Overview of Progent's Security Support Services
Progent's industry certified computer security experts can provide a wide selection of support services intended to help companies of all sizes to detect and correct security vulnerabilities, block attacks, recover from any issues caused by a breakdown of protection, and comply with government requirements for reporting security incidents. Progent can provide online and on premises support and also offers economical set-price security assessment packages to complement Progent's regular by-the-minute pricing.

Service delivery options available from Progent include:

  • On-line Security Support Services
    Typical security issues can be resolved remotely by a combination of telephone support and secure Internet connections between Progent's Technical Response Center (TRC) and a customer's computer system. Progent's Technical Response support team includes security professionals with the background and the technical resources to fix even the most challenging problems promptly, keeping your service costs affordable and minimizing lost productivity. Progent provides security assistance on a by-the-minute basis without minimum billing for online consulting support. Progent's pricing model eliminates situations where quick fixes turn into big charges. Progent also has available a number of fixed-price remote security and compliance evaluation bundles that represent extraordinary value by utilizing Progent's sophisticated network scanning technology as well as Progent's consulting expertise to deliver an objective and thorough picture of your network vulnerability.

  • On-premises Security Options
    For cases where in-person support is necessary, Progent can dispatch a field professional to larger cities throughout the U.S. Progent's security consultants are in addition available to assist with jobs that call for high-level security professionals to be on premises anywhere in the United States, and Progent's most comprehensive security evaluation bundles for large businesses feature the services of several qualified security engineers on site.

  • Urgent Security Support Services
    To get immediate assistance with critical computer security issues, your business can get in touch with a world-class online troubleshooting expert from Progent's roster of security engineers at Progent's Technical Response Center. Progent's emergency remote security service staff is available to offer effective and affordable help with security problems that threaten the productivity of your network. Progent's accredited engineers are qualified to provide help for environments based on Windows, Linux, Mac, Sun Solaris, and major derivatives of UNIX. Progent's wide array of services encompasses firewall configuration, email and messaging security, secure network design, and information recovery. Progent's technical support team has been awarded the industry's top security accreditations including Certified Information Systems Auditor (CISA) and CISSP. Progent also can provide fast access to remote Cisco-certified CCIE network engineers who can provide advanced support with tough network integration issues.

Progent's Fixed-price Managed Services for Information Security
Progent offers a selection of low-cost, set-price monthly services designed to provide small and mid-size businesses with enterprise-class support and cutting-edge technology for all facets of information assurance. Managed services available from Progent include:

  • Email Guard: Spam Filtering, Data Leakage Protection and Content Filtering
    Email Guard is Progent's email security solution that incorporates the technology of top information security companies to deliver web-based management and world-class protection for all your inbound and outbound email. The hybrid architecture of Email Guard combines a Cloud Protection Layer with a local security gateway device to offer complete defense against spam, viruses, Denial of Service (DoS) Attacks, Directory Harvest Attacks, and other email-based malware. Email Guard's cloud filter acts as a preliminary barricade and keeps most unwanted email from making it to your network firewall. This decreases your vulnerability to inbound threats and saves network bandwidth and storage. Email Guard's on-premises security gateway appliance adds a further layer of analysis for incoming email. For outbound email, the on-premises security gateway offers AV and anti-spam protection, protection against data leaks, and email encryption. The local security gateway can also help Microsoft Exchange Server to monitor and safeguard internal email that originates and ends within your corporate firewall. Learn more about Progent's Email Guard Spam Filtering, Virus Blocking, Email Content Filtering and Data Leakage Prevention.

  • ProSight Active Security Monitoring: Next Generation Endpoint Protection and Ransomware Recovery
    ProSight Active Security Monitoring (ASM) is an endpoint protection service that utilizes cutting edge behavior analysis tools to guard endpoints as well as servers and VMs against modern malware attacks such as ransomware and file-less exploits, which easily get by traditional signature-based AV products. ProSight Active Security Monitoring protects local and cloud resources and offers a single platform to manage the complete malware attack progression including filtering, infiltration detection, containment, remediation, and forensics. Key capabilities include one-click rollback with Windows Volume Shadow Copy Service and automatic network-wide immunization against new attacks. Find out more about Progent's ProSight Active Security Monitoring next-generation endpoint protection and ransomware recovery.

