Overview of Progent's Security Consulting Services
Progent's certified network security professionals offer a wide range of professional services intended to assist businesses of all sizes to detect and correct security weaknesses, block attacks, remediate any damage resulting from a breakdown of security, and comply with regulatory mandates for reporting security incidents. Progent delivers online and in person support and also offers economical set-price security assessment packages to complement Progent's standard time-based pricing.

Support services delivery options available from Progent include:

  • On-line Security Services
    The majority of security problems can be addressed remotely via a mix of phone-based support and remote data connections between Progent's Technical Response Center (TRC) and the client's network. Progent's TRC support group includes security engineers who have the background and the technical resources to fix some of the most challenging issues promptly, keeping your service expenses affordable and reducing downtime. Progent provides security assistance on a per-minute model with no minimum charges for remote consulting support. Progent's billing model avoids situations where simple fixes result in big expenses. Progent also has available a variety of set-price remote security evaluation bundles that represent exceptional value by utilizing Progent's advanced security monitoring technology and Progent's engineering expertise to produce a professional and thorough picture of your network vulnerability.

  • On-premises Security Support Services
    In cases where on-site support is required, Progent can send a field professional to major metropolitan areas throughout the United States Progent's certified security consultants are also available to assist with jobs that call for world-class security experts to be on site anywhere in the United States, and Progent's most advanced security assessment bundles for enterprises include the participation of several certified security experts on site.

  • Time-critical Security Support Services
    For urgent assistance with computer security problems, your business can have access to a world-class online troubleshooting expert from Progent's team of certified security professionals at Progent's Technical Response Center. Progent's urgent online security support staff is ready to offer fast and economical assistance with security crises that threaten the productivity of your network. Progent's accredited security consultants are certified to provide help for environments powered by Microsoft, Linux, Mac OS X, Sun, and major versions of UNIX. Progent's broad selection of services addresses firewall configuration, e-mail security, secure system architecture, and information recovery. Progent's technical support staff has been awarded the world's most advanced security accreditations including Certified Information Systems Auditor and Certified Information Systems Security Professional. Progent also can provide fast access to online Cisco CCIE network consultants who can provide advanced support with complex network technology issues.

Progent's Flat-rate Managed Services for Information Security
Progent offers a collection of affordable, set-price monthly managed services designed to provide small and mid-size organizations with enterprise-class support and state-of-the-art technology for all facets of information assurance and compliance. Managed services available from Progent include:

  • Email Guard: Spam Filtering, Data Leakage Protection and Content Filtering
    Email Guard is Progent's email security platform that uses the services and infrastructure of top information security companies to deliver web-based control and world-class protection for all your inbound and outbound email. The powerful structure of Progent's Email Guard combines cloud-based filtering with a local gateway appliance to offer advanced defense against spam, viruses, Denial of Service Attacks, DHAs, and other email-borne malware. The cloud filter acts as a first line of defense and blocks the vast majority of threats from making it to your security perimeter. This reduces your exposure to external threats and conserves network bandwidth and storage space. Email Guard's onsite security gateway device adds a deeper layer of inspection for inbound email. For outbound email, the onsite gateway provides anti-virus and anti-spam protection, DLP, and email encryption. The onsite security gateway can also assist Microsoft Exchange Server to monitor and safeguard internal email that stays within your security perimeter. Learn more about Progent's Email Guard Spam Filtering, Virus Defense, Email Content Filtering and Data Loss Prevention.

  • ProSight Active Security Monitoring (ASM): Next Generation Endpoint Protection and Ransomware Defense
    ProSight Active Security Monitoring (ASM) is an endpoint protection (EPP) solution that incorporates cutting edge behavior-based machine learning technology to guard endpoint devices and servers and VMs against modern malware attacks like ransomware and file-less exploits, which easily get by legacy signature-based anti-virus tools. ProSight Active Security Monitoring safeguards on-premises and cloud-based resources and provides a single platform to manage the complete threat lifecycle including filtering, detection, containment, remediation, and post-attack forensics. Key capabilities include single-click rollback using Windows Volume Shadow Copy Service and real-time network-wide immunization against newly discovered threats. Learn more about Progent's ProSight Active Security Monitoring next-generation endpoint protection and ransomware defense.

