Introduction to Progent's Security and Compliance Consulting Services
Progent's certified computer security professionals can provide a broad selection of support services intended to assist businesses of all sizes to uncover and correct security weaknesses, block assaults, remediate the problems caused by a breakdown of security, and meet government mandates for guarding information and reporting incidents. Progent offers a choice of service delivery models:

  • As-needed online and on-site support invoiced by the minute
  • Continual fully managed services invoiced at a low fixed monthly fee
  • Set-price service bundles for a one-time security evaluation
As-needed Security and Compliance Support Services
After you sign up for Progent's services (registration is free), you can receive on-demand remote or onsite support from one of Progent security expert. This classic service model is primarily reactive and optimized for quickly taking care of IT problems that are impacting your productivity or that have stymied your own support personnel. Common scenarios are debugging a firewall appliance or VPN connection, implementing a vital security patch for a Cisco switch, setting up compliant access to cloud-based resources, or restoring data after a ransomware attack. These services are invoiced to the nearest minute, which avoids the annoying situation of getting large invoices for quick repairs.

Delivery options for Progent's as-needed support services include:

  • Remote Security Services
    The majority security-related issues can be resolved online through a mix of phone help and an connection between Progent's Technical Response Center (TRC) and a customer's computer. Progent's Technical Response Center can provide remote security help by offering efficient access to consultants with the background and technical resources to resolve many of the most challenging problems quickly, making your service expenses low and reducing downtime.
  • Onsite Security Services
    For cases where onsite assistance is required, Progent can send a technical professional to major metropolitan areas across the U.S. Progent can also send a security specialist with high-level certifications and world-class skills to any site in the U.S.
Progent's accredited engineers are certified to provide help for environments powered by Microsoft Windows, Linux, macOS and OS X, Sun Solaris, and major derivatives of UNIX. Progent's wide range of services covers firewall expertise, email and messaging security, protected system architecture, and information recovery. Progent's technical support team has earned the industry's most advanced security credentials including CISA and ISSAP. Progent also can provide immediate access to online Cisco CCIE network infrastructure consultants who can provide advanced support with complex network integration problems.

ProSight Low-Cost Managed Services for Information Assurance
Progent's value-priced ProSight portfolio of network monitoring and management services is designed to provide small and mid-size businesses with enterprise-class support and state-of-the-art technology for all facets of information assurance. ProSight managed services available from Progent include:

  • ProSight Active Security Monitoring: Endpoint Protection and Ransomware Defense
    Progent's ProSight Active Security Monitoring (ASM) is an endpoint protection (EPP) solution that utilizes cutting edge behavior-based analysis technology to guard endpoints and physical and virtual servers against modern malware assaults such as ransomware and file-less exploits, which easily escape legacy signature-based AV tools. ProSight Active Security Monitoring protects on-premises and cloud resources and offers a unified platform to address the entire threat progression including blocking, detection, mitigation, cleanup, and post-attack forensics. Top capabilities include single-click rollback using Windows VSS and automatic network-wide immunization against newly discovered attacks. Find out more about Progent's ProSight Active Security Monitoring (ASM) endpoint protection and ransomware defense.

  • ProSight Enhanced Security Protection (ESP): Unified Endpoint Protection
    ProSight Enhanced Security Protection managed services offer affordable multi-layer protection for physical servers and virtual machines, desktops, smartphones, and Microsoft Exchange. ProSight ESP uses contextual security and advanced heuristics for round-the-clock monitoring and reacting to cyber threats from all vectors. ProSight ESP provides two-way firewall protection, penetration alarms, device management, and web filtering via leading-edge tools packaged within one agent accessible from a unified control. Progent's data protection and virtualization experts can assist your business to plan and implement a ProSight ESP deployment that addresses your organization's unique needs and that allows you demonstrate compliance with legal and industry information protection standards. Progent will assist you specify and configure policies that ProSight ESP will enforce, and Progent will monitor your network and react to alarms that call for immediate action. Progent can also help your company to set up and verify a backup and disaster recovery solution such as ProSight Data Protection Services so you can get back in business quickly from a destructive cyber attack such as ransomware. Find out more about Progent's ProSight Enhanced Security Protection unified endpoint protection and Exchange email filtering.