  • ProSight DPS: Managed Backup
    ProSight Data Protection Services from Progent provide small and mid-sized businesses a low cost end-to-end service for secure backup/disaster recovery (BDR). Available at a fixed monthly rate, ProSight DPS automates your backup activities and enables fast recovery of critical files, applications and VMs that have become unavailable or corrupted as a result of hardware breakdowns, software glitches, disasters, human mistakes, or malware attacks such as ransomware. ProSight Data Protection Services can help you protect, retrieve and restore files, folders, apps, system images, plus Microsoft Hyper-V and VMware images. Critical data can be protected on the cloud, to a local storage device, or mirrored to both. Progent's cloud backup specialists can provide advanced support to set up ProSight DPS to to comply with government and industry regulatory standards like IPPA, FINRA, PCI and Safe Harbor and, when needed, can help you to restore your critical data. Find out more about ProSight Data Protection Services Managed Backup and Recovery.
Our Network Has Been Hacked: What Can We Do?
Network Security ConsultantsIf your company is currently fighting a security emergency and you do not have a detailed recovery plan, visit Progent's Online Network Help to find out how to get immediate help. Progent provides online help from skilled engineers and can refer trouble tickets to certified security specialists if required. Your organization does not need to be a registered Progent customer to get emergency help for a security breakdown, but you can register as a Progent customer ahead of time at no cost and your standing as a current client can save valuable time in an emergency.

Typically, smaller businesses have not documented a recovery plan in case of a successful penetration. This is risky, since the cost of a successful security assault can be even more catastrophic for a small business than for a big corporation. Progent's security specialists can help your company to create a sensible recovery and incident reporting plan that minimizes the network downtime resulting from a security breach. The step-by-step incident handling procedure outlined by Global Information Assurance Certification is Progent's preferred method for handling a major security attack.

Practice Areas of Progent's Security Consulting Expertise
Coordinating data security plus planning for restoring critical data and systems after an attack demands a continual program that entails a variety of tools and procedures. Progent's certified security consultants can help your organization at whatever level in your efforts to safeguard your information system and stay in compliance, Services range from security evaluation to designing a complete security program. Important technologies supported by Progent's experts include Security Planning and Implementation, Data Restoration and Security Forensics, plus Managed Filtering of Email-Borne Threats.

  • Planning, Implementing, and Testing Secure Environments
    Any company should develop a carefully considered security strategy that includes both preventive and reactive elements. The proactive strategy is a collection of steps that works to minimize security holes. The reactive plan defines activities to help security personnel to assess the losses caused by an attack, remediate the damage, record the experience, and restore network functions as soon as feasible. Progent can show you how to incorporate protection into your business operations, set up scanning utilities, create and build a secure IT infrastructure, and propose processes and policies to enhance the safety of your network. Progent's security professionals are ready to assist you to configure a firewall, design protected offsite connectivity to email and files, and install an efficient virtual private network. If your company is looking for an affordable option for jobbing out your network security management, Progent's 24x7 Network Support Services feature continual remote system tracking and quick resolution of problems.

  • System Restoration and Security Forensics
    Progent provides expertise in restoring systems and servers that have been compromised, are in question, or have ceased to function because of a security breakdown. Progent can show you how to determine the damage caused by the attack, return your company to normal functions, and retrieve data lost owing to the event. Progent's security specialists can also manage a comprehensive failure evaluation by going over activity logs and utilizing other advanced forensics techniques. Progent's background with security consulting reduces your off-air time and allows Progent to suggest efficient measures to prevent or contain future attacks.
Advanced Security Services Offered by Progent
Progent's certified engineers offer advanced support in vital facets of IT security such as:
  • Vulnerability Audits and Compliance Assessment
    Progent provides expertise with information risk evaluation utilities such as MS Baseline Security Analyzer or LANguard from GFI for conducting a variety of comprehensive system tests to identify possible security gaps. Progent has broad experience with these utilities and can help you to analyze audit reports and react efficiently. Progent's security consultants also offer web application testing and can perform thorough evaluation of enterprise-wide security to validate your organization's compliance with important global security specifications such as HIPAA, PCI, and ISO 17799. In addition, Progent can evaluate the strength of your wireless protection including fixed wireless appliances plus portable devices. Find out more details about Progent's Information Risk Evaluation and Compliance Assessment.

