Overview of Progent's Security Support Services
Progent's industry certified network security consultants offer a wide range of professional services intended to help businesses of all sizes to identify and correct security weaknesses, defend against attacks, remediate the damage caused by a breach of security, and meet regulatory requirements for reporting incidents. Progent delivers online and on-site service and offers economical fixed-cost security assessment packages to complement Progent's standard by-the-minute pricing.

Service delivery alternatives available from Progent include:

  • Remote Security Support Services
    Most security issues can be resolved remotely by a combination of phone-based assistance and secure data access between Progent's Technical Response Center (TRC) and a customer's computer system. Progent's Technical Response service group includes security professionals with the background and the technical resources to solve even the most intractable issues promptly, making your service costs reasonable and minimizing downtime. Progent provides security assistance on a by-the-minute model without minimum charges for remote support. Progent's billing policy eliminates scenarios where simple solutions turn into major expenses. Progent also has available a variety of set-price online security evaluation bundles that represent exceptional value by utilizing Progent's advanced system monitoring software plus Progent's consulting experience to deliver a professional and actionable analysis of your network vulnerability.

  • On-premises Security Support Services
    In circumstances where on-premises support is needed, Progent can send a field service technician to larger metropolitan areas throughout the U.S. Progent's certified security consultants are also available for jobs that call for world-class security specialists to be on site anywhere in the U.S., and Progent's most advanced security evaluation bundles for large businesses feature the services of several qualified security experts at your location.

  • Time-critical Security Services
    For immediate assistance with critical network security issues, your company can get in touch with a seasoned online troubleshooting specialist from Progent's roster of certified security professionals available at Progent's Technical Response Center. Progent's emergency online security support staff is available to provide efficient and economical assistance with security emergencies that are impacting the productivity of your IT network. Progent's security engineers are qualified to provide help for environments powered by Microsoft, Linux, Apple Mac, Sun Solaris, and popular versions of UNIX. Progent's broad range of services encompasses firewall technology, email security, protected network architecture, and information recovery. Progent's technical support team has earned the world's top security credentials including GIAC and CISSP. Progent also can provide immediate access to remote Cisco-certified CCIE network infrastructure consultants who can provide advanced support with tough network technology issues.

We've Been Hacked: What Can We Do Now?
Network Security ConsultantsIf you are currently faced with a security emergency and you have no detailed response procedure, refer to Progent's Online Technical Support to find out how to get fast help. Progent provides remote help from skilled engineers and can escalate problems to high-level security specialists if required. Your business does not have to be a current Progent customer to get emergency help for a security breach, but you can sign up as a Progent customer in advance at no cost and your standing as a current customer could save precious time in an emergency.

Usually, smaller organizations have no recovery procedure in the event of a successful security breach. This is risky, because the cost of a serious security attack can be even more devastating for a small company than for a large enterprise. Progent's security engineers can help your company to design a practical recovery and incident reporting procedure that reduces the network downtime resulting from a security breach. The step-by-step incident response procedure promoted by GIAC is Progent's recommended procedure for reacting to a serious security penetration.

Areas of Progent's Security Support Services
Coordinating data security plus planning for restoring critical data and functions following an attack demands an on-going effort involving a variety of tools and procedures. Progent's certified experts can support your business at all levels in your efforts to protect your IT system and stay in compliance, Services range from security audits to designing a complete security strategy. Important areas supported by Progent's experts include Security Planning and Implementation, Data Restoration and Security Forensics, plus Outsourced Filtering of Email-Borne Threats.