  • ProSight Data Protection Services: Managed Cloud Backup and Recovery
    ProSight Data Protection Services offer small and medium-sized businesses a low cost and fully managed service for reliable backup/disaster recovery (BDR). Available at a low monthly cost, ProSight Data Protection Services automates your backup activities and enables rapid restoration of vital files, applications and VMs that have become lost or corrupted due to hardware breakdowns, software glitches, disasters, human mistakes, or malicious attacks like ransomware. ProSight DPS can help you protect, retrieve and restore files, folders, apps, system images, as well as Hyper-V and VMware images. Critical data can be protected on the cloud, to an on-promises device, or mirrored to both. Progent's cloud backup specialists can deliver advanced expertise to set up ProSight Data Protection Services to be compliant with regulatory requirements such as IPPA, FIRPA, and PCI and, when needed, can help you to restore your business-critical information. Learn more about ProSight DPS Managed Backup and Recovery.
Our System Has Been Hacked: What Should We Do Now?
Network Security ConsultantsIf your company is currently experiencing a network security emergency and you do not have a formal response procedure, visit Progent's Online Network Help to learn how to get immediate help. Progent provides remote help from experienced engineers and can refer trouble tickets to certified security specialists if necessary. Your business does not need to be a registered Progent customer to get urgent help for a security breach, but you can sign up as a Progent client in advance for free and your standing as a registered customer could save valuable time in case of an emergency.

Usually, smaller companies do not have a recovery plan in case of a damaging attack. This is risky, since the damage from a successful security attack can be even more catastrophic for a small company than for a large corporation. Progent's security consultants can assist your business to create a sensible recovery and event reporting plan that minimizes the network downtime resulting from a security breach. The step-by-step post-attack response model outlined by GIAC is Progent's suggested procedure for responding to a major security attack.

Areas of Progent's Security Expertise
Managing computer security and staying ready for restoring critical data and systems following an attack requires an on-going program that entails an array of tools and procedures. Progent's certified security professionals can help your organization at any level in your attempt to secure your IT network and remain in compliance, Services range from security evaluation to designing a comprehensive security program. Some technologies covered by Progent's security consultants include Security Planning and Prevention, Data Restoration and Security Failure Analysis, plus Outsourced Filtering of Email-Borne Attacks.

  • Designing, Implementing, and Validating Protected Environments
    Every company ought to have a carefully considered security plan that incorporates both preventive and responsive steps. The proactive plan is a set of precautions that helps to reduce vulnerabilities. The reactive strategy specifies activities to help IT personnel to evaluate the damage caused by a breach, repair the damage, record the experience, and restore network functions as soon as feasible. Progent can show you how to build security into your business processes, set up auditing utilities, define and implement a secure computer infrastructure, and recommend procedures and policies to optimize the protection of your network. Progent's security professionals are available to assist you to configure a firewall, design safe online and mobile access to email and files, and install an efficient virtual private network. If you are looking for an economical way for outsourcing your network security management, Progent's 24x7 Network Support Options feature automated online system tracking and immediate resolution of problems.

  • System Restoration and Security Forensics
    Progent offers expertise in recovering networks and servers that have been hacked, are quarantined, or have failed because of a security attack. Progent can help evaluate the damage caused by the breach, restore normal functions, and retrieve information lost owing to the breach. Progent's certified engineers can also oversee a comprehensive forensic analysis by going over event logs and using other advanced forensics techniques. Progent's background with security issues minimizes your business disruption and allows Progent to recommend effective measures to prevent or contain new assaults.
High-value Security Services Available from Progent
Progent's security consultants offer advanced support in key areas of network security including:
  • Security Vulnerability Audits and Security Compliance Testing
    Progent provides experience with security evaluation tools such as Microsoft Baseline Security Analyzer or LANguard from GFI for performing a variety of comprehensive network scans to uncover possible security gaps. Progent has broad skills with scanning utilities and can assist your company to analyze audit reports and react efficiently. Progent's security consultants also can perform web application validation and can conduct expert evaluation of enterprise-wide security to validate your company's compliance with important industry security specifications such as HIPAA, NIST, and ISO. In addition, Progent can assess the strength of your wireless protection covering fixed wireless equipment plus portable handsets. Get more details concerning Progent's Security Vulnerability Evaluation and Compliance Assessment.

