Overview of Progent's Security Consulting Services
Progent's industry certified computer security and compliance professionals offer a broad range of services designed to help organizations of any size to uncover and correct security vulnerabilities, defend against attacks, remediate the issues caused by a breakdown of security, and meet regulatory mandates for guarding information and reporting incidents. Progent offers a selection of service models:

  • On-demand remote and on-premises support invoiced to the nearest minute
  • Continual fully managed services billed at a low fixed monthly fee
  • Value-priced service packages for a one-time security and compliance assessment
As-needed Security Support Services
Once you register for Progent's services (registration is free), you can receive as-needed remote or onsite assistance from a Progent security expert. This classic support model is primarily reactive and optimized for quickly taking care of IT issues that are disrupting your productivity or that have stymied your in-house support staff. Common examples are replacing a firewall or VPN tunnel, implementing a critical security patch for a Cisco switch, designing compliant access to cloud-based resources, or recovering from a ransomware attack. These security services are billed to the nearest minute, which avoids the frustrating case of getting large bills for fast fixes.

Delivery options for Progent's on-demand support services include:

  • Remote Security Support Services
    The majority security issues can be handled online via a combination of phone-based help and a remote connection between Progent's Technical Response Center (TRC) and a customer's network. Progent's TRC group can provide remote security help by offering efficient access to consultants with the background and resources to resolve some of the most challenging problems quickly, keeping your service costs affordable and reducing downtime.
  • Onsite Security Services
    For cases where onsite assistance is required, Progent can dispatch a technical expert to major cities across the U.S. Progent can also send a security consultant with high-level certifications and world-class skills to any location in the U.S.
Progent's accredited security engineers are qualified to provide help for systems powered by Microsoft, Linux, Mac, Sun Solaris, and major versions of UNIX. Progent's broad selection of consulting services addresses firewall configuration, e-mail systems, protected network architecture, and data restoration. Progent's technical support staff has been awarded the world's most advanced security credentials including GIAC and ISSAP. Progent also can provide fast access to online Cisco CCIE network infrastructure engineers who can provide advanced assistance with complex network technology problems.

ProSight Fixed-price Managed Services for Information Assurance
Progent's value-priced ProSight series of managed services is designed to provide small and mid-size businesses with enterprise-class support and cutting-edge technology for all facets of information assurance. ProSight managed services offered by Progent include:

  • ProSight Active Security Monitoring (ASM): Endpoint Protection and Ransomware Defense
    ProSight Active Security Monitoring is an endpoint protection (EPP) solution that utilizes cutting edge behavior machine learning tools to guard endpoint devices as well as servers and VMs against new malware attacks like ransomware and email phishing, which routinely escape traditional signature-matching AV products. ProSight Active Security Monitoring safeguards local and cloud resources and offers a single platform to manage the entire threat lifecycle including blocking, infiltration detection, containment, remediation, and post-attack forensics. Top features include one-click rollback with Windows Volume Shadow Copy Service and real-time network-wide immunization against new threats. Read more about Progent's ProSight Active Security Monitoring endpoint protection and ransomware recovery.

  • ProSight Enhanced Security Protection: Unified Physical and Virtual Endpoint Security
    ProSight Enhanced Security Protection (ESP) managed services deliver affordable in-depth protection for physical servers and VMs, desktops, mobile devices, and Microsoft Exchange. ProSight ESP utilizes contextual security and modern behavior analysis for round-the-clock monitoring and responding to security threats from all vectors. ProSight ESP provides two-way firewall protection, penetration alarms, endpoint management, and web filtering via cutting-edge technologies packaged within one agent managed from a single control. Progent's data protection and virtualization consultants can help you to plan and implement a ProSight ESP environment that addresses your company's specific requirements and that helps you prove compliance with government and industry data security standards. Progent will assist you specify and implement security policies that ProSight ESP will enforce, and Progent will monitor your IT environment and react to alarms that call for urgent attention. Progent's consultants can also assist you to install and test a backup and disaster recovery solution such as ProSight Data Protection Services (DPS) so you can recover quickly from a potentially disastrous security attack such as ransomware. Read more about Progent's ProSight Enhanced Security Protection unified endpoint protection and Exchange email filtering.