  • ProSight Data Protection Services: Managed Backup
    ProSight Data Protection Services provide small and medium-sized organizations a low cost end-to-end solution for secure backup/disaster recovery. Available at a low monthly cost, ProSight Data Protection Services automates your backup activities and enables rapid restoration of critical files, apps and VMs that have become unavailable or corrupted as a result of hardware failures, software bugs, natural disasters, human mistakes, or malware attacks like ransomware. ProSight DPS can help you protect, retrieve and restore files, folders, apps, system images, plus Hyper-V and VMware images. Critical data can be protected on the cloud, to an on-promises device, or to both. Progent's backup and recovery consultants can provide advanced expertise to set up ProSight DPS to be compliant with regulatory standards such as HIPPA, FINRA, and PCI and, whenever needed, can help you to recover your critical information. Learn more about ProSight DPS Managed Cloud Backup.

  • ProSight Email Guard: Spam Filtering, Data Leakage Protection and Email Encryption
    ProSight Email Guard is Progent's email security solution that uses the technology of top data security vendors to provide centralized control and comprehensive protection for your email traffic. The powerful structure of Progent's Email Guard combines a Cloud Protection Layer with an on-premises gateway device to provide complete defense against spam, viruses, Denial of Service Attacks, Directory Harvest Attacks (DHAs), and other email-based threats. The Cloud Protection Layer acts as a first line of defense and blocks most unwanted email from making it to your security perimeter. This decreases your vulnerability to external attacks and saves network bandwidth and storage. Email Guard's onsite gateway device adds a further layer of analysis for inbound email. For outbound email, the local gateway offers AV and anti-spam protection, policy-based Data Loss Prevention, and email encryption. The local gateway can also help Microsoft Exchange Server to monitor and protect internal email traffic that stays within your corporate firewall. Learn more about Progent's ProSight Email Guard spam filtering, virus defense, email content filtering and data leakage prevention.

  • ProSight WAN Watch: Network Infrastructure Management
    Progentís ProSight WAN Watch is an infrastructure monitoring and management service that makes it simple and affordable for smaller organizations to diagram, monitor, enhance and debug their networking hardware such as routers, firewalls, and wireless controllers as well as servers, printers, endpoints and other devices. Incorporating cutting-edge Remote Monitoring and Management (RMM) technology, WAN Watch makes sure that infrastructure topology maps are kept current, captures and displays the configuration information of almost all devices on your network, tracks performance, and sends alerts when issues are detected. By automating time-consuming management and troubleshooting activities, ProSight WAN Watch can cut hours off ordinary tasks such as making network diagrams, reconfiguring your network, finding appliances that need critical updates, or isolating performance issues. Find out more about ProSight WAN Watch infrastructure monitoring and management consulting.

  • ProSight LAN Watch: Server and Desktop Remote Monitoring
    ProSight LAN Watch is Progentís server and desktop monitoring managed service that incorporates advanced remote monitoring and management techniques to help keep your network running efficiently by checking the health of critical computers that drive your business network. When ProSight LAN Watch uncovers a problem, an alert is transmitted immediately to your designated IT personnel and your Progent consultant so all looming issues can be resolved before they have a chance to impact productivity Find out more about ProSight LAN Watch server and desktop remote monitoring services.

  • ProSight Virtual Hosting: Hosted Virtual Machines at Progent's World-class Data Center
    With Progent's ProSight Virtual Hosting service, a small or mid-size organization can have its critical servers and apps hosted in a secure Tier III data center on a high-performance virtual host set up and maintained by Progent's network support professionals. With the ProSight Virtual Hosting service model, the client owns the data, the OS platforms, and the applications. Since the environment is virtualized, it can be ported immediately to a different hosting solution without requiring a lengthy and technically risky reinstallation process. With ProSight Virtual Hosting, you are not tied one hosting provider. Learn more details about ProSight Virtual Hosting services.

