. Typical examples are configuring a firewall appliance or VPN tunnel, installing a critical security update for a Cisco switch or router, setting up compliant access to a public cloud, or recovering from a ransomware assault. These services are invoiced to the nearest minute, which avoids the annoying case of receiving large bills for fast repairs.

Delivery alternatives for Progent's on-demand support include:

  • Remote Security Services
    Most security-related problems can be handled online through a mix of phone-based support and an connection between Progent's Technical Response Center (TRC) and a customer's computer. Progent's TRC group can deliver remote security help by offering easy access to consultants who have the background and resources to fix some of the most challenging issues quickly, making your support expenses affordable and reducing lost productivity.
  • Onsite Security Support Services
    For cases where onsite assistance is required, Progent can dispatch a technical professional to major metropolitan areas throughout the U.S. Progent can also dispatch a security consultant with top certifications and world-class skills to any location in the U.S.
Progent's accredited security consultants are certified to provide help for systems powered by Windows, Linux, Apple Mac, Solaris, and popular derivatives of UNIX. Progent's wide array of services addresses firewall expertise, email systems, protected system design, and data restoration. Progent's support team has been awarded the industry's most advanced security accreditations including GIAC (Global Information Assurance Certification) and ISSAP. Progent also offers immediate access to remote Cisco-certified CCIE network engineers who can deliver advanced support with tough network integration problems.

ProSight Low-Cost Managed Services for Information Assurance
Progent's affordable ProSight line of network monitoring and management services is intended to provide small and mid-size organizations with enterprise-class support and state-of-the-art technology for all aspects of information assurance. ProSight managed services offered by Progent include:

  • ProSight Active Security Monitoring: Endpoint Protection and Ransomware Defense
    ProSight Active Security Monitoring is an endpoint protection (EPP) service that utilizes cutting edge behavior-based machine learning technology to guard endpoint devices as well as servers and VMs against new malware assaults such as ransomware and email phishing, which routinely get by legacy signature-based AV products. ProSight ASM protects on-premises and cloud resources and provides a single platform to address the entire threat progression including protection, detection, mitigation, remediation, and forensics. Key capabilities include single-click rollback with Windows Volume Shadow Copy Service and automatic system-wide immunization against newly discovered threats. Read more about Progent's ProSight Active Security Monitoring (ASM) endpoint protection and ransomware defense.

  • ProSight Enhanced Security Protection: Unified Physical and Virtual Endpoint Protection
    ProSight Enhanced Security Protection (ESP) managed services offer affordable multi-layer security for physical servers and virtual machines, desktops, mobile devices, and Exchange Server. ProSight ESP utilizes adaptive security and modern behavior analysis for continuously monitoring and responding to security threats from all vectors. ProSight ESP provides two-way firewall protection, intrusion alarms, endpoint control, and web filtering through cutting-edge tools packaged within a single agent accessible from a single control. Progent's security and virtualization consultants can assist your business to plan and implement a ProSight ESP environment that addresses your company's specific requirements and that helps you prove compliance with government and industry information protection regulations. Progent will help you specify and configure security policies that ProSight ESP will manage, and Progent will monitor your network and respond to alarms that call for urgent action. Progent can also assist you to install and test a backup and restore system like ProSight Data Protection Services so you can recover rapidly from a potentially disastrous cyber attack such as ransomware. Learn more about Progent's ProSight Enhanced Security Protection (ESP) unified endpoint protection and Exchange filtering.

  • ProSight DPS: Managed Cloud Backup and Recovery
    ProSight Data Protection Services from Progent offer small and mid-sized organizations an affordable end-to-end solution for secure backup/disaster recovery (BDR). Available at a fixed monthly cost, ProSight DPS automates and monitors your backup processes and allows fast restoration of vital data, applications and virtual machines that have become lost or corrupted due to component failures, software glitches, natural disasters, human error, or malicious attacks such as ransomware. ProSight Data Protection Services can help you protect, retrieve and restore files, folders, applications, system images, plus Microsoft Hyper-V and VMware images. Important data can be backed up on the cloud, to a local storage device, or to both. Progent's backup and recovery specialists can provide world-class support to configure ProSight DPS to to comply with regulatory standards such as HIPPA, FINRA, and PCI and, whenever necessary, can help you to restore your business-critical information. Learn more about ProSight Data Protection Services Managed Backup and Recovery.