  • ProSight DPS: Managed Backup and Recovery
    ProSight Data Protection Services from Progent provide small and mid-sized organizations a low cost and fully managed solution for reliable backup/disaster recovery (BDR). Available at a low monthly cost, ProSight DPS automates your backup processes and allows rapid recovery of critical files, applications and VMs that have become unavailable or damaged due to hardware breakdowns, software glitches, disasters, human error, or malware attacks such as ransomware. ProSight DPS can help you protect, retrieve and restore files, folders, apps, system images, as well as Hyper-V and VMware images. Critical data can be backed up on the cloud, to an on-promises device, or mirrored to both. Progent's backup and recovery consultants can deliver world-class support to set up ProSight DPS to be compliant with regulatory standards like HIPPA, FIRPA, and PCI and, when needed, can assist you to recover your business-critical information. Read more about ProSight DPS Managed Backup and Recovery.

  • ProSight Email Guard: Spam Filtering, Data Leakage Protection and Email Encryption
    ProSight Email Guard is Progent's email security solution that uses the services and infrastructure of top information security companies to provide web-based management and comprehensive protection for your email traffic. The hybrid structure of Email Guard integrates a Cloud Protection Layer with an on-premises gateway appliance to offer advanced defense against spam, viruses, Dos Attacks, Directory Harvest Attacks, and other email-based threats. Email Guard's Cloud Protection Layer acts as a first line of defense and keeps most threats from reaching your network firewall. This decreases your vulnerability to inbound threats and conserves network bandwidth and storage space. Email Guard's onsite gateway appliance adds a further layer of analysis for inbound email. For outgoing email, the local security gateway provides AV and anti-spam protection, DLP, and email encryption. The on-premises gateway can also assist Microsoft Exchange Server to track and safeguard internal email that stays inside your security perimeter. Find out more about Progent's ProSight Email Guard spam filtering, virus blocking, content filtering and data leakage prevention.

  • ProSight WAN Watch: Infrastructure Remote Monitoring and Management
    Progentís ProSight WAN Watch is an infrastructure management service that makes it simple and inexpensive for smaller organizations to diagram, track, enhance and troubleshoot their networking appliances such as routers, firewalls, and load balancers plus servers, endpoints and other devices. Using cutting-edge Remote Monitoring and Management (RMM) technology, WAN Watch makes sure that infrastructure topology maps are kept updated, copies and displays the configuration of almost all devices on your network, tracks performance, and generates alerts when issues are discovered. By automating time-consuming network management activities, ProSight WAN Watch can cut hours off common chores such as making network diagrams, expanding your network, locating devices that require important updates, or isolating performance bottlenecks. Find out more details about ProSight WAN Watch network infrastructure management services.

  • ProSight LAN Watch: Server and Desktop Monitoring and Management
    ProSight LAN Watch is Progentís server and desktop remote monitoring managed service that uses advanced remote monitoring and management (RMM) techniques to help keep your network running efficiently by tracking the state of vital assets that power your business network. When ProSight LAN Watch detects a problem, an alert is transmitted automatically to your specified IT management personnel and your Progent engineering consultant so that any potential problems can be addressed before they have a chance to impact your network Learn more about ProSight LAN Watch server and desktop remote monitoring consulting.

  • ProSight Virtual Hosting: Hosted Virtual Machines at Progent's World-class Data Center
    With ProSight Virtual Hosting service, a small or mid-size business can have its critical servers and apps hosted in a protected Tier III data center on a fast virtual machine host configured and maintained by Progent's network support professionals. With Progent's ProSight Virtual Hosting service model, the client owns the data, the OS platforms, and the applications. Because the environment is virtualized, it can be ported easily to a different hosting solution without requiring a time-consuming and difficult reinstallation procedure. With ProSight Virtual Hosting, you are not tied a single hosting service. Find out more about ProSight Virtual Hosting services.

