Introduction to Progent's Security Support Services
Progent's certified network security and compliance professionals can provide a wide selection of support services intended to assist organizations of any size to detect and correct security vulnerabilities, block malicious attacks, remediate the issues caused by a breakdown of protection, and meet regulatory mandates for guarding information and reporting incidents. Progent offers a choice of service modes:

  • On-demand remote and on-site support invoiced by the minute
  • Continual managed services billed at an affordable fixed monthly fee
  • Set-price service bundles for a single security evaluation
As-needed Security Consulting Services
Once you register for Progent's services (signing up is free), you can get as-needed online or onsite support from one of Progent security consultant. This classic support model is essentially reactive and optimized for quickly resolving IT issues that are affecting your network or that have stymied your own support staff. Common scenarios are replacing a firewall or VPN tunnel, implementing a vital security patch for a Cisco switch or router, setting up compliant access to a public cloud, or restoring data after a ransomware assault. These services are invoiced by the minute, which eliminates the frustrating case of receiving large bills for fast repairs.

Delivery options for Progent's as-needed support include:

  • Remote Security Support Services
    The majority security-related problems can be resolved remotely through a mix of phone support and a remote connection between Progent's Technical Response Center (TRC) and a client's computer. Progent's TRC group can provide online security support by offering efficient access to consultants with the background and technical resources to fix some of the most difficult problems quickly, keeping your service costs affordable and reducing lost productivity.
  • On-premises Security Support
    For cases where onsite assistance is required, Progent can send a technical professional to major metropolitan areas across the U.S. Progent can also dispatch a security consultant with high-level certifications and advanced skills to any location in the country.
Progent's security engineers are certified to support environments powered by Microsoft Windows, Linux, macOS and OS X, Solaris, and popular derivatives of UNIX. Progent's wide range of services addresses firewall technology, email and messaging security, secure system design, and information restoration. Progent's support team has been awarded the industry's most advanced security certifications including GIAC (Global Information Assurance Certification) and Certified Information Systems Security Professional (CISSP). Progent also can provide fast access to remote Cisco CCIE network infrastructure consultants who can deliver advanced assistance with tough network integration issues.

ProSight Fixed-price Managed Services for Information Assurance
Progent's value-priced ProSight line of outsourced network management services is intended to provide small and mid-size organizations with enterprise-class support and state-of-the-art technology for all aspects of information assurance. ProSight managed services offered by Progent include:

  • ProSight Active Security Monitoring (ASM): Endpoint Protection and Ransomware Defense
    ProSight Active Security Monitoring (ASM) is an endpoint protection service that utilizes cutting edge behavior-based analysis technology to defend endpoint devices and servers and VMs against modern malware attacks such as ransomware and file-less exploits, which easily evade legacy signature-matching anti-virus products. ProSight ASM safeguards on-premises and cloud resources and provides a single platform to manage the complete threat progression including filtering, identification, mitigation, remediation, and forensics. Key capabilities include single-click rollback with Windows Volume Shadow Copy Service and real-time system-wide immunization against newly discovered attacks. Learn more about Progent's ProSight Active Security Monitoring (ASM) next-generation endpoint protection and ransomware recovery.

  • ProSight Enhanced Security Protection (ESP): Unified Physical and Virtual Endpoint Protection
    ProSight Enhanced Security Protection services offer affordable multi-layer security for physical servers and VMs, desktops, smartphones, and Microsoft Exchange. ProSight ESP uses contextual security and advanced heuristics for round-the-clock monitoring and responding to security threats from all vectors. ProSight ESP provides two-way firewall protection, penetration alarms, device control, and web filtering through cutting-edge tools packaged within a single agent managed from a single console. Progent's data protection and virtualization experts can assist you to design and implement a ProSight ESP deployment that meets your company's unique needs and that helps you prove compliance with legal and industry data protection standards. Progent will assist you specify and implement policies that ProSight ESP will enforce, and Progent will monitor your network and react to alarms that require urgent attention. Progent's consultants can also help you to set up and verify a backup and restore solution like ProSight Data Protection Services (DPS) so you can get back in business rapidly from a destructive cyber attack such as ransomware. Learn more about Progent's ProSight Enhanced Security Protection (ESP) unified physical and virtual endpoint protection and Exchange email filtering.

  • ProSight DPS: Managed Cloud Backup and Recovery
    ProSight Data Protection Services provide small and medium-sized businesses a low cost end-to-end solution for secure backup/disaster recovery (BDR). Available at a fixed monthly cost, ProSight DPS automates your backup activities and enables fast recovery of critical data, applications and virtual machines that have become lost or corrupted due to hardware breakdowns, software bugs, disasters, human error, or malware attacks such as ransomware. ProSight Data Protection Services can help you protect, retrieve and restore files, folders, apps, system images, plus Hyper-V and VMware virtual machine images. Critical data can be backed up on the cloud, to a local device, or to both. Progent's BDR specialists can deliver world-class support to set up ProSight DPS to be compliant with regulatory standards such as HIPPA, FIRPA, PCI and Safe Harbor and, when necessary, can help you to recover your business-critical data. Find out more about ProSight DPS Managed Cloud Backup.

  • ProSight Email Guard: Inbound and Outbound Spam Filtering, Data Leakage Protection and Email Encryption
    ProSight Email Guard is Progent's email filtering and encryption solution that uses the technology of top data security companies to provide centralized control and comprehensive protection for all your inbound and outbound email. The hybrid architecture of Email Guard managed service combines a Cloud Protection Layer with an on-premises gateway device to provide complete protection against spam, viruses, Dos Attacks, Directory Harvest Attacks (DHAs), and other email-borne malware. Email Guard's cloud filter acts as a first line of defense and keeps most threats from reaching your security perimeter. This reduces your exposure to external threats and conserves system bandwidth and storage space. Email Guard's on-premises gateway device adds a deeper level of inspection for inbound email. For outgoing email, the onsite security gateway provides AV and anti-spam filtering, DLP, and email encryption. The onsite gateway can also help Exchange Server to monitor and protect internal email traffic that stays within your corporate firewall. Learn more about Progent's ProSight Email Guard spam filtering, virus blocking, content filtering and data leakage protection.

  • ProSight WAN Watch: Network Infrastructure Management
    ProSight WAN Watch is an infrastructure management service that makes it easy and inexpensive for small and mid-sized organizations to map, monitor, enhance and troubleshoot their connectivity hardware such as routers, firewalls, and wireless controllers as well as servers, endpoints and other networked devices. Using state-of-the-art RMM technology, ProSight WAN Watch makes sure that network diagrams are kept current, captures and manages the configuration information of almost all devices on your network, tracks performance, and sends alerts when problems are detected. By automating complex management and troubleshooting processes, WAN Watch can knock hours off common tasks such as making network diagrams, reconfiguring your network, locating appliances that require important software patches, or identifying the cause of performance issues. Find out more details about ProSight WAN Watch network infrastructure management services.

  • ProSight LAN Watch: Server and Desktop Monitoring
    ProSight LAN Watch is Progentís server and desktop remote monitoring managed service that uses state-of-the-art remote monitoring and management techniques to keep your IT system operating efficiently by checking the state of vital assets that power your information system. When ProSight LAN Watch uncovers a problem, an alert is sent immediately to your designated IT staff and your assigned Progent engineering consultant so that all looming issues can be addressed before they have a chance to impact productivity Learn more details about ProSight LAN Watch server and desktop monitoring services.

  • ProSight Virtual Hosting: Hosted VMs at Progent's Tier III Data Center
    With ProSight Virtual Hosting service, a small or mid-size business can have its critical servers and apps hosted in a secure Tier III data center on a high-performance virtual host set up and maintained by Progent's IT support experts. Under the ProSight Virtual Hosting service model, the customer owns the data, the operating system software, and the applications. Because the environment is virtualized, it can be ported easily to a different hosting solution without a lengthy and difficult reinstallation procedure. With ProSight Virtual Hosting, you are not locked into one hosting provider. Find out more details about ProSight Virtual Hosting services.

  • ProSight IT Asset Management: Network Documentation Management
    ProSight IT Asset Management service is an IT infrastructure documentation management service that allows you to create, update, find and protect data related to your network infrastructure, procedures, business apps, and services. You can instantly find passwords or serial numbers and be alerted about impending expirations of SSL certificates or domains. By updating and managing your IT infrastructure documentation, you can save up to half of time wasted searching for vital information about your IT network. ProSight IT Asset Management includes a common repository for storing and sharing all documents related to managing your business network like standard operating procedures (SOPs) and How-To's. ProSight IT Asset Management also offers a high level of automation for collecting and associating IT information. Whether youíre planning enhancements, doing regular maintenance, or responding to a crisis, ProSight IT Asset Management gets you the data you require when you need it. Learn more about ProSight IT Asset Management service.
ProSight Network Audits
Progent's ProSight Network Audits are a quick and affordable alternative for small and medium-size organizations to get an unbiased assessment of the health of their information system. Powered by a selection of the top remote monitoring and management platforms in the industry, and overseen by Progent's world-class group of IT experts, ProSight Network Audits show you how closely the deployment of your core infrastructure devices conform to industry leading practices. The Basic and Advanced versions of ProSight Network Audit services are available at a low, one-time cost and deliver instant benefits like a cleaner Active Directory (AD) environment. Both versions also include a year of advanced remote network monitoring and management (RMM). Benefits can include simpler network management, improved compliance with information security regulations, more efficient utilization of network assets, faster problem resolution, more dependable backup and restore, and increased uptime. See more information about ProSight Network Audits IT infrastructure review.

Progent's ProSight Ransomware Preparedness Report
The ProSight Ransomware Preparedness Report service is an affordable service centered on a phone interview with a Progent information assurance consultant. The fact-finding interview is designed to assess your company's ability either to block or recover quickly after a ransomware attack. Progent will consult with you directly to collect information about your current security profile and backup/recovery system, and Progent will then produce a custom Basic Security and Best Practices Report describing how you can apply industry best practices to create an efficient AV and backup/recovery environment that aligns with your company's needs. For details, refer to Progent's ProSight Ransomware Preparedness Report.

Set-price Security Assessment and Verification Bundles
Progent offers a variety of set-price security and compliance assessment bundles that provide high value by utilizing Progent's enterprise-class network monitoring and analysis software as well as Progent's technical skills to produce an unbiased and comprehensive assessment of your IT environment security posture.

  • Security Inventory Service Packages for Small Businesses
    Progent offers two value-priced security inventory service packages intended to allow small organizations to obtain a professional security evaluation from a certified security consultant. With Progent's External Security Inventory Scan, an engineer administers a comprehensive assessment of your IT system from outside your corporate firewall to determine potential gaps in the security profile you expose to the outside world. With Progent's Internal Security Inventory Scan, a certified security expert executes a network scan using an authorized machine within your corporate firewall to assess your exposure to inside threats. These two security inventory scanning services are configured and run from a secured external site. The project is managed by an engineer who has been awarded high-level security certifications and who creates a document that describes and evaluates the data captured by the scan and suggests various improvements where required.
  • Security Vulnerability Assessment Bundles for Enterprises
    Progent has developed three levels of flat-rate security assessment service packages intended for enterprises who want to meet security standards required by government or industry agencies. Progent's security evaluation service bundles offer larger businesses a chance to obtain an objective look at the strength of their security profile. For every security evaluation package, Progent engineers with top security credentials analyze and report on captured data and offer recommendations for cost-effective improvements. Each of the network security audit bundles include an extra-cost option for on-premises engineers anywhere in the United States.
  • Stealth Penetration Testing Services
    Stealth penetration testing, commonly known as PEN testing, is an accepted tool for helping organizations to determine how open their IT environments are to modern threats. Progent's stealth penetration testing check how effectively your existing security procedures and technologies resist authorized but unannounced intrusion attempts managed by Progent's certified security specialists utilizing cutting-edge hacking techniques. Read about Progent's stealth penetration testing (PEN Test) services.
We've Been Hacked: What Are We Supposed to Do Now?
Network Security ConsultantsIf your business is now experiencing a security crisis and you do not have a detailed recovery procedure, visit Progent's Online Network Support to find out how to receive fast help. Progent provides remote technical support from experienced engineers and can escalate problems to certified security experts if necessary. Your business does not need to be a current Progent customer to get urgent support for a security problem, but you can register as a Progent customer in advance at no cost and your standing as a current client can save valuable time during a crisis.

Usually, smaller organizations have not documented a response plan in the event of a successful attack. This is not good, because the cost of a serious security attack can be more devastating for a small business than for a large enterprise. Progent's security specialists can assist your company to create a practical response and incident reporting procedure that minimizes the IT system disruption resulting from a security breach. The formal incident response model promoted by Global Information Assurance Certification is Progent's preferred method for reacting to a major security penetration.

High-value Security Services Offered by Progent
Progent's security engineers can provide world-class consulting in vital areas of IT protection including:

  • Vulnerability Audits and Compliance Testing
    Progent offers experience with security auditing utilities such as Microsoft Baseline Security Analyzer or LANguard from GFI for conducting a set of comprehensive network scans to identify potential security holes. Progent has broad skills with these and similar utilities and can help your company to understand assessment results and react efficiently. Progent's certified security engineers also offer web software testing and can conduct thorough evaluation of corporate-wide security to validate your organization's compliance with key worldwide security standards including FISMA, PCI, and ISO. In addition, Progent can evaluate the effectiveness of your wireless security covering fixed wireless appliances plus mobile devices. Read more information about Progent's Information Risk Audits and Security Compliance Assessment.
  • Designing, Building, and Testing Protected Networks
    Every business ought to develop a carefully thought out security strategy that includes both proactive and responsive steps. The pre-attack strategy is a set of precautions that helps to reduce security holes. The reactive strategy specifies activities to assist security staff to assess the damage caused by an attack, repair the damage, document the experience, and revive network functions as quickly as possible. Progent can show you how to design protection into your business operations, configure auditing utilities, define and execute a secure network infrastructure, and propose procedures and policies to optimize the protection of your network. Progent's security experts are ready to assist you to configure a firewall, deploy protected remote connectivity to e-mail and files, and configure an effective VPN. If you are interested in an economical way for outsourcing your security management, Progent's Round-the-clock Network Support Services include continual remote network monitoring and fast response to emergencies.
  • System Recovery and Security Forensics
    Progent has skill in restoring networks and servers that have been hacked, are suspect, or have failed as a result of a security penetration. Progent can show you how to evaluate the losses resulting from the attack, restore normal business operations, and recover data compromised owing to the event. Progent's security specialists can also perform a thorough forensic evaluation by examining activity logs and using a variety of advanced forensics tools. Progent's background with security consulting reduces your off-air time and permits Progent to suggest effective strategies to avoid or mitigate new assaults.
  • Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Series Firewalls, and PIX 500 Security Appliances Integration and Debugging
    Cisco Certified CCIE Security ConsultantsThe current Cisco ASA 5500-X Family of firewalls with Firepower Services provide substantially more performance than Cisco's previous firewalls and have replaced the ASA 5500 and PIX security appliances for all new deployments. Following Cisco's acquisition of Sourcefire, the entire family of Cisco ASA 5500-X firewalls can be provisioned to support Firepower Services, based on Sourcefire's Snort product, which is the market's most popular network intrusion protection system. Firepower services bring powerful new capabilities such as advanced malware protection (AMP), URL filtering, dynamic threat analytics, and automation. Progent's Cisco-qualified CCIE network experts can assist your company to manage your existing PIX or ASA 5500 firewalls and migrate efficiently to Cisco ASA 5500-X firewalls with Firepower Services. Progent's consultants can provide online and on-premises support for ASA 5500-X firewalls with Firepower Services and can help you to design, configure, optimize, administer and debug firewall environments built on Cisco ASA 5500-X firewalls with Firepower Services. Read additional information about Cisco ASA 5500-X Firewalls with Firepower Services integration and debugging services.
  • Additional Firewall and VPN Solutions
    In addition to supporting a wide array of security solutions available from Microsoft and Cisco, Progent offers small companies top-level engineering services for solutions from other popular firewall and VPN suppliers such as:
  • SIEM Security Information and Event Management Solutions
    Security information and event management (SIEM) applications and services are designed to interpret the enormous amounts of information collected in security event logs generated by multiple sources including network infrastructure appliances, servers, and applications and tools. SIEM software analyzes the security logs from these various sources and produces consolidated reports of security events as mandated by government regulations and business compliance standards. Progent's GIAC-certified computer security experts and Cisco CCIE certified network consultants can help businesses to design, install and manage a SIEM solution that helps them to understand the progress of attacks and comply with event reporting regulations. (Visit Progent's Security information and Event Management (SIEM) solutions.)
Progent's Security Credentials
Progent's security consultants have been awarded some of the most prestigious certifications available in the security industry. All of these accreditations require extensive testing and proven work experience to ensure that recipients have acquired expertise with a significant body of security information and techniques and can provide high-level solutions to computer networks of any complexity.
  • Certified Information Security Manager Security Consulting Services
    Certified Information Security Manager defines the basic competencies and international benchmarks of service that IT security managers are required to achieve. CISM provides executive management the confidence that consultants who have earned their certification have the background and knowledge to offer efficient security management and engineering support. Progent can provide a CISM support professional to assist your organization in key security disciplines such as data protection governance, vulnerability management, data security program management, and incident handling management. Read more information about Progent's Certified Information Security Manager (CISM) Security Support Expertise.