  • Security Inventory Scanning Bundles for Small Businesses
    Progent offers two low-cost security inventory bundles intended to enable small businesses to get an independent network security assessment from an accredited security consultant. With Progent's External Security Inventory Checkup, an engineer runs an extensive test of your network from outside your company firewall to determine possible risks in the security profile you present to the public. With Progent's Internal Security Inventory Checkup, a certified security professional runs a system scan from a secure computer inside your firewall to assess vulnerabilities to internal attacks. Both security inventory services are configured and executed from a protected external site. The process is managed by a consultant with top security credentials who produces a document that summarizes and analyzes the information collected by the security scan and suggests practical improvements where call for.

  • Security Vulnerability Assessment Bundles for Enterprises
    Progent's qualified security engineers can provide a selection of set-price security audit service bundles designed for enterprises who have to comply with security levels required by state regulators or by customers. Progent's network security audit service packages offer larger organizations a chance to receive an objective look at the effectiveness of their protection environment. For each security evaluation package, Progent consultants with top security accreditations evaluate and summarize scanned data and provide recommendations for efficient improvements. The different network security assessment packages feature an added-cost option for on-premises engineers anywhere in the U.S.

  • Migrating from ISA Server 2006 and Microsoft Forefront Threat Management Gateway 2010
    Microsoft Internet Security and Acceleration (ISA) Server and its replacement Forefront TMG 2010 are software solutions that include an application-layer firewall that can guard systems from outside and inside threats. Both of these products provide in-depth examination of network protocols to detect threats that can elude early-generation firewalls. Microsoft Internet Security and Acceleration Server was superseded by Forefront TMG, which is built on ISA Server's architecture while delivering a variety of improved capabilities. Forefront TMG has been discontinued by Microsoft, and the gateway security functions offered by the platform are now commonly handled by dedicated physical appliances from vendors such as Cisco, Check Point, SonicWALL and WatchGuard. (See Cisco ASA Firewall with Firepower Services integration and support.) Progent offers online Forefront Threat Management Gateway support services and Microsoft ISA Server 2006 consulting services to help you maintain and troubleshoot your legacy firewall environment, and Progent can help you to migrate smoothly to a more current firewall solution by providing planning, integration, tuning, IT staff training and debugging.

  • Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Firewalls, and PIX 500 Firewalls Integration and Troubleshooting
    Cisco Certified CCIE Network Security ConsultantsThe new ASA 5500-X Series Next-Generation Firewalls with Firepower Services deliver significantly more bang for the buck than Cisco's previous PIX and ASA 5500 firewalls and have replaced the ASA 5500 and PIX security appliances for new installations. Following Cisco's purchase of Sourcefire, the whole line of ASA 5500-X firewalls can be configured to support Firepower Services, built on Sourcefire's Snort product, which is the market's most deployed intrusion protection system (IPS). Firepower services bring enhanced capabilities including advanced malware protection (AMP), URL filtering, dynamic threat analytics, and security automation. Progent's Cisco-certified CCIE network consultants can help you to maintain your current PIX or ASA 5500 security appliances or upgrade to Cisco ASA 5500-X firewalls with Firepower Services. Progent's consultants offer remote and on-premises help with ASA 5500-X firewalls with Firepower Services and can assist your business to design, deploy, optimize, administer and debug firewall solutions based on Cisco ASA 5500-X firewalls with Firepower Services. Read additional details about ASA 5500-X Firewalls with Firepower Services integration and troubleshooting services.

