Overview of Progent's Security Support Services
Progent's certified computer security experts can provide a broad selection of services designed to help businesses of all sizes to detect and correct security weaknesses, block assaults, remediate the problems caused by a breach of protection, and comply with regulatory mandates for guarding data and reporting incidents. Progent can provide a selection of service delivery models:

  • On-demand remote and on-site assistance invoiced by the minute
  • Continual managed services billed at an affordable flat monthly rate
  • Set-price service packages for a single security and compliance assessment
As-needed Security Consulting Services
After you register for Progent's services (signing up is free), you can get as-needed remote or onsite assistance from one of Progent security and compliance expert. This classic service model is primarily reactive and geared toward rapidly resolving IT issues that are affecting your productivity or that have stumped your in-house support personnel. Common scenarios include configuring a firewall or VPN connection, implementing a vital security update for a Cisco switch, designing compliant access to a public cloud, or restoring data after a ransomware attack. These security services are billed by the minute, which avoids the frustrating case of receiving large invoices for quick repairs.

Delivery options for Progent's on-demand support services include:

  • Remote Security Support Services
    Most security-related problems can be handled remotely via a mix of phone support and a remote Internet connection between Progent's Technical Response Center (TRC) and a client's computer. Progent's Technical Response Center can deliver online security support by offering easy access to consultants with the experience and resources to resolve many of the most difficult issues quickly, keeping your service costs affordable and reducing lost productivity.
  • On-premises Security Support Services
    For instances where onsite assistance is necessary, Progent can send a technical professional to major cities throughout the U.S. Progent can also send a security consultant with high-level certifications and world-class skills to any location in the U.S.
Progent's accredited security engineers are certified to support environments powered by Windows, Linux, Apple Mac, Solaris, and popular derivatives of UNIX. Progent's broad array of consulting services encompasses firewall expertise, email security, secure system architecture, and data restoration. Progent's support staff has been awarded the industry's top security credentials including CISA and Information System Security Architecture Professional. Progent also offers immediate access to online Cisco-certified CCIE network consultants who can deliver advanced assistance with complex network technology issues.

ProSight Fixed-price Managed Services for Information Assurance
Progent's low-cost ProSight family of network monitoring and management services is designed to provide small and mid-size businesses with enterprise-class support and state-of-the-art technology for all facets of information assurance. ProSight managed services offered by Progent include:

  • ProSight Active Security Monitoring: Endpoint Protection and Ransomware Defense
    Progent's ProSight Active Security Monitoring is an endpoint protection service that incorporates cutting edge behavior-based machine learning technology to defend endpoints and servers and VMs against new malware assaults such as ransomware and file-less exploits, which easily evade legacy signature-based AV tools. ProSight Active Security Monitoring protects local and cloud-based resources and offers a unified platform to automate the complete threat lifecycle including protection, identification, containment, cleanup, and forensics. Top capabilities include single-click rollback using Windows Volume Shadow Copy Service and automatic system-wide immunization against new threats. Learn more about Progent's ProSight Active Security Monitoring next-generation endpoint protection and ransomware recovery.

  • ProSight Enhanced Security Protection: Unified Physical and Virtual Endpoint Security
    ProSight Enhanced Security Protection services deliver affordable in-depth security for physical servers and virtual machines, desktops, mobile devices, and Exchange Server. ProSight ESP utilizes contextual security and modern behavior analysis for round-the-clock monitoring and reacting to cyber assaults from all attack vectors. ProSight ESP offers firewall protection, penetration alerts, endpoint management, and web filtering through cutting-edge technologies incorporated within a single agent accessible from a unified console. Progent's data protection and virtualization consultants can assist you to plan and configure a ProSight ESP environment that meets your company's specific requirements and that allows you prove compliance with government and industry data protection standards. Progent will assist you define and implement policies that ProSight ESP will manage, and Progent will monitor your network and respond to alerts that call for urgent attention. Progent's consultants can also help your company to install and test a backup and restore system like ProSight Data Protection Services (DPS) so you can get back in business quickly from a potentially disastrous cyber attack like ransomware. Read more about Progent's ProSight Enhanced Security Protection unified endpoint security and Microsoft Exchange filtering.