  • Designing, Implementing, and Testing Secure Environments
    Any company ought to have a thoroughly considered security plan that incorporates both preventive and reactive steps. The proactive strategy is a set of steps that works to reduce vulnerabilities. The reactive plan specifies procedures to help IT personnel to inventory the damage resulting from an attack, repair the damage, record the experience, and restore business activity as quickly as feasible. Progent can advise you how to design security into your business operations, install auditing software, create and execute a secure IT architecture, and propose processes and policies that will maximize the protection of your computing environment. Progent's security professionals are ready to help you to configure a firewall, deploy safe remote connectivity to e-mail and files, and install an efficient virtual private network. If your company is looking for an economical option for outsourcing your network security administration, Progent's Round-the-clock Network Support Services feature continual remote network tracking and fast response to problems.
  • Data Restoration and Security Forensics
    Progent has expertise in recovering systems and servers that have been hacked, are suspect, or have failed as a result of a security attack. Progent can help assess the damage caused by the attack, return your company to ordinary business operations, and recover data lost owing to the attack. Progent's security engineers can also perform a thorough failure analysis by examining activity logs and utilizing other proven assessment tools. Progent's background with security issues reduces your off-air time and allows Progent to propose effective strategies to prevent or mitigate new attacks.
  • Email Security with Spam Filtering, Virus Defense, Content Filtering, and Data Leakage Protection
    Email Guard is Progent's email security platform that incorporates the technology of top information security companies to provide web-based control and world-class protection for all your inbound and outbound email. The powerful architecture of Progent's Email Guard managed service combines a Cloud Protection Layer with a local gateway appliance to provide advanced defense against spam, viruses, Denial of Service Attacks, Directory Harvest Attacks (DHAs), and other email-based threats. Email Guard's Cloud Protection Layer acts as a first line of defense and keeps most unwanted email from reaching your security perimeter. This decreases your exposure to inbound threats and conserves network bandwidth and storage. Email Guard's onsite gateway appliance provides a deeper layer of analysis for incoming email. For outbound email, the local security gateway offers AV and anti-spam protection, DLP, and email encryption. The local gateway can also help Microsoft Exchange Server to monitor and protect internal email traffic that originates and ends within your security perimeter. Learn more about Progent's Email Guard Spam Filtering, Virus Blocking, Email Content Filtering and Data Loss Prevention.
Advanced Security Services Offered by Progent
Progent's certified consultants can provide advanced support in key areas of computer protection such as:
  • Vulnerability Evaluation and Security Compliance Testing
    Progent offers expertise with security evaluation utilities like MS Baseline Security Analyzer or LANguard for performing a variety of comprehensive system tests to identify possible security holes. Progent has broad experience with monitoring utilities and can assist you to understand assessment reports and react efficiently. Progent's security consultants also provide web software validation and can conduct expert evaluation of corporate-wide security to determine your organization's compliance with major worldwide security standards such as FISMA, NIST, and ISO 17799. Also, Progent can evaluate the effectiveness of your wireless protection covering fixed wireless appliances plus mobile handsets. Read more details about Progent's Security Vulnerability Audits and Security Compliance Assessment.
  • Security Inventory and Evaluation Packages for Small Businesses
    Progent has put together two low-cost security inventory service bundles intended to enable small businesses to receive an objective security assessment from a certified security expert. With Progent's External Network Security Inventory Checkup, an engineer administers a comprehensive examination of your network from outside your company firewall to uncover possible risks in the security posture you expose to the outside world. With Progent's Internal Security Inventory Checkup, an engineer runs a system scan from an authorized computer inside your company firewall to determine vulnerabilities to inside assaults. Both security inventory services are configured and executed from a secured remote site. The process is managed by an engineer who has earned high-level security accreditations who produces a report that summarizes and interprets the information captured by the scan and proposes cost-effective remediation if appropriate.
  • Security Vulnerability Evaluation Packages for Large Businesses
    Progent's qualified security consultants can deliver a selection of set-price network security audit service packages created for institutions who have to meet security standards demanded by state agencies or by customers. Progent's security audit packages offer larger organizations a chance to get an independent look at the strength of their security environment. For every security evaluation package, Progent engineers with high-level security credentials evaluate and report on collected data and make recommendations for efficient improvements. The different security evaluation packages include an extra-cost option for on-premises security engineers anywhere in the U.S.
  • Migrating from Microsoft ISA Server and Forefront TMG
    ISA Server 2006 and the newer Microsoft Forefront Threat Management Gateway are software solutions that include an application-layer firewall that can defend networks from external and inside threats. Both of these platforms perform in-depth inspection of network protocols to detect threats that can elude traditional firewalls. Microsoft Internet Security and Acceleration Server was superseded by Forefront TMG, which is built on ISA Server's technology while providing a number of enhanced capabilities. Forefront TMG has been discontinued by Microsoft, and the security functions provided by the product are now usually taken over by dedicated hardware appliances from vendors such as Cisco, Check Point, Juniper and WatchGuard. (See Cisco ASA 5500-X Firewall with Firepower Services configuration and management.) Progent offers online Microsoft Forefront TMG 2010 support services and ISA Server 2006 expertise to help you manage and troubleshoot your legacy firewall environment, and Progent can help your organization to upgrade efficiently to a more current firewall platform by providing planning, integration, optimization, IT staff training and troubleshooting.
  • Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Firewalls, and PIX Security Appliances Configuration and Debugging
    Cisco Certified CCIE Network Security ExpertsThe current Cisco ASA 5500-X Family of firewalls with Firepower Services offer significantly more performance than Cisco's earlier firewalls and have superseded the ASA 5500 and PIX 500 security appliances for all new installations. After Cisco's acquisition of Sourcefire, the entire line of ASA 5500-X devices can be provisioned to enable Firepower Services, based on Sourcefire's Snort technology, which is the world's most deployed intrusion protection system (IPS). Firepower services bring enhanced capabilities such as advanced malware protection (AMP), URL filtering, real-time threat analytics, and automation. Progent's Cisco-certified CCIE network consultants can assist your company to manage your existing PIX or ASA 5500 security appliances or migrate to Cisco ASA 5500-X firewalls with Firepower Services. Progent's consultants can provide online and onsite help with ASA 5500-X firewalls with Firepower Services and can assist you to design, integrate, optimize, administer and troubleshoot firewall environments built around Cisco ASA 5500-X firewalls with Firepower Services. Find out more details about Cisco ASA Firewalls with Firepower Services configuration and debugging support.
  • Additional Firewall and Virtual Private Network (VPN) Consulting Services
    As well as being expert in a wide range of security technologies available from Microsoft and Cisco, Progent offers small and mid-size organizations top-level consulting for products from other popular firewall and Virtual Private Network suppliers including:
  • SIEM Integration and Support
    Security information and event management (SIEM) software and services are intended to make sense the massive quantity of information collected in security event logs created by a wide range of sources including network appliances, servers, and application software and monitoring tools. SIEM software analyzes the security event records from these various sources and produces consolidated reports of security events as required by government regulations and industry compliance standards. Progent's GIAC-certified computer security experts and Cisco CCIE certified network experts can assist businesses to design, install and operate a SIEM solution that enables them to understand the behavior of security incidents and comply with security incident reporting requirements. (Visit Progent's Security information and Event Management (SIEM) solutions.)
Progent's Security Certifications
Progent's security engineers have earned some of the most respected accreditations available in the security industry. All of these certifications require extensive testing and demonstrated work background to ensure that recipients have acquired expertise with a substantial body of security knowledge and methodologies and can offer advanced consulting to computer networks of any complexity.
  • Certified Information Security Manager Security Consulting Expertise
    Certified Information Security Manager (CISM) identifies the basic competencies and worldwide standards of service that information security managers are expected to achieve. CISM provides executive management the confidence that consultants who have been awarded their certification possess the background and skill to offer effective security management and consulting services. Progent can offer a CISM-certified consultant to help your organization in vital security areas including information security governance, vulnerability management, information protection program control, and incident response management. Learn more information concerning Progent's CISM Security Support Services.
  • CISSP Security Support Services
    Progent's CISSP experts are security engineers who have earned CISSP certification through verified professional work, rigorous study, and formal testing. CISSP Certification recognizes mastery of a worldwide standard for information security. American National Standards Institute has given the CISSP status accreditation in the field of information security under ISO/IEC 17024. Areas of knowledge covered under CISSP include security management procedures, security design and test systems, access permission systems, applications development security, operations security, hardware security, encryption, communications, Internet security, and business continuity planning. Find out additional information about Progent's CISSP Consulting Assistance.
  • ISSAP Consulting Services
    Progent's ISSAP qualified security consultants are consultants who have earned ISSAP accreditation after rigorous examination and significant hands-on work with information security design. ISSAP security experts have acquired in-depth understanding of access control systems and techniques, telecommunications and network security, cryptography, requirements analysis, business continuity planning (BCP) and disaster recovery planning (DRP), and physical security. Progent's ISSAP-qualified security experts can assist your company with all phases of secure network architecture. Read the details concerning Progent's ISSAP Certified Secure Network Architecture Engineering Support.
  • Certified Information Systems Auditor Support Expertise
    The Certified Information Systems Auditor credential is a prestigious qualification that represents mastery in network security audit and control. Accredited by the American National Standards Institute (ANSI), the CISA credential requires that candidates undergo a comprehensive examination administered by the ISACA international professional association. Progent can provide the services of a CISA-certified security engineer trained to assist companies in the areas of IS audit process, information technology governance, network assets and infrastructure planned useful life, IT service delivery, protecting data assets, and business continuity planning. Learn more information concerning Progent's CISA Consulting Services.
  • GIAC Consulting Expertise
    GIAC was established in 1999 to validate the knowledge of information technology security experts. GIAC's mission is to assure that an accredited professional possesses the skills needed to deliver services in vital categories of system, data, and application program security. GIAC certifications are acknowledged by companies and institutions all over the world including and the U.S. National Security Agency. Progent offers the support of certified consultants for all of the security services addressed within GIAC accreditation programs including assessing security systems, incident handling, intrusion detection, and web services security. Get more details concerning Progent's GIAC (Global Information Assurance Certification) Professional Assistance.
Contact Progent for Network Security Expertise
If you're trying to find network security engineering help, phone Progent at 800-993-9400 or visit Contact Progent.

© 2002- 2017 Progent Corporation. All rights reserved.