  • Security Inventory Service Packages for Small Businesses
    Progent has put together two ultra-affordable security inventory service bundles designed to allow small companies to get an impartial security evaluation from a qualified security expert. With Progent's External Security Inventory Checkup, a security expert administers a comprehensive test of your IT infrastructure from outside your company firewall to determine potential risks in the security posture you expose to the outside world. With Progent's Internal Security Inventory Checkup, a security expert runs a system scan from a secure machine within your company firewall to evaluate the risk to internal attacks. The two security inventory services are set up and executed from a protected remote site. The process is managed by an engineer with top security accreditations who generates a document that details and analyzes the information captured by the security scan and suggests practical remediation where call for.

  • Security Vulnerability Evaluation Bundles for Enterprises
    Progent's qualified security consultants can deliver a selection of fixed-cost security assessment bundles designed for enterprises who need to comply with security standards required by government regulators or by vendors. Progent's network security audit packages offer larger organizations a chance to get an objective look at the strength of their protection profile. For every security evaluation bundle, Progent consultants with top security accreditations analyze and report on collected data and provide recommendations for effective improvements. The various security evaluation bundles feature an extra-cost alternative for onsite security engineers United States.

  • Upgrading from Microsoft Internet Security and Acceleration (ISA) Server and Forefront TMG 2010
    Microsoft ISA Server 2006 and the newer Microsoft Forefront Threat Management Gateway are software solutions that include an application-layer firewall able to protect systems from external and internal attacks. Both products provide deep inspection of network protocols to detect threats that can get by traditional firewalls. Microsoft Internet Security and Acceleration Server was replaced by Microsoft Forefront TMG, which is built on ISA Server 2006's technology while delivering a variety of improved capabilities. Forefront TMG has in turn been discontinued by Microsoft, and the gateway security functions provided by the product are now commonly handled by purpose-built physical appliances from companies that include Cisco, Check Point, SonicWALL and WatchGuard. (See Cisco ASA 5500-X Firewall with Firepower Services integration and management.) Progent offers online Microsoft Forefront TMG support services and Microsoft ISA Server consulting services to help you maintain and debug your legacy firewalls, and Progent can help you to migrate smoothly to a modern firewall solution by providing planning, integration, optimization, IT staff training and debugging.

  • Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Series Firewalls, and PIX 500 Security Appliances Integration and Troubleshooting
    Cisco Certified CCIE Network Security SpecialistsThe current Cisco ASA 5500-X Series Next-Generation Firewalls with Firepower Services deliver substantially more value than Cisco's earlier firewalls and have superseded the ASA 5500 and PIX 500 security appliances for new deployments. After Cisco's acquisition of Sourcefire, the whole family of Cisco ASA 5500-X firewalls can be configured to support Firepower Services, built on Sourcefire's Snort product, which is the market's most popular intrusion protection system (IPS). Firepower services bring enhanced capabilities such as advanced malware protection (AMP), URL filtering, dynamic threat analytics, and security automation. Progent's Cisco-qualified CCIE network experts can assist your company to manage your legacy PIX or ASA 5500 firewalls and upgrade efficiently to Cisco ASA 5500-X firewalls with Firepower Services. Progent's consultants offer remote and on-premises support for ASA 5500-X firewalls with Firepower Services and can help your business to design, deploy, tune, administer and troubleshoot firewall environments based around Cisco ASA 5500-X firewalls with Firepower Services. Learn additional details about ASA 5500-X Firewalls with Firepower Services integration and debugging services.