  • ProSight IT Asset Management: Network Documentation Management
    ProSight IT Asset Management service is a cloud-based IT documentation management service that makes it easy to create, maintain, retrieve and protect data related to your IT infrastructure, processes, business apps, and services. You can instantly find passwords or serial numbers and be warned automatically about impending expirations of SSL certificates ,domains or warranties. By cleaning up and organizing your network documentation, you can eliminate up to half of time spent trying to find critical information about your IT network. ProSight IT Asset Management includes a common repository for storing and sharing all documents related to managing your network infrastructure such as standard operating procedures (SOPs) and How-To's. ProSight IT Asset Management also supports a high level of automation for collecting and relating IT information. Whether youíre making improvements, performing regular maintenance, or responding to an emergency, ProSight IT Asset Management gets you the knowledge you require when you need it. Learn more details about ProSight IT Asset Management service.
ProSight Network Audits
Progent's ProSight Network Audits are a quick and low-cost alternative for small and mid-size organizations to get an objective evaluation of the overall health of their network. Powered by a selection of the leading remote monitoring and management (RMM) tools in the industry, and overseen by Progent's world-class group of IT experts, ProSight Network Audits help you see how well the configuration of your core infrastructure assets conform to leading practices. Both the Basic and Advanced options for ProSight Network Audit services are offered at a low, one-time cost and deliver instant ROI such as a more manageable Active Directory (AD) system. Both also come with one year of cutting-edge remote network monitoring and management. Advantages can include lower-cost network management, improved compliance with data security regulations, more efficient utilization of network resources, quicker troubleshooting, more reliable backup and restore, and increased uptime. Read more information about Progent's ProSight Network Audits IT infrastructure review.

The ProSight Ransomware Preparedness Report Service
The ProSight Ransomware Preparedness Report is an affordable service built around a phone discussion with a Progent information assurance consultant. The interview is intended to assess your organization's ability to block or recover quickly from a ransomware attack. Progent will consult with you directly to gather information concerning your existing security profile and backup/recovery platform, and Progent will then produce a custom Basic Security and Best Practices Report document describing how you can apply industry best practices to create an efficient AV and backup/recovery system that aligns with your company's requirements. For details, visit The ProSight Ransomware Preparedness Report.

Flat-rate Security Evaluation and Verification Packages
Progent offers a selection of fixed-price security and compliance evaluation bundles that provide exceptional value by deploying Progent's enterprise-class system monitoring software as well as Progent's consulting skills to create an unbiased and comprehensive evaluation of your network security posture.

  • Security Assessment Service Bundles for Small Organizations
    Progent offers two value-priced security inventory packages designed to enable small businesses to obtain an objective security assessment from an accredited security engineer. With Progent's External Security Inventory Scan, a consultant administers an extensive examination of your IT system from outside your corporate firewall to identify possible risks in the security profile you present to the outside. With Progent's Internal Security Inventory Scan, a security consultant runs a network scan from an authorized machine inside your company firewall to assess your vulnerability to inside threats. These two security inventory services are configured and executed from a secured offsite location. The project is administered by an engineer who has earned high-level security certifications and who produces a report that describes and interprets the information captured by the scan and suggests practical improvements where appropriate.
  • Security Vulnerability Assessment Packages for Large Businesses
    Progent has developed three levels of flat-rate security evaluation service bundles designed for enterprises who want to meet security standards required by state or industry regulators. Progent's security evaluation service packages offer larger organizations an opportunity to obtain an objective look at the viability of their security profile. For every security evaluation package, Progent consultants with top security credentials analyze and report on collected data and offer suggestions for efficient improvements. Each of the network security assessment packages include an added-cost option for onsite engineers at any location in the United States.
  • Stealth Penetration Testing Services
    Stealth penetration testing, commonly called PEN testing, is a vital technique for helping organizations to find out how vulnerable their IT systems are to current-generation attacks. Progent's stealth penetration testing services check how effectively your corporate security policies and technologies stand up to authorized but unannounced penetration attempts launched by Progent's experienced security experts utilizing advanced hacking techniques. Find out about Progent's stealth penetration testing services.
We've Been Hacked: What Are We Supposed to Do Now?
Network Security ConsultantsIf you are now fighting a network security emergency and you do not have a detailed response plan, go to Progent's Remote Network Help to learn how to receive fast help. Progent offers remote help from skilled network technicians and can refer problems to high-level security experts if necessary. Your company does not have to be a registered Progent customer to receive emergency support for a security problem, but you can sign up as a Progent customer in advance for free and your status as a registered customer can save precious time during a crisis.