  • ProSight Email Guard: Inbound and Outbound Spam Filtering, Data Leakage Protection and Email Encryption
    ProSight Email Guard is Progent's email security platform that uses the services and infrastructure of top information security vendors to provide web-based management and comprehensive security for your inbound and outbound email. The hybrid architecture of Email Guard integrates a Cloud Protection Layer with a local security gateway appliance to provide advanced defense against spam, viruses, Dos Attacks, DHAs, and other email-borne malware. Email Guard's Cloud Protection Layer serves as a preliminary barricade and keeps the vast majority of unwanted email from making it to your network firewall. This decreases your vulnerability to external threats and conserves network bandwidth and storage. Email Guard's onsite gateway appliance adds a further level of analysis for incoming email. For outbound email, the on-premises security gateway provides AV and anti-spam protection, DLP, and email encryption. The local gateway can also assist Exchange Server to monitor and safeguard internal email that originates and ends within your corporate firewall. Learn more about Progent's ProSight Email Guard spam filtering, virus defense, content filtering and data leakage protection.

  • ProSight WAN Watch: Network Infrastructure Management
    Progentís ProSight WAN Watch is an infrastructure monitoring and management service that makes it easy and affordable for smaller organizations to diagram, monitor, reconfigure and debug their networking appliances such as routers, firewalls, and load balancers as well as servers, endpoints and other devices. Incorporating cutting-edge Remote Monitoring and Management (RMM) technology, WAN Watch ensures that infrastructure topology maps are kept updated, copies and manages the configuration information of virtually all devices on your network, monitors performance, and sends notices when potential issues are discovered. By automating tedious management and troubleshooting activities, ProSight WAN Watch can knock hours off common chores such as network mapping, reconfiguring your network, locating appliances that need important software patches, or resolving performance problems. Find out more about ProSight WAN Watch infrastructure monitoring and management services.

  • ProSight LAN Watch: Server and Desktop Monitoring and Management
    ProSight LAN Watch is Progentís server and desktop remote monitoring managed service that incorporates advanced remote monitoring and management technology to help keep your IT system running at peak levels by tracking the state of vital assets that power your business network. When ProSight LAN Watch uncovers a problem, an alert is sent automatically to your designated IT management staff and your assigned Progent consultant so any looming issues can be resolved before they have a chance to impact productivity Learn more about ProSight LAN Watch server and desktop remote monitoring consulting.

  • ProSight Virtual Hosting: Hosted Virtual Machines at Progent's Tier III Data Center
    With ProSight Virtual Hosting service, a small organization can have its key servers and apps hosted in a protected Tier III data center on a high-performance virtual host configured and maintained by Progent's network support professionals. Under Progent's ProSight Virtual Hosting model, the client retains ownership of the data, the OS software, and the applications. Because the system is virtualized, it can be ported immediately to an alternate hosting environment without a lengthy and technically risky configuration process. With ProSight Virtual Hosting, you are not tied a single hosting provider. Learn more about ProSight Virtual Hosting services.