  • Other Firewall and Virtual Private Network (VPN) Technologies
    In addition to supporting a wide range of protection technologies from Microsoft and Cisco, Progent can provide small organizations top-level engineering services for products from other important firewall and VPN suppliers such as:

  • SIEM Solutions
    Security information and event management (SIEM) applications and services are intended to interpret the enormous amounts of information collected in security event records generated by multiple sources including network infrastructure appliances, operating systems, and application software and monitoring tools. SIEM applications organizes the security logs from these diverse sources and produces summary reports of security incidents as mandated by government regulations and business compliance standards. Progent's GIAC-certified network security experts and Cisco-certified network consultants can assist businesses to design, deploy and manage a SIEM system that enables them to understand the progress of security incidents and comply with event reporting regulations. (Visit Progent's Security information and Event Management solutions.)
Progent's Security Certifications
Progent's security professionals have been awarded some of the most prestigious accreditations available in the industry. These accreditations demand exhaustive testing and proven field background to ensure that candidates have acquired expertise with a significant body of security knowledge and techniques and can offer high-level security solutions to computer environments of any size.
  • Certified Information Security Manager Security Support Services
    Certified Information Security Manager defines the core skills and international standards of service that IT security professionals are required to achieve. CISM provides executive management the assurance that consultants who have been awarded their certification possess the experience and skill to offer efficient security management and engineering support. Progent can offer a CISM support professional to assist your enterprise in key security areas such as information protection governance, risk management, data protection process management, and incident response management. Get the details concerning Progent's Certified Information Security Manager (CISM) Security Support Assistance.

  • Certified Information Systems Security Professionals (CISSP) Security Consulting Services
    Progent's Certified Information Systems Security Professionals (CISSPs) are security specialists who have earned CISSP accreditation through demonstrated experience, rigorous study, and exhaustive examination. CISSP Certification recognizes expertise in a worldwide standard for information security. American National Standards Institute has given the CISSP status official recognition in the field of IT security under ISO/IEC 17024. Fields of knowledge covered under CISSP include security management procedures, security architecture and models, access control systems, software development security, operations security, hardware security, encryption, telecommunications, network security, and business continuity planning. Find out the details concerning Progent's Certified Information Systems Security Professionals (CISSP) Consulting Services.

  • Information Systems Security Architecture Professionals (ISSAP) Consulting Support
    Progent's ISSAP qualified security consultants are experts who have been awarded ISSAP accreditation after thorough examination and substantial hands-on work with network security architecture. ISSAP security experts have comprehensive knowledge of access management mechanisms and methodologies, phone system and network infrastructure protection, cryptography, requirements analysis, business continuity and disaster recovery, and physical security. Progent's ISSAP-qualified security consultants can help your business with all aspects of secure network architecture. Read more information about Progent's ISSAP Accredited Protected Network Architecture Consulting Services.

  • Certified Information Systems Auditor (CISA) Consulting Services
    The Certified Information Systems Auditor accreditation is a recognized achievement that signifies mastery in information system security auditing. Certified by ANSI, the CISA credential has consultants undergo an extensive examination administered by the ISACA professional association. Progent can provide the services of a CISA-certified security audit professional able to help companies in the fields of IS audit process, IT governance, systems and infrastructure planned useful life, IT support, protecting information assets, and disaster recovery preparedness. Get more details concerning Progent's Certified Information Systems Auditor Professional Services.

  • Global Information Assurance Certification Support Services
    GIAC (Global Information Assurance Certification) was established in 1999 to validate the knowledge of information technology security professionals. GIAC's goal is to ensure that an accredited security consultant has the skills necessary to provide services in vital categories of system, data, and application security. GIAC certifications are acknowledged by businesses and government organizations all over the world including and the U.S. National Security Agency. Progent offers the expertise of certified professionals for all of the network security services covered within GIAC accreditation programs such as assessing security systems, incident response, traffic analysis, and web-based services security. Learn the details concerning Progent's GIAC Professional Expertise.
Get in Touch with Progent for Computer Security Help
If you're trying to find computer security consulting expertise, phone Progent at 800-993-9400 or see Contact Progent.
















© 2002- 2017 Progent Corporation. All rights reserved.