  • CISSP Security Consulting Expertise
    Progent's Certified Information Systems Security Professionals (CISSPs) are security engineers who have earned CISSP certification as a result of demonstrated experience, rigorous study, and formal testing. CISSP Certification indicates mastery of an international standard for IT security. ANSI has given the CISSP status official recognition in the field of IT security under ISO/IEC 17024. Fields of expertise included under CISSP include security administration practices, security architecture and test systems, access control methodology, applications development security, operations security, hardware security, cryptography, telecommunications, Internet security, and disaster recovery planning. Get more details concerning Progent's Certified Information Systems Security Professionals (CISSP) Support Services.

  • CISSP-ISSAP Security Architecture Consulting Expertise
    Progent's CISSP-ISSAP qualified security architecture consultants have earned ISSAP certification following thorough testing and significant experience. field experience with network security design. ISSAP consultants have acquired comprehensive understanding of access management systems and techniques, telecommunications and network security, cryptography, needs evaluation, business continuity and disaster recovery, and physical security. Progent's CISSP-ISSAP-certified security experts can help your business with all aspects of secure network architecture. Get additional details concerning Progent's ISSAP Certified Protected Network Infrastructure Consulting Services.

  • CISA Support Expertise
    The CISA credential is an important achievement that represents expertise in information system security audit and control. Certified by the American National Standards Institute, the CISA accreditation has candidates pass a comprehensive examination given by the ISACA international professional association. Progent offers the services of a CISA-qualified security consultant trained to help businesses in the areas of information systems audit services, information technology administration, network assets and architecture planned useful life, information technology service delivery, safeguarding information resources, and business continuity planning. Learn more information about Progent's Certified Information Systems Auditor (CISA) Professional Services.

  • CRISC Network Risk Management Consultants
    The Certified in Risk and Information Systems Control (CRISC) program was initiated by ISACA to verify an IT professional's ability to plan, implement, and maintain information system control mechanisms to mitigate risk. Progent offers the services of a CRISC-certified engineer to help your company to develop and carry out a business continuity plan based on industry best practices identified by CRISC and crafted to align with your organization's risk tolerance, business objectives, and IT budget. Progent's risk mitigation expertise is complementary to the support provided by Progent's CISA-qualified security engineers for impartially assessing your IT control mechanisms and with the services of Progent's CISM experts for defining security policies and procedures. Find out additional details concerning Progent's CRISC-certified Risk Management Expertise.

  • GIAC (Global Information Assurance Certification) Consulting Services
    Global Information Assurance Certification was founded in 1999 to validate the skill of computer security engineers. GIAC's mission is to verify that an accredited professional has the knowledge necessary to provide support in important areas of network, information, and application software security. GIAC certifications are recognized by companies and government organizations around the world including and the United States National Security Agency. Progent offers the expertise of certified professionals for any of the security disciplines covered within GIAC certification programs such as assessing security systems, security incident handling, traffic analysis, and web application security. Get additional details concerning Progent's GIAC Consulting Expertise.
Get in Touch with Progent for Network Security Consulting Services
If you need security engineering help, telephone Progent at 800-993-9400 or refer to Contact Progent.
















© 2002- 2019 Progent Corporation. All rights reserved.