  • ProSight Data Protection Services: Managed Cloud Backup
    ProSight Data Protection Services offer small and medium-sized organizations an affordable and fully managed solution for secure backup/disaster recovery. For a low monthly rate, ProSight Data Protection Services automates and monitors your backup activities and allows rapid restoration of vital files, apps and virtual machines that have become lost or corrupted due to component failures, software glitches, natural disasters, human error, or malicious attacks such as ransomware. ProSight Data Protection Services can help you protect, retrieve and restore files, folders, apps, system images, plus Hyper-V and VMware virtual machine images. Important data can be protected on the cloud, to a local device, or to both. Progent's backup and recovery consultants can provide advanced expertise to configure ProSight Data Protection Services to be compliant with regulatory requirements such as HIPPA, FIRPA, and PCI and, whenever necessary, can help you to restore your critical data. Learn more about ProSight DPS Managed Cloud Backup and Recovery.

  • ProSight Email Guard: Inbound and Outbound Spam Filtering, Data Leakage Protection and Content Filtering
    ProSight Email Guard is Progent's email filtering and encryption solution that uses the services and infrastructure of top information security vendors to deliver centralized control and comprehensive security for all your email traffic. The powerful architecture of Progent's Email Guard combines a Cloud Protection Layer with a local gateway appliance to offer advanced defense against spam, viruses, Dos Attacks, Directory Harvest Attacks, and other email-based threats. The Cloud Protection Layer acts as a preliminary barricade and keeps most threats from making it to your security perimeter. This decreases your vulnerability to inbound attacks and saves network bandwidth and storage. Email Guard's onsite gateway appliance provides a deeper level of inspection for incoming email. For outbound email, the local security gateway offers anti-virus and anti-spam protection, DLP, and encryption. The onsite gateway can also assist Exchange Server to track and safeguard internal email traffic that stays inside your security perimeter. Learn more about Progent's ProSight Email Guard spam filtering, virus blocking, content filtering and data loss prevention.

  • ProSight WAN Watch: Network Infrastructure Remote Monitoring and Management
    Progentís ProSight WAN Watch is an infrastructure management service that makes it easy and affordable for small and mid-sized organizations to diagram, monitor, enhance and troubleshoot their connectivity appliances such as switches, firewalls, and access points as well as servers, printers, endpoints and other networked devices. Incorporating state-of-the-art Remote Monitoring and Management technology, WAN Watch ensures that infrastructure topology diagrams are kept updated, copies and displays the configuration of virtually all devices on your network, tracks performance, and generates notices when problems are discovered. By automating time-consuming management activities, WAN Watch can cut hours off ordinary chores such as making network diagrams, expanding your network, finding devices that require critical software patches, or identifying the cause of performance issues. Find out more details about ProSight WAN Watch infrastructure management services.

  • ProSight LAN Watch: Server and Desktop Monitoring and Management
    ProSight LAN Watch is Progentís server and desktop monitoring managed service that incorporates state-of-the-art remote monitoring and management techniques to keep your network operating at peak levels by checking the health of vital computers that power your information system. When ProSight LAN Watch detects an issue, an alarm is sent immediately to your designated IT personnel and your Progent consultant so all looming problems can be resolved before they have a chance to impact your network Learn more about ProSight LAN Watch server and desktop monitoring consulting.

  • ProSight Virtual Hosting: Hosted VMs at Progent's World-class Data Center
    With Progent's ProSight Virtual Hosting service, a small or mid-size organization can have its key servers and apps hosted in a protected Tier III data center on a high-performance virtual host set up and maintained by Progent's network support professionals. With the ProSight Virtual Hosting model, the customer owns the data, the operating system platforms, and the applications. Since the environment is virtualized, it can be ported easily to a different hardware solution without a lengthy and technically risky reinstallation procedure. With ProSight Virtual Hosting, you are not locked into one hosting service. Learn more details about ProSight Virtual Hosting services.

  • ProSight IT Asset Management: Network Documentation Management
    ProSight IT Asset Management service is an IT infrastructure documentation management service that allows you to capture, update, retrieve and safeguard data about your network infrastructure, procedures, applications, and services. You can quickly locate passwords or serial numbers and be warned about upcoming expirations of SSL certificates or warranties. By updating and managing your IT documentation, you can eliminate up to half of time spent looking for vital information about your IT network. ProSight IT Asset Management features a common location for storing and sharing all documents related to managing your network infrastructure such as standard operating procedures (SOPs) and self-service instructions. ProSight IT Asset Management also supports a high level of automation for collecting and associating IT information. Whether youíre making enhancements, performing maintenance, or reacting to a crisis, ProSight IT Asset Management delivers the data you need the instant you need it. Find out more about Progent's ProSight IT Asset Management service.
ProSight Network Audits
Progent's ProSight Network Audits offer a fast and low-cost alternative for small and mid-size businesses to get an unbiased evaluation of the overall health of their information system. Based on a selection of the leading remote monitoring and management platforms in the industry, and overseen by Progent's certified group of IT professionals, ProSight Network Audits show you how well the deployment of your essential infrastructure assets adhere to best practices. Both the Basic and Advanced options for ProSight Network Audit services are available at a low, one-time cost and deliver immediate ROI such as a cleaner Active Directory system. Both also include a year of state-of-the-art remote network monitoring and management. Benefits can include lower-cost network management, improved compliance with information security requirements, higher utilization of network assets, quicker troubleshooting, more dependable backup and restore, and less downtime. See more information about ProSight Network Audits IT infrastructure review.

The ProSight Ransomware Preparedness Report Service
Progent's ProSight Ransomware Preparedness Report is a low-cost service based on a brief discussion with a Progent backup/recovery expert. The fact-finding interview is designed to assess your company's ability to block or recover quickly after a ransomware attack. Progent will work with you personally to collect information about your current antivirus tools and backup system, and Progent will then produce a written Basic Security and Best Practices Report document describing how you can apply industry best practices to deploy a cost-effective security and backup/recovery system that aligns with your company's needs. For details, refer to Progent's ProSight Ransomware Preparedness Report.

Fixed-price Security Assessment and Verification Packages
Progent offers a portfolio of set-price security and compliance assessment bundles that provide high value by utilizing Progent's enterprise-class network monitoring software plus Progent's consulting experience to create an objective and thorough evaluation of your IT environment security posture.

  • Security Assessment Service Packages for Small Organizations
    Progent offers two value-priced security inventory scanning packages designed to enable small organizations to get an objective security evaluation from a certified security engineer. With Progent's External Security Inventory Scan, a consultant administers a comprehensive assessment of your IT system from outside your corporate firewall to determine potential gaps in the security profile you expose to the outside. With Progent's Internal Security Inventory Scan, a certified security consultant executes a system scan from an authorized machine inside your company firewall to assess your vulnerability to inside attacks. The two security inventory scans are set up and executed from a secured external site. The scan is administered by a consultant who has been awarded high-level security certifications and who produces a report that describes and interprets the information captured by the scan and recommend various improvements where appropriate.
  • Security Vulnerability Evaluation Bundles for Large Organizations
    Progent offers three levels of fixed-price security assessment service bundles designed for large organizations who want to meet compliance standards required by government or industry agencies. Progent's security evaluation service bundles offer enterprises an opportunity to get an objective assessment at the strength of their security posture. For every security assessment package, Progent consultants with advanced security credentials study and report on collected data and offer recommendations for efficient improvements. Each of the network security assessment bundles include an added-cost option for onsite engineers anywhere in the United States.
  • Stealth Penetration Testing
    Stealth penetration testing, commonly referred to as PEN testing, is an accepted technique for allowing businesses to determine how vulnerable their IT environments are to current-generation threats. Progent's stealth penetration testing test how well your existing security policies and platforms stand up to authorized but unannounced penetration attempts launched by Progent's veteran security specialists utilizing advanced hacking techniques. Read about Progent's stealth penetration testing services.
We've Been Hacked: What Can We Do?
Network Security ConsultantsIf you are currently fighting a network security crisis and you have no formal recovery plan, refer to Progent's Remote Technical Support to find out how to receive fast assistance. Progent provides remote assistance from skilled network technicians and can escalate trouble tickets to certified security specialists if required. Your company does not have to be a current Progent customer to receive urgent support for a security breakdown, but you can sign up as a Progent customer ahead of time for free and your standing as a current client can save valuable time in case of a crisis.