  • ProSight IT Asset Management: Network Infrastructure Documentation Management
    Progent's ProSight IT Asset Management service is a cloud-based IT documentation management service that makes it easy to create, maintain, retrieve and safeguard information related to your network infrastructure, processes, applications, and services. You can quickly find passwords or serial numbers and be warned automatically about upcoming expirations of SSLs ,domains or warranties. By cleaning up and managing your IT documentation, you can save up to 50% of time spent searching for critical information about your network. ProSight IT Asset Management features a common location for holding and sharing all documents required for managing your network infrastructure such as standard operating procedures and self-service instructions. ProSight IT Asset Management also offers a high level of automation for gathering and associating IT information. Whether youíre making enhancements, performing maintenance, or responding to a crisis, ProSight IT Asset Management gets you the information you need as soon as you need it. Learn more details about ProSight IT Asset Management service.
ProSight Network Audits
Progent's ProSight Network Audits offer a fast and low-cost way for small and medium-size businesses to obtain an unbiased assessment of the health of their network. Powered by some of the leading remote monitoring and management (RMM) platforms available, and supervised by Progent's world-class team of information technology professionals, ProSight Network Audits help you see how closely the deployment of your essential infrastructure devices conform to leading practices. The Basic and Advanced versions of ProSight Network Audit services are available at a budget-friendly, one-time cost and provide instant benefits like a more manageable Active Directory system. Both versions also include one year of state-of-the-art remote network monitoring and management (RMM). Advantages can include easier network management, improved compliance with data security regulations, more efficient utilization of network assets, faster troubleshooting, more dependable backup and restore, and higher availability. Learn more information about ProSight Network Audits IT infrastructure review.

Progent's ProSight Ransomware Preparedness Report
The ProSight Ransomware Preparedness Report is a low-cost service centered on a phone interview with a Progent backup/recovery consultant. The fact-finding interview is intended to assess your organization's preparedness either to block or recover quickly from a ransomware incident. Progent will work with you directly to gather information about your current security profile and backup system, and Progent will then produce a written Basic Security and Best Practices Report document describing how you can apply best practices to deploy an efficient AV and backup environment that aligns with your company's needs. For more information, visit Progent's ProSight Ransomware Preparedness Report Service.

Fixed-price Security Evaluation and Verification Bundles
Progent has put together a number of set-price security and compliance evaluation packages that provide exceptional value by deploying Progent's enterprise-class system monitoring tools as well as Progent's consulting skills to create an objective and thorough evaluation of your network security profile.

  • Security Inventory Service Packages for Small Organizations
    Progent offers two ultra-affordable security inventory packages intended to enable small businesses to get an objective security assessment from a certified security consultant. With Progent's External Security Inventory Scan, an engineer administers an extensive examination of your network from outside your corporate firewall to identify possible risks in the security profile you expose to the public. With Progent's Internal Security Inventory Scan, a security consultant executes a system scan using an authorized computer inside your company firewall to evaluate your exposure to inside assaults. These two security inventory services are set up and run from a secured offsite location. The project is managed by an engineer who has earned advanced security certifications and who produces a report that describes and evaluates the information collected by the security scan and recommend practical improvements where required.
  • Security Vulnerability Evaluation Packages for Large Businesses
    Progent has developed three levels of fixed-price security evaluation service packages intended for enterprises who need to meet security standards required by government or industry agencies. Progent's security assessment service packages offer enterprises an opportunity to get an objective look at the strength of their security posture. For each security evaluation bundle, Progent consultants with top security credentials analyze and report on collected data and offer recommendations for cost-effective improvements. Each of the network security audit bundles include an extra-cost option for onsite consultants anywhere in the United States.
  • Stealth Penetration Testing Services
    Stealth penetration testing, often known as PEN testing, is a vital tool for helping organizations to determine how vulnerable their IT environments are to current-generation threats. Progent's stealth penetration testing services test how effectively your existing security procedures and technologies stand up to authorized but unannounced intrusion attempts launched by Progent's experienced security experts using cutting-edge hacking techniques. Find out about Progent's stealth penetration testing services.
We've Been Hacked: What Should We Do?
Network Security ConsultantsIf your company is now faced with a security emergency and you have no formal recovery plan, visit Progent's Online Technical Support to learn how to get fast assistance. Progent offers online technical support from skilled engineers and can refer trouble tickets to high-level security experts if required. Your company does not have to be a current Progent customer to get urgent help for a security breakdown, but you can register as a Progent customer ahead of time at no cost and your standing as a registered client could save precious time in a crisis.

Typically, smaller organizations have not documented a response plan in case of a successful penetration. This is risky, because the cost of a serious security attack can be even more devastating for a small business than for a large corporation. Progent's security engineers can help your business to design an efficient response and incident reporting plan that reduces the IT system downtime following a security breach. The formal incident handling procedure outlined by Global Information Assurance Certification is Progent's suggested procedure for handling a serious security penetration.

High-value Security Expertise Available from Progent
Progent's certified engineers offer consulting support in key areas of network compliance such as:

  • Information Risk Audits and Compliance Testing
    Progent offers expertise with information risk auditing software like Microsoft Baseline Security Analyzer and LANguard for performing a variety of comprehensive network tests to identify possible security gaps. Progent has extensive skills with these utilities and can help you to analyze audit reports and react appropriately. Progent's security consultants also provide web software testing and can conduct thorough assessments of enterprise-wide security to determine your company's compliance with major industry security standards including FISMA, PCI, and ISO. Also, Progent can assess the strength of your wireless protection including fixed wireless equipment plus mobile devices. Get more information concerning Progent's Vulnerability Evaluation and Security Compliance Assessment.
  • Planning, Building, and Validating Secure Environments
    Any business ought to develop a carefully considered security plan that includes both preventive and responsive elements. The pre-attack strategy is a collection of precautions that works to reduce vulnerabilities. The post-attack plan specifies procedures to help security staff to evaluate the losses resulting from an attack, repair the damage, document the experience, and restore business functions as quickly as possible. Progent can advise you how to incorporate security into your company operations, install scanning software, create and implement a secure IT architecture, and propose processes and policies to maximize the safety of your computing environment. Progent's security experts are available to assist you to set up a firewall, design safe online and mobile connectivity to email and data, and install an effective VPN. If you are looking for an affordable way for outsourcing your security management, Progent's 24x7 Network Support Services feature continual online server tracking and immediate response to emergencies.
  • System Recovery and Security Forensics
    Progent has skill in recovering networks and servers that have been compromised, are suspect, or have ceased to function because of a security breach. Progent can help evaluate the damage caused by the attack, restore normal functions, and recover data lost owing to the attack. Progent's security specialists can also perform a comprehensive failure evaluation by examining event logs and using other proven assessment tools. Progent's background with security issues reduces your business disruption and permits Progent to propose effective ways to prevent or contain new assaults.
  • Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Series Firewalls, and PIX Security Appliances Configuration and Debugging
    Cisco Certified CCIE Network Security ExpertsThe new Cisco ASA 5500-X Series of firewalls with Firepower Services deliver significantly more bang for the buck than Cisco's earlier firewalls and have superseded the ASA 5500 and PIX firewalls for all new installations. After Cisco's purchase of Sourcefire, the whole family of Cisco ASA 5500-X firewalls can be provisioned to enable Firepower Services, based on Sourcefire's Snort product, which is the market's most deployed intrusion protection system. Firepower services bring enhanced features such as advanced malware protection (AMP), URL filtering, dynamic threat analytics, and automation. Progent's Cisco-qualified CCIE network consultants can assist you to maintain your current PIX or Cisco ASA 5500 firewalls and migrate efficiently to Cisco ASA 5500-X firewalls with Firepower Services. Progent's consultants offer remote and on-premises help with ASA 5500-X firewalls with Firepower Services and can help you to plan, configure, tune, administer and troubleshoot firewall environments based on Cisco ASA 5500-X firewalls with Firepower Services. Find out additional details about Cisco ASA Firewalls with Firepower Services integration and troubleshooting services.
  • Additional Firewall and VPN Solutions
    In addition to being expert in a wide array of network security solutions from Microsoft and Cisco, Progent can provide small and mid-size companies expert consulting for solutions from other popular firewall and Virtual Private Network suppliers including:
  • SIEM Integration and Support
    Security information and event management (SIEM) applications and services are intended to make sense the massive amounts of data represented by security incident records created by a wide range of sources such as network infrastructure appliances, operating systems, and application software and tools. SIEM software analyzes the security logs from these diverse sources and produces summary reports of security incidents as mandated by state regulations and industry compliance guidelines. Progent's GIAC-certified computer security experts and Cisco-certified network infrastructure consultants can assist businesses to design, deploy and manage a SIEM system that enables them to see the behavior of security incidents and comply with security incident reporting regulations. (Visit Progent's Security information and Event Management solutions.)
Progent's Security Accreditations
Progent's security consultants have earned some of the most respected accreditations offered in the security industry. These accreditations require extensive testing and demonstrated work background to guarantee that candidates have mastered a substantial body of security knowledge and methodologies and can provide advanced security solutions to information networks of any complexity.
  • CISM Security Support Services
    CISM identifies the core competencies and worldwide standards of service that information security managers are expected to master. CISM provides business management the confidence that those who have earned their CISM possess the experience and skill to provide efficient security management and consulting services. Progent can offer a CISM-certified consultant to help your enterprise in critical security disciplines including information protection governance, vulnerability management, information security process management, and crisis response management. Learn more details about Progent's Certified Information Security Manager Security Consulting Services.

  • Certified Information Systems Security Professionals (CISSP) Security Consulting Expertise
    Progent's Certified Information Systems Security Professionals (CISSPs) are security specialists who have been awarded CISSP certification as a result of verified experience, rigorous study, and exhaustive examination. CISSP Certification indicates mastery of an international standard for information security. ANSI has granted the CISSP status accreditation in the area of information security under ISO/IEC 17024. Fields of knowledge covered within CISSP include security management practices, security architecture and test systems, connection permission systems, applications development security, business processes security, hardware security, encryption, communications, network security, and disaster recovery planning. Get the details about Progent's CISSP Support Expertise.

  • ISSAP Engineering Services
    Progent's ISSAP qualified security experts are consultants who have earned ISSAP accreditation after rigorous testing and significant experience. field experience with information security architecture. ISSAP consultants have comprehensive knowledge of access management systems and methodologies, phone system and network infrastructure protection, cryptography, requirements analysis, BCP and disaster recovery planning (DRP), and physical security. Progent's ISSAP-certified security specialists can help your business with all phases of architecture security. Learn more information about Progent's ISSAP Accredited Protected IT Infrastructure Consulting Assistance.

  • Certified Information Systems Auditor Consulting Expertise
    The CISA credential is a recognized qualification that represents mastery in IS security audit and control. Accredited by the American National Standards Institute, the CISA credential has consultants pass an exhaustive test administered by the ISACA international professional group. Progent can provide the services of a CISA-qualified security audit consultant trained to help businesses in the fields of IS audit process, information technology enforcement, network assets and architecture planned useful life, information technology service delivery, safeguarding data resources, and disaster recovery preparedness. Read additional details about Progent's CISA Support Assistance.

  • Global Information Assurance Certification Consulting Expertise
    Global Information Assurance Certification was established in 1999 to certify the skill of computer security professionals. GIAC's goal is to make sure that an accredited security consultant possesses the skills appropriate to provide support in important categories of network, data, and software security. GIAC accreditations are acknowledged by businesses and institutions around the world including and the U.S. NSA. Progent can provide the assistance of GIAC certified professionals for any of the security disciplines addressed under GIAC certification topics including assessing IT infrastructure, incident response, traffic analysis, and web application security. Get more information about Progent's Global Information Assurance Certification Support Assistance.
Depend on Progent for Network Security Support
If you're trying to find security engineering help, call Progent at 800-993-9400 or visit Contact Progent.

© 2002- 2018 Progent Corporation. All rights reserved.