  • Other Firewall and VPN Consulting Services
    As well as supporting a broad range of security solutions available from Microsoft and Cisco, Progent can provide small and mid-size businesses expert support for products from other major firewall and Virtual Private Network (VPN) suppliers including:

  • SIEM Security Information and Event Management Integration and Support
    Security information and event management (SIEM) applications and services are designed to interpret the massive quantity of data represented by security incident logs created by a wide range of sources including network infrastructure appliances, servers, and applications and tools. SIEM applications organizes the security logs from these diverse sources and produces consolidated reports of security events as required by state regulations and business compliance guidelines. Progent's GIAC-certified computer security experts and Cisco-certified network consultants can help businesses to plan, install and operate a SIEM system that helps them to understand the progress of security incidents and comply with event reporting requirements. (Visit Progent's Security information and Event Management solutions.)
Progent's Security Certifications
Progent's security engineers have been awarded some of the most respected accreditations available in the industry. All of these certifications require exhaustive testing and demonstrated field background to ensure that candidates have mastered a substantial body of security information and techniques and can offer advanced security solutions to computer networks of any size.
  • CISM Security Support Expertise
    CISM defines the core skills and worldwide benchmarks of service that information security professionals are expected to achieve. It provides executive management the assurance that consultants who have earned their CISM have the background and knowledge to offer efficient security management and consulting support. Progent can provide a CISM-certified expert to help your organization in critical security areas including information security governance, risk management, information protection process control, and crisis handling management. Read more information about Progent's Certified Information Security Manager Security Support Services.

  • CISSP Security Consulting Expertise
    Progent's Certified Information Systems Security Professionals (CISSPs) are security engineers who have been awarded CISSP certification through demonstrated professional work, rigorous study, and exhaustive testing. CISSP Certification indicates expertise in an international standard for information security. ANSI has given the CISSP credential accreditation in the field of information security under ISO/IEC 17024. Areas of knowledge included within CISSP include security administration procedures, security design and test systems, connection control methodology, software development security, operations security, physical security, encryption, communications, network security, and business continuity planning. Learn additional details about Progent's Certified Information Systems Security Professionals (CISSP) Consulting Services.

  • Information Systems Security Architecture Professionals (ISSAP) Consulting Services
    Progent's ISSAP qualified security experts are consultants who have been awarded ISSAP accreditation following thorough examination and extensive experience. field experience with information security design. ISSAP security experts have comprehensive knowledge of access control systems and techniques, telecommunications and network security, cryptography, requirements analysis, business continuity and disaster recovery planning (DRP), and physical security. Progent's ISSAP-certified security specialists can help your company with all phases of secure network architecture. Read more details about Progent's ISSAP Certified Secure Network Infrastructure Engineering Support.

  • CISA Professional Expertise
    The Certified Information Systems Auditor accreditation is a globally recognized achievement that indicates expertise in IS security auditing. Certified by the American National Standards Institute (ANSI), the CISA accreditation requires that consultants pass a comprehensive examination administered by the ISACA international professional association. Progent offers the expertise of a CISA-qualified security audit professional able to assist companies in the areas of IS audit services, IT enforcement, network assets and infrastructure lifecycle, IT service delivery, safeguarding data resources, and business continuity preparedness. Learn additional details about Progent's CISA Professional Assistance.

  • Global Information Assurance Certification Support Expertise
    GIAC was established in 1999 to validate the skill of computer security experts. GIAC's goal is to assure that a certified security consultant has the knowledge necessary to provide support in critical categories of system, data, and software security. GIAC accreditations are recognized by companies and government organizations throughout the world including and the U.S. NSA. Progent offers the assistance of certified consultants for any of the security services covered within GIAC certification programs including assessing perimeters, security incident handling, traffic analysis, and web application security. Find out more information concerning Progent's GIAC (Global Information Assurance Certification) Professional Assistance.
Contact Progent for Network Security Support
If you're looking for security support services, phone Progent at 800-993-9400 or refer to Contact Progent.

© 2002- 2017 Progent Corporation. All rights reserved.