Usually, smaller companies have not documented a response procedure in the event of a damaging attack. This is not good, since the cost of a successful security attack can be even more devastating for a small business than for a large enterprise. Progent's security engineers can help your company to create an efficient recovery and incident reporting plan that minimizes the network downtime resulting from an attack. The formal incident handling procedure promoted by Global Information Assurance Certification is Progent's recommended procedure for responding to a major security attack.

High-value Security Services Available from Progent
Progent's security engineers offer specialized help in key facets of network security such as:

  • Information Risk Audits and Compliance Assessment
    Progent offers expertise with security evaluation tools like MS Baseline Security Analyzer and LANguard for conducting a variety of comprehensive system scans to reveal potential security gaps. Progent has extensive skills with these and similar utilities and can assist you to understand audit reports and react appropriately. Progent's security engineers also can perform web software validation and can conduct thorough evaluation of enterprise-wide security to validate your organization's compliance with important global security standards such as HIPAA, NIST, and ISO 17799. Also, Progent can evaluate the strength of your wireless security including stationary wireless appliances as well as portable devices. Learn more details concerning Progent's Vulnerability Evaluation and Compliance Assessment.
  • Designing, Building, and Validating Secure Environments
    Every business ought to have a thoroughly thought out security plan that includes both proactive and responsive steps. The pre-attack strategy is a set of steps that helps to minimize security holes. The post-attack strategy defines procedures to help IT staff to assess the losses caused by an attack, repair the damage, document the experience, and revive business functions as soon as possible. Progent can show you how to incorporate protection into your company processes, configure auditing utilities, define and build a secure IT infrastructure, and propose procedures and policies to maximize the protection of your information system. Progent's security experts are available to help you to configure a firewall, design protected offsite access to email and data, and install an efficient virtual private network. If your company is interested in an economical way for outsourcing your security management, Progent's 24x7 Monitoring Services include automated remote server tracking and quick response to emergencies.
  • System Restoration and Failure Analysis
    Progent has skill in restoring systems and servers that have been hacked, are in question, or have ceased to function following a security breach. Progent can help assess the losses resulting from the assault, return your company to normal business operations, and recover information compromised as a result of the breach. Progent's certified engineers can also perform a comprehensive forensic evaluation by examining event logs and using a variety of proven forensics tools. Progent's experience with security consulting reduces your downtime and permits Progent to suggest efficient strategies to avoid or contain new assaults.
  • Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Series Firewalls, and PIX 500 Firewalls Integration and Debugging
    Cisco CCIE Security SpecialistsThe latest generation of Cisco ASA 5500-X Family Next-Generation Firewalls with Firepower Services offer substantially more bang for the buck than Cisco's earlier PIX and ASA 5500 firewalls and have superseded the ASA 5500 and PIX 500 security appliances for all new installations. Following Cisco's acquisition of Sourcefire, the entire family of ASA 5500-X devices can be provisioned to enable Firepower Services, built on Sourcefire's Snort technology, which is the world's most deployed network intrusion protection system. Firepower services provide powerful new features such as advanced malware protection (AMP), URL filtering, dynamic threat analytics, and automation. Progent's Cisco-certified CCIE network experts can assist you to maintain your legacy PIX or Cisco ASA 5500 security appliances and upgrade efficiently to ASA 5500-X firewalls with Firepower Services. Progent's consultants offer online and on-premises help with ASA 5500-X firewalls with Firepower Services and can assist your business to plan, configure, tune, administer and troubleshoot firewall environments based around Cisco ASA 5500-X firewalls with Firepower Services. Read additional information about ASA 5500-X Firewalls with Firepower Services integration and troubleshooting support.
  • Additional Firewall and VPN Solutions
    As well as being expert in a wide array of network security solutions from Microsoft and Cisco, Progent offers small and mid-size organizations top-level consulting for solutions from other important firewall and Virtual Private Network vendors such as:
  • SIEM Solutions
    Security information and event management (SIEM) applications and services are designed to make sense the enormous amounts of data represented by security incident records generated by a wide range of sources such as network appliances, servers, and applications and tools. SIEM software analyzes the security logs from these diverse sources and creates consolidated reports of security events as mandated by government regulations and business compliance standards. Progent's GIAC-certified computer security consultants and Cisco-certified network infrastructure consultants can assist businesses to plan, install and manage a SIEM solution that helps them to see the behavior of security incidents and comply with event reporting requirements. (Visit Progent's Security information and Event Management solutions.)
Progent's Security Credentials
Progent's security professionals have been awarded some of the most respected certifications available in the security industry. These accreditations require extensive testing and proven work experience to ensure that recipients have mastered a significant body of security knowledge and methodologies and can provide high-level solutions to computer networks of any complexity.
  • Certified Information Security Manager Security Consulting Expertise
    CISM defines the basic competencies and worldwide benchmarks of service that information technology security managers are expected to achieve. CISM offers executive management the assurance that consultants who have been awarded their accreditation possess the background and skill to offer efficient security administration and consulting services. Progent can offer a CISM-certified consultant to assist your enterprise in vital security areas such as data protection governance, vulnerability management, data security program management, and incident response support. Find out additional information concerning Progent's Certified Information Security Manager Security Support Assistance.