  • ProSight IT Asset Management: Network Documentation Management
    Progent's ProSight IT Asset Management service is a cloud-based IT documentation management service that makes it easy to create, maintain, find and protect information related to your network infrastructure, procedures, business apps, and services. You can quickly locate passwords or serial numbers and be warned automatically about upcoming expirations of SSLs or domains. By updating and organizing your IT infrastructure documentation, you can eliminate as much as 50% of time wasted looking for vital information about your network. ProSight IT Asset Management features a centralized location for storing and sharing all documents related to managing your business network such as standard operating procedures (SOPs) and self-service instructions. ProSight IT Asset Management also offers a high level of automation for gathering and associating IT information. Whether youíre planning improvements, performing maintenance, or reacting to a crisis, ProSight IT Asset Management delivers the knowledge you require as soon as you need it. Learn more about Progent's ProSight IT Asset Management service.
ProSight Network Audits
Progent's ProSight Network Audits are a fast and affordable alternative for small and mid-size organizations to obtain an unbiased assessment of the overall health of their network. Based on some of the top remote monitoring and management tools in the industry, and supervised by Progent's certified group of IT professionals, ProSight Network Audits help you see how well the deployment of your core infrastructure devices conform to best practices. Both the Basic and Advanced options for ProSight Network Audit services are available at a budget-friendly, one-time cost and deliver immediate ROI such as a cleaner Active Directory system. Both also include one year of advanced remote network monitoring and management (RMM). Advantages can include lower-cost network management, improved compliance with information security requirements, higher utilization of IT resources, quicker problem resolution, more reliable backup and restore, and less downtime. See more about Progent's ProSight Network Audits IT infrastructure review.

Progent's ProSight Ransomware Preparedness Report
The ProSight Ransomware Preparedness Report is a low-cost service built around a brief discussion with a Progent information assurance consultant. The fact-finding interview is intended to help assess your organization's ability either to stop or recover rapidly after a ransomware incident. Progent will consult with you personally to collect information concerning your current security profile and backup/recovery system, and Progent will then produce a written Basic Security and Best Practices Report detailing how you can follow industry best practices to deploy an efficient AV and backup system that meets your company's needs. For details, visit Progent's ProSight Ransomware Preparedness Report Service.

Fixed-price Security Assessment and Validation Packages
Progent has put together a number of fixed-price security and compliance evaluation packages that deliver exceptional value by utilizing Progent's enterprise-class system monitoring and analysis software as well as Progent's technical experience to create an unbiased and comprehensive evaluation of your IT environment security profile.

  • Security Assessment Service Packages for Small Organizations
    Progent offers two value-priced security inventory scanning service packages designed to enable small businesses to get an objective security assessment from a certified security consultant. With Progent's External Security Inventory Scan, a consultant administers a comprehensive assessment of your IT system from beyond your firewalled perimeter to identify possible risks in the security profile you present to the outside. With Progent's Internal Security Inventory Scan, a security expert executes a network scan from an authorized machine within your corporate firewall to evaluate your exposure to inside assaults. These two security inventory scanning services are set up and executed from a secured external site. The scan is administered by an engineer who has been awarded high-level security certifications and who creates a document that describes and evaluates the information captured by the scan and recommend various enhancements where appropriate.
  • Security Vulnerability Evaluation Bundles for Large Organizations
    Progent offers three levels of fixed-price security assessment service packages designed for large organizations who need to meet compliance standards required by state or industry agencies. Progent's security evaluation service bundles offer larger organizations an opportunity to get a professional look at the strength of their security posture. For every security assessment package, Progent engineers with top security credentials analyze and report on captured data and provide recommendations for cost-effective remediation. All the network security audit packages include an added-cost option for onsite engineers anywhere in the U.S.
  • Stealth Penetration Testing Services
    Stealth penetration testing, often referred to as PEN testing, is a vital technique for helping businesses to determine how vulnerable their network systems are to modern attacks. Progent's stealth penetration testing services test how well your corporate security procedures and technologies resist authorized but unannounced penetration attempts launched by Progent's experienced security specialists utilizing cutting-edge hacking techniques. Find out about Progent's stealth penetration testing (PEN Test) services.
Our Network Has Been Hacked: What Are We Supposed to Do Now?
Network Security ConsultantsIf your company is currently experiencing a network security emergency and you have not prepared a detailed response procedure, go to Progent's Online Technical Support to see how to get immediate assistance. Progent offers online help from skilled engineers and can refer problems to certified security experts if necessary. Your company does not need to be a registered Progent customer to get emergency help for a security breach, but you can sign up as a Progent customer in advance for free and your standing as a current client could save valuable time in case of a crisis.

Typically, smaller companies do not have a recovery plan in the event of a successful attack. This is not good, since the damage from a successful security attack can be more catastrophic for a small business than for a big corporation. Progent's security consultants can help your company to create a practical response and incident reporting procedure that reduces the network downtime following an attack. The formal incident response procedure promoted by GIAC is Progent's recommended method for responding to a major security penetration.

Advanced Security Expertise Available from Progent
Progent's security consultants can provide specialized help in vital facets of network security such as:

  • Vulnerability Evaluation and Compliance Testing
    Progent provides expertise with security auditing utilities such as Microsoft Baseline Security Analyzer or LANguard from GFI for conducting a variety of automatic network scans to identify potential security problems. Progent has broad experience with these utilities and can help your company to understand assessment reports and react efficiently. Progent's certified security engineers also offer web application validation and can conduct expert assessments of enterprise-wide security to verify your organization's compliance with key global security standards including FISMA, NIST, and ISO. In addition, Progent can evaluate the strength of your wireless security including fixed wireless appliances as well as mobile handsets. Get the details concerning Progent's Vulnerability Evaluation and Security Compliance Assessment.
  • Planning, Implementing, and Validating Protected Environments
    Any business ought to have a carefully considered security plan that incorporates both preventive and responsive activity. The proactive strategy is a collection of precautions that helps to minimize security holes. The reactive strategy defines procedures to assist IT personnel to evaluate the damage caused by a breach, remediate the damage, document the event, and restore network functions as quickly as feasible. Progent can show you how to design protection into your business processes, install auditing utilities, define and build a safe IT infrastructure, and recommend processes and policies that will enhance the safety of your information system. Progent's security experts are ready to assist you to configure a firewall, design protected remote connectivity to email and data, and install an effective virtual private network. If your company is looking for an economical option for outsourcing your network security management, Progent's Round-the-clock Network Support Packages feature continual remote system monitoring and immediate resolution of emergencies.
  • Data Restoration and Failure Analysis
    Progent has expertise in restoring systems and devices that have been compromised, are in question, or have stopped working because of a security breakdown. Progent can show you how to assess the damage caused by the breach, restore normal business operations, and recover data lost as a result of the attack. Progent's certified engineers can also perform a comprehensive failure analysis by going over event logs and utilizing a variety of advanced forensics tools. Progent's experience with security consulting minimizes your off-air time and permits Progent to suggest effective strategies to prevent or contain new assaults.
  • Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Series Firewalls, and PIX Firewalls Integration and Troubleshooting
    Cisco Certified CCIE Network Security SpecialistsThe current Cisco ASA 5500-X Series Next-Generation Firewalls with Firepower Services provide substantially more value than Cisco's earlier PIX and ASA 5500 firewalls and have superseded the ASA 5500 and PIX security appliances for new deployments. Following Cisco's purchase of Sourcefire, the whole family of Cisco ASA 5500-X firewalls can be configured to support Firepower Services, based on Sourcefire's Snort product, which is the market's most popular network intrusion protection system. Firepower services provide powerful new features including advanced malware protection (AMP), URL filtering, real-time threat analytics, and automation. Progent's Cisco-certified CCIE network experts can assist you to maintain your current PIX or ASA 5500 security appliances and migrate efficiently to ASA 5500-X firewalls with Firepower Services. Progent's consultants offer online and on-premises support for ASA 5500-X firewalls with Firepower Services and can help you to plan, deploy, tune, manage and troubleshoot firewall solutions based around Cisco ASA 5500-X firewalls with Firepower Services. Read additional information about Cisco ASA Firewalls with Firepower configuration and debugging services.
  • Other Firewall and VPN Consulting Services
    In addition to supporting a broad range of protection technologies from Microsoft and Cisco, Progent offers small companies top-level engineering services for technologies from other important firewall and VPN suppliers such as:
  • SIEM Solutions
    Security information and event management (SIEM) applications and services are designed to interpret the enormous quantity of information collected in security incident logs generated by a wide range of sources including network appliances, servers, and applications and monitoring tools. SIEM applications organizes the security event records from these diverse sources and produces summary reports of security incidents as mandated by state regulations and industry compliance guidelines. Progent's GIAC-certified information assurance experts and Cisco-certified network infrastructure experts can assist organizations to design, install and operate a SIEM system that helps them to see the behavior of attacks and comply with event reporting requirements. (See Progent's Security information and Event Management (SIEM) solutions.)
Progent's Security Certifications
Progent's security consultants have earned some of the most prestigious certifications available in the industry. All of these certifications require exhaustive examinations and demonstrated field background to guarantee that candidates have acquired expertise with a substantial body of security information and techniques and can provide high-level solutions to information environments of any complexity.
  • Certified Information Security Manager (CISM) Security Support Services
    CISM defines the basic skills and international standards of service that information technology security managers are required to master. It provides business management the assurance that those who have earned their certification possess the background and knowledge to offer effective security administration and consulting support. Progent can offer a CISM support professional to help your organization in vital security areas such as data security governance, vulnerability assessment, data protection process control, and incident response support. Find out additional details about Progent's Certified Information Security Manager (CISM) Security Support Assistance.

  • Certified Information Systems Security Professionals (CISSP) Security Support Services
    Progent's CISSP experts are security specialists who have earned CISSP certification as a result of verified experience, extensive study, and formal testing. CISSP Certification recognizes mastery of an international standard for IT security. ANSI has granted the CISSP status official recognition in the area of IT security under ISO/IEC 17024. Areas of expertise included within CISSP include security management practices, security design and test systems, access permission systems, software development security, business processes security, physical security, encryption, telecommunications, Internet security, and disaster recovery planning. Find out additional information about Progent's CISSP Consulting Assistance.

  • Information Systems Security Architecture Professionals (ISSAP) Engineering Services
    Progent's ISSAP certified security experts are consultants who have been awarded ISSAP accreditation following rigorous testing and substantial hands-on work with network security design. ISSAP consultants have in-depth knowledge of access control systems and techniques, telecommunications and network infrastructure security, cryptography, needs evaluation, business continuity planning (BCP) and disaster recovery planning (DRP), and physical security integration. Progent's ISSAP-certified security experts can assist your business with all aspects of architecture security. Learn additional information concerning Progent's ISSAP Certified Secure Network Infrastructure Consulting Services.

  • Certified Information Systems Auditor Professional Services
    The Certified Information Systems Auditor credential is a prestigious qualification that represents mastery in IS security auditing. Accredited by the American National Standards Institute (ANSI), the CISA accreditation requires that consultants pass an extensive examination given by the ISACA professional group. Progent offers the services of a CISA-qualified security engineer able to help companies in the areas of IS audit process, IT governance, systems and infrastructure planned useful life, information technology service delivery, safeguarding data resources, and disaster recovery preparedness. Find out more details about Progent's Certified Information Systems Auditor (CISA) Professional Services.

  • Global Information Assurance Certification Consulting Expertise
    GIAC (Global Information Assurance Certification) was established in 1999 to validate the skill of information technology security experts. GIAC's mission is to make sure that an accredited security consultant possesses the skills necessary to deliver support in vital categories of network, data, and application software security. GIAC accreditations are recognized by businesses and government organizations all over the world including and the United States NSA. Progent offers the expertise of GIAC certified consultants for any of the security disciplines covered within GIAC certification topics such as assessing networks, incident response, intrusion detection, and web services security. Learn the details concerning Progent's GIAC Professional Assistance.
Contact Progent for Network Security Support
If you're looking for computer security support services, call Progent at 800-993-9400 or refer to Contact Progent.
















© 2002- 2018 Progent Corporation. All rights reserved.