Typically, smaller businesses have no response plan in case of a damaging penetration. This is risky, because the cost of a serious security attack can be even more catastrophic for a small company than for a big enterprise. Progent's security specialists can assist your you to design an efficient recovery and event reporting plan that minimizes the IT system downtime resulting from a security breach. The step-by-step incident handling procedure promoted by GIAC is Progent's recommended procedure for handling a major security incident.

Advanced Security Expertise Offered by Progent
Progent's certified security consultants can provide specialized help in key facets of network security such as:

  • Security Vulnerability Evaluation and Security Compliance Testing
    Progent provides experience with information risk evaluation software such as Microsoft Baseline Security Analyzer or LANguard from GFI for performing a set of comprehensive network scans to uncover potential security gaps. Progent has extensive experience with these tools and can assist you to analyze assessment results and respond efficiently. Progent's security consultants also provide web application testing and can conduct thorough evaluation of corporate-wide security to determine your organization's compliance with major worldwide security standards including FISMA, PCI, and ISO. Also, Progent can assess the strength of your wireless protection including fixed wireless appliances plus portable handsets. Learn more information about Progent's Information Risk Evaluation and Security Compliance Testing.
  • Planning, Implementing, and Validating Protected Environments
    Every business ought to develop a thoroughly thought out security plan that includes both preventive and responsive activity. The pre-attack plan is a collection of precautions that works to reduce vulnerabilities. The reactive strategy specifies procedures to help security personnel to evaluate the losses resulting from a breach, remediate the damage, document the experience, and revive network activity as soon as feasible. Progent can advise you how to incorporate security into your company processes, configure scanning utilities, define and implement a secure computer architecture, and propose processes and policies that will maximize the safety of your information system. Progent's security professionals are ready to assist you to configure a firewall, design protected remote connectivity to e-mail and files, and configure an effective virtual private network (VPN). If you are looking for an affordable option for jobbing out your security management, Progent's 24x7 Network Support Options feature non-stop remote server monitoring and fast response to emergencies.
  • Data Recovery and Failure Analysis
    Progent provides expertise in restoring systems and computers that have been compromised, are quarantined, or have stopped working as a result of a security attack. Progent can show you how to determine the losses caused by the breach, restore normal functions, and recover information compromised as a result of the breach. Progent's security specialists can also perform a thorough forensic evaluation by examining activity logs and using a variety of advanced assessment tools. Progent's background with security problems reduces your downtime and allows Progent to propose efficient ways to prevent or contain future assaults.
  • Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Firewalls, and PIX 500 Firewalls Configuration and Debugging
    Cisco CCIE Security ConsultantsThe current ASA 5500-X Family Next-Generation Firewalls with Firepower Services provide substantially more performance than Cisco's previous firewalls and have superseded the ASA 5500 and PIX 500 firewalls for all new deployments. Following Cisco's purchase of Sourcefire, the entire line of Cisco ASA 5500-X firewalls can be configured to enable Firepower Services, based on Sourcefire's Snort product, which is the world's most popular intrusion protection system (IPS). Firepower services bring enhanced features such as advanced malware protection (AMP), URL filtering, dynamic threat analytics, and automation. Progent's Cisco-certified CCIE network experts can assist your company to maintain your current PIX or Cisco ASA 5500 security appliances or upgrade efficiently to Cisco ASA 5500-X firewalls with Firepower Services. Progent's consultants offer remote and onsite support for ASA 5500-X firewalls with Firepower Services and can help your organization to design, integrate, optimize, manage and troubleshoot firewall environments built on Cisco ASA 5500-X firewalls with Firepower Services. Find out more information about ASA 5500-X Firewalls with Firepower integration and debugging support.
  • Other Firewall and VPN Technologies
    As well as supporting a broad array of protection technologies available from Microsoft and Cisco, Progent offers small and mid-size businesses top-level consulting for security products from other popular firewall and Virtual Private Network (VPN) suppliers such as:
  • SIEM Integration and Support
    Security information and event management (SIEM) software and services are intended to interpret the massive amounts of information represented by security event logs created by a wide range of sources such as network appliances, operating systems, and applications and monitoring tools. SIEM software analyzes the security logs from these various sources and creates summary reports of security events as required by government regulations and business compliance guidelines. Progent's GIAC-certified computer security experts and Cisco CCIE certified network infrastructure experts can help businesses to plan, deploy and manage a SIEM solution that enables them to understand the behavior of security incidents and comply with event reporting regulations. (Visit Progent's Security information and Event Management solutions.)
Progent's Security Certifications
Progent's security specialists have been awarded some of the most prestigious accreditations available in the security industry. All of these certifications demand extensive examinations and proven work background to guarantee that recipients have acquired expertise with a substantial amount of security knowledge and methodologies and can offer advanced consulting to computer networks of any size.
  • Certified Information Security Manager Security Support Services
    Certified Information Security Manager defines the basic skills and international standards of service that information security professionals are required to master. CISM provides business management the assurance that those who have been awarded their CISM possess the experience and skill to provide effective security management and engineering services. Progent can offer a CISM-certified support professional to assist your organization in key security disciplines including data security governance, risk assessment, data protection process control, and crisis response management. Read additional details concerning Progent's CISM Security Consulting Expertise.