  • CISSP Security Support Services
    Progent's CISSP consultants are security specialists who have been awarded CISSP status as a result of demonstrated professional work, rigorous study, and formal examination. CISSP qualification recognizes expertise in a worldwide standard for information security. ANSI has given the CISSP credential accreditation in the field of IT security under ISO/IEC 17024. Fields of knowledge included under CISSP include security management procedures, security design and test systems, connection permission systems, applications development security, operations security, hardware security, cryptography, communications, Internet security, and disaster recovery planning. Find out additional information about Progent's Certified Information Systems Security Professionals (CISSP) Consulting Assistance.

  • ISSAP Engineering Support
    Progent's ISSAP qualified security experts are consultants who have been awarded ISSAP certification as a result of thorough testing and substantial hands-on work with information security design. ISSAP security experts possess comprehensive understanding of access control systems and methodologies, telecommunications and network infrastructure security, cryptography, needs evaluation, business continuity planning (BCP) and disaster recovery planning (DRP), and physical security. Progent's ISSAP-qualified security specialists can assist your company with all aspects of architecture security. Read additional information about Progent's ISSAP Accredited Secure System Architecture Consulting Services.

  • Certified Information Systems Auditor (CISA) Support Services
    The CISA accreditation is a recognized qualification that represents expertise in network security audit and control. Certified by the American National Standards Institute (ANSI), the CISA accreditation requires that candidates undergo a comprehensive examination administered by the ISACA professional association. Progent can provide the expertise of a CISA-certified security audit consultant able to assist businesses in the areas of information systems audit services, IT administration, systems and architecture lifecycle, information technology service delivery, protecting information resources, and business continuity preparedness. Learn additional information about Progent's Certified Information Systems Auditor Support Assistance.

  • GIAC Professional Expertise
    Global Information Assurance Certification was established in 1999 to certify the knowledge of IT security engineers. GIAC's goal is to verify that a certified security consultant has the knowledge necessary to deliver services in critical categories of network, data, and application software security. GIAC certifications are recognized by businesses and government organizations around the world including and the United States National Security Agency. Progent offers the support of certified professionals for any of the network security disciplines addressed within GIAC certification programs such as auditing security systems, security incident handling, intrusion detection, and web-based services security. Get additional information concerning Progent's GIAC (Global Information Assurance Certification) Professional Assistance.
Depend on Progent for Computer Security Expertise
If you're looking for computer security consulting expertise, telephone Progent at 800-993-9400 or go to Contact Progent.
















© 2002- 2018 Progent Corporation. All rights reserved.