Introduction to Progent's Security and Compliance Support Services
Progent's industry certified computer security professionals offer a wide range of support services designed to help businesses of all sizes to identify and eliminate security vulnerabilities, block malicious attacks, remediate the damage caused by a breakdown of protection, and meet regulatory mandates for protecting data and reporting incidents. Progent can provide a choice of service delivery models:

  • On-demand remote and on-premises assistance invoiced by the minute
  • On-going fully managed services billed at an affordable fixed monthly rate
  • Set-price service packages for a single security evaluation
As-needed Security Consulting Services
After you register for Progent's services (signing up is free), you can receive as-needed remote or on-premises support from one of Progent security consultant. This classic service model is essentially reactive and optimized for quickly resolving IT issues that are disrupting your network or that are beyond the scope of your in-house support staff. Common scenarios are configuring a firewall or VPN tunnel, implementing a vital security update for a Cisco switch, designing secure access to a public cloud, or restoring data after a ransomware attack. These services are billed to the nearest minute, which avoids the annoying situation of receiving big invoices for quick repairs.

Delivery options for Progent's as-needed support include:

  • Remote Security Support Services
    Most security issues can be handled remotely via a combination of phone-based help and an connection between Progent's Technical Response Center (TRC) and a customer's computer. Progent's Technical Response Center can provide remote security support by offering easy access to consultants who have the experience and resources to resolve many of the most difficult problems quickly, keeping your service expenses low and reducing lost productivity.
  • Onsite Security Support Services
    For cases where on-premises support is required, Progent can send a technical professional to major metropolitan areas throughout the U.S. Progent can also send a security specialist with high-level certifications and world-class skills to any location in the U.S.
Progent's security engineers are certified to provide help for environments based on Microsoft Windows, Linux, Apple Mac, Sun Solaris, and popular versions of UNIX. Progent's wide selection of consulting services addresses firewall configuration, e-mail security, protected system design, and data recovery. Progent's support staff has been awarded the world's top security accreditations including Global Information Assurance Certification and Certified Information Systems Security Professional. Progent also can provide fast access to remote Cisco CCIE network infrastructure consultants who can provide advanced assistance with tough network integration issues.

Progent's Fixed-price Managed Services for Information Assurance
Progent's value-priced ProSight line of managed services is designed to provide small and mid-size businesses with enterprise-class support and state-of-the-art technology for all facets of information assurance and compliance. Managed services available from Progent include:

  • ProSight Email Guard: Inbound and Outbound Spam Filtering, Data Leakage Protection and Email Encryption
    ProSight Email Guard is Progent's email filtering and encryption solution that uses the services and infrastructure of top information security companies to provide web-based management and world-class protection for your email traffic. The powerful structure of Email Guard managed service combines cloud-based filtering with a local gateway appliance to provide advanced protection against spam, viruses, Denial of Service Attacks, DHAs, and other email-borne malware. Email Guard's Cloud Protection Layer acts as a preliminary barricade and keeps most unwanted email from reaching your security perimeter. This reduces your vulnerability to external attacks and saves network bandwidth and storage space. Email Guard's onsite security gateway appliance provides a further level of analysis for incoming email. For outgoing email, the local gateway offers AV and anti-spam protection, protection against data leaks, and email encryption. The on-premises gateway can also assist Exchange Server to monitor and safeguard internal email that stays within your security perimeter. Learn more about Progent's ProSight Email Guard spam filtering, virus defense, content filtering and data leakage prevention.

  • ProSight Active Security Monitoring: Endpoint Protection and Ransomware Recovery
    ProSight Active Security Monitoring (ASM) is an endpoint protection service that utilizes next generation behavior analysis technology to guard endpoint devices as well as physical and virtual servers against modern malware assaults such as ransomware and email phishing, which easily get by legacy signature-based anti-virus products. ProSight Active Security Monitoring protects on-premises and cloud resources and offers a unified platform to automate the entire malware attack progression including filtering, identification, mitigation, cleanup, and post-attack forensics. Key capabilities include single-click rollback with Windows Volume Shadow Copy Service (VSS) and real-time network-wide immunization against new attacks. Learn more about Progent's ProSight Active Security Monitoring (ASM) endpoint protection and ransomware defense.

  • ProSight DPS: Managed Backup
    ProSight Data Protection Services provide small and medium-sized businesses an affordable and fully managed solution for secure backup/disaster recovery (BDR). For a fixed monthly rate, ProSight DPS automates and monitors your backup processes and enables rapid recovery of critical data, applications and VMs that have become unavailable or damaged as a result of component breakdowns, software bugs, disasters, human error, or malware attacks like ransomware. ProSight DPS can help you back up, recover and restore files, folders, apps, system images, plus Microsoft Hyper-V and VMware images. Critical data can be backed up on the cloud, to an on-promises storage device, or mirrored to both. Progent's backup and recovery specialists can provide world-class support to set up ProSight Data Protection Services to be compliant with government and industry regulatory requirements like HIPPA, FINRA, and PCI and, whenever needed, can assist you to recover your critical data. Find out more about ProSight Data Protection Services managed backup and recovery.

  • ProSight WAN Watch: Infrastructure Management
    Progentís ProSight WAN Watch is a network infrastructure management service that makes it easy and inexpensive for small and mid-sized businesses to diagram, track, optimize and troubleshoot their connectivity appliances like routers, firewalls, and load balancers plus servers, endpoints and other networked devices. Incorporating state-of-the-art RMM technology, WAN Watch makes sure that network maps are always current, copies and manages the configuration of virtually all devices connected to your network, monitors performance, and generates alerts when issues are discovered. By automating tedious network management activities, WAN Watch can knock hours off common tasks such as network mapping, expanding your network, finding devices that need important software patches, or resolving performance problems. Learn more details about ProSight WAN Watch infrastructure monitoring and management services.

  • ProSight LAN Watch: Server and Desktop Monitoring and Management
    ProSight LAN Watch is Progentís server and desktop remote monitoring managed service that uses advanced remote monitoring and management (RMM) techniques to keep your network operating at peak levels by tracking the health of vital assets that drive your business network. When ProSight LAN Watch uncovers a problem, an alert is sent automatically to your designated IT management personnel and your assigned Progent engineering consultant so that all potential problems can be resolved before they have a chance to disrupt your network Find out more about ProSight LAN Watch server and desktop monitoring services.

  • ProSight Virtual Hosting: Hosted Virtual Machines at Progent's Tier III Data Center
    With ProSight Virtual Hosting service, a small or mid-size business can have its critical servers and apps hosted in a secure Tier III data center on a fast virtual machine host set up and maintained by Progent's IT support experts. Under Progent's ProSight Virtual Hosting service model, the client retains ownership of the data, the operating system software, and the apps. Because the system is virtualized, it can be moved immediately to a different hardware solution without requiring a time-consuming and technically risky reinstallation procedure. With ProSight Virtual Hosting, your business is not locked into a single hosting service. Find out more details about ProSight Virtual Hosting services.
Set-price Security Evaluation and Validation Packages
Progent offers a portfolio of set-price security and compliance evaluation packages that provide high value by utilizing Progent's advanced network monitoring and analysis software plus Progent's consulting skills to create an objective and thorough assessment of your IT environment security posture.
  • Security Inventory Service Bundles for Small Organizations
    Progent offers two value-priced security inventory packages designed to enable small organizations to get an objective security assessment from an accredited security engineer. With Progent's External Security Inventory Scan, a consultant administers an extensive examination of your network from beyond your corporate firewall to identify potential risks in the security posture you present to the public. With Progent's Internal Security Inventory Scan, a certified security consultant runs a system scan from an authorized machine within your company firewall to assess your exposure to internal attacks. These two security inventory scans are set up and executed from a secured external site. The scan is administered by a consultant who has earned advanced security certifications and who produces a report that describes and interprets the information collected by the scan and recommend practical improvements where appropriate.
  • Security Vulnerability Evaluation Packages for Large Businesses
    Progent has developed three levels of fixed-price security assessment service bundles intended for large organizations who want to meet security standards required by state or industry regulators. Progent's security evaluation service packages offer enterprises an opportunity to get an objective look at the strength of their security posture. For each security evaluation bundle, Progent engineers with advanced security credentials analyze and report on captured data and offer recommendations for cost-effective remediation. All the network security audit packages include an extra-cost option for on-premises engineers at any location in the United States.
  • Stealth Penetration Testing
    Stealth penetration testing, commonly known as PEN testing, is a critical technique for helping organizations to determine how open their IT systems are to current-generation attacks. Progent's stealth penetration testing test how effectively your existing security policies and platforms stand up to authorized but unannounced penetration attempts launched by Progent's certified security specialists using cutting-edge hacking techniques. Find out about Progent's stealth penetration testing services.
Our System Has Been Hacked: What Should We Do?
Network Security ConsultantsIf your company is currently faced with a network security emergency and you do not have a formal recovery plan, visit Progent's Online Technical Support to learn how to receive immediate help. Progent provides remote assistance from skilled network technicians and can refer problems to certified security experts if required. Your company does not have to be a registered Progent client to get urgent help for a security breakdown, but you can register as a Progent client ahead of time at no cost and your status as a registered client can save precious time in an emergency.

Usually, smaller companies have no recovery procedure in case of a damaging attack. This is not good, since the cost of a serious security assault can be even more devastating for a small company than for a big enterprise. Progent's security consultants can help your company to design an effective recovery and event reporting plan that reduces the IT system downtime following a security breach. The step-by-step incident handling procedure promoted by GIAC is Progent's preferred method for reacting to a major security incident.

Advanced Security Services Available from Progent
Progent's certified security consultants offer specialized help in key areas of computer security including:

  • Security Vulnerability Evaluation and Compliance Testing
    Progent provides experience with security evaluation utilities such as Microsoft Baseline Security Analyzer and LANguard from GFI for performing a variety of automatic network tests to reveal potential security gaps. Progent has extensive experience with scanning tools and can assist you to understand audit reports and respond efficiently. Progent's certified security engineers also offer web software validation and can perform expert evaluation of corporate-wide security to confirm your company's compliance with major global security specifications such as HIPAA, PCI, and ISO 17799. In addition, Progent can assess the strength of your wireless security including fixed wireless appliances as well as mobile handsets. Get more information concerning Progent's Security Vulnerability Evaluation and Compliance Assessment.
  • Designing, Building, and Testing Secure Environments
    Any company ought to develop a thoroughly considered security strategy that incorporates both proactive and responsive steps. The proactive plan is a set of precautions that works to reduce vulnerabilities. The post-attack plan specifies procedures to assist IT staff to evaluate the damage resulting from a breach, remediate the damage, document the event, and revive business functions as soon as feasible. Progent can advise you how to build security into your company processes, configure scanning utilities, define and execute a secure IT architecture, and recommend procedures and policies that will enhance the safety of your network. Progent's security experts are ready to help you to set up a firewall, design secure remote connectivity to e-mail and data, and install an efficient virtual private network. If you are looking for an economical option for jobbing out your network security administration, Progent's Round-the-clock Network Support Services include automated remote system tracking and fast resolution of problems.
  • System Restoration and Failure Analysis
    Progent has expertise in recovering systems and devices that have been compromised, are quarantined, or have stopped working as a result of a security penetration. Progent can help evaluate the damage caused by the breach, restore ordinary functions, and retrieve data lost owing to the breach. Progent's certified specialists can also perform a thorough forensic evaluation by examining activity logs and utilizing other proven forensics tools. Progent's experience with security problems reduces your business disruption and permits Progent to propose efficient strategies to prevent or contain future assaults.
  • Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Series Firewalls, and PIX 500 Security Appliances Configuration and Debugging
    Cisco Certified CCIE Security ExpertsThe latest generation of Cisco ASA 5500-X Series Next-Generation Firewalls with Firepower Services deliver significantly more bang for the buck than Cisco's previous PIX and ASA 5500 firewalls and have superseded the ASA 5500 and PIX 500 firewalls for new deployments. Since Cisco's acquisition of Sourcefire, the entire line of ASA 5500-X devices can be provisioned to enable Firepower Services, based on Sourcefire's Snort technology, which is the world's most popular network intrusion protection system. Firepower services provide enhanced capabilities including advanced malware protection (AMP), URL filtering, real-time threat analytics, and automation. Progent's Cisco-certified CCIE network experts can help you to maintain your current PIX or Cisco ASA 5500 security appliances or migrate to ASA 5500-X firewalls with Firepower Services. Progent's consultants offer online and onsite support for ASA 5500-X firewalls with Firepower Services and can assist your company to design, integrate, tune, administer and troubleshoot firewall solutions based on Cisco ASA 5500-X firewalls with Firepower Services. Find out additional details about ASA 5500-X Firewalls with Firepower configuration and debugging services.
  • Other Firewall and Virtual Private Network Consulting Services
    As well as supporting a wide range of security solutions from Microsoft and Cisco, Progent can provide small organizations expert engineering services for solutions from other major firewall and Virtual Private Network vendors including:
  • SIEM Solutions
    Security information and event management (SIEM) applications and services are designed to interpret the enormous quantity of information collected in security incident records created by multiple sources such as network infrastructure appliances, servers, and applications and monitoring tools. SIEM software analyzes the security event records from these diverse sources and produces consolidated reports of security events as required by government regulations and business compliance guidelines. Progent's GIAC-certified network security consultants and Cisco-certified network consultants can assist businesses to plan, deploy and operate a SIEM solution that helps them to understand the progress of security incidents and comply with event reporting regulations. (See Progent's SIEM solutions.)
Progent's Security Certifications
Progent's security professionals have earned the most prestigious certifications offered in the industry. These accreditations require exhaustive testing and demonstrated work background to ensure that candidates have mastered a significant amount of security knowledge and methodologies and can provide advanced consulting to computer networks of any size.
  • CISM Security Consulting Expertise
    Certified Information Security Manager (CISM) defines the core competencies and worldwide benchmarks of performance that IT security managers are required to achieve. CISM provides executive management the confidence that those who have been awarded their CISM possess the background and knowledge to provide effective security management and consulting support. Progent can offer a CISM-certified consultant to help your enterprise in key security areas such as information protection governance, risk assessment, information security process control, and incident response support. Find out more information concerning Progent's Certified Information Security Manager Security Consulting Expertise.

  • CISSP Security Consulting Services
    Progent's Certified Information Systems Security Professionals (CISSPs) are security engineers who have been awarded CISSP accreditation through demonstrated professional work, rigorous study, and exhaustive testing. CISSP Certification indicates mastery of an international standard for information security. American National Standards Institute has granted the CISSP credential accreditation in the area of information security under ISO/IEC 17024. Areas of knowledge covered under CISSP include security administration practices, security architecture and test systems, connection control systems, software development security, operations security, hardware security, cryptography, telecommunications, network security, and disaster recovery planning. Find out additional details about Progent's Certified Information Systems Security Professionals (CISSP) Consulting Assistance.

  • Information Systems Security Architecture Professionals (ISSAP) Engineering Support
    Progent's ISSAP certified security consultants are consultants who have been awarded ISSAP accreditation after thorough examination and substantial hands-on work with network security design. ISSAP security experts possess comprehensive knowledge of access control mechanisms and methodologies, telecommunications and network infrastructure security, cryptography, requirements analysis, business continuity planning (BCP) and DRP, and physical security integration. Progent's ISSAP-qualified security specialists can help your company with all phases of secure network architecture. Find out more details concerning Progent's ISSAP Accredited Secure Network Architecture Engineering Assistance.

  • Certified Information Systems Auditor (CISA) Professional Expertise
    The Certified Information Systems Auditor credential is a globally recognized achievement that indicates expertise in IS security auditing. Certified by the American National Standards Institute, the CISA credential requires that candidates undergo an exhaustive examination administered by the ISACA international professional group. Progent offers the services of a CISA-qualified security audit engineer trained to help businesses in the fields of information systems audit services, information technology governance, systems and infrastructure lifecycle, IT support, protecting data assets, and disaster recovery preparedness. Read more information concerning Progent's Certified Information Systems Auditor (CISA) Professional Expertise.

  • Global Information Assurance Certification Consulting Services
    GIAC was established in 1999 to validate the skill of computer security experts. GIAC's mission is to verify that a certified professional possesses the knowledge necessary to provide services in important areas of system, data, and application software security. GIAC certifications are acknowledged by businesses and institutions throughout the world including and the United States National Security Agency (NSA). Progent can provide the expertise of GIAC certified consultants for any of the security disciplines covered within GIAC certification topics including assessing security systems, incident response, intrusion detection, and web-based services security. Read the details concerning Progent's Global Information Assurance Certification Support Assistance.
Contact Progent for Computer Security Help
If you want network security help, call Progent at 800-993-9400 or refer to Contact Progent.

© 2002- 2018 Progent Corporation. All rights reserved.