  • CISSP Security Support Expertise
    Progent's CISSP experts are security engineers who have been awarded CISSP certification through demonstrated professional work, rigorous study, and exhaustive examination. CISSP Certification indicates mastery of a worldwide standard for IT security. American National Standards Institute has given the CISSP status official recognition in the area of information security under ISO/IEC 17024. Fields of expertise covered under CISSP include security administration procedures, security design and test systems, access control methodology, software development security, operations security, physical security, cryptography, communications, Internet security, and business continuity planning. Learn additional details about Progent's CISSP Consulting Services.

  • ISSAP Engineering Support
    Progent's ISSAP certified security consultants are consultants who have earned ISSAP certification after thorough examination and significant hands-on work with network security architecture. ISSAP security experts have acquired comprehensive knowledge of access management systems and techniques, phone system and network security, cryptography, requirements analysis, business continuity planning (BCP) and disaster recovery, and physical security integration. Progent's ISSAP-qualified security specialists can help your company with all aspects of secure network architecture. Read additional details about Progent's ISSAP Accredited Protected Network Infrastructure Consulting Services.

  • CISA Consulting Expertise
    The CISA credential is a prestigious achievement that represents expertise in network security audit and control. Accredited by the American National Standards Institute, the CISA accreditation requires that consultants undergo an extensive examination given by the ISACA professional group. Progent offers the expertise of a CISA-qualified security professional able to help companies in the fields of information systems audit process, information technology governance, network assets and infrastructure planned useful life, IT support, protecting data assets, and disaster recovery preparedness. Find out additional information about Progent's CISA Consulting Assistance.

  • GIAC Support Services
    GIAC (Global Information Assurance Certification) was established in 1999 to validate the skill of information technology security professionals. GIAC's mission is to make sure that an accredited professional has the knowledge needed to provide support in key areas of network, information, and application program security. GIAC certifications are acknowledged by companies and government organizations around the world including and the U.S. National Security Agency. Progent offers the help of GIAC certified professionals for all of the network security services covered within GIAC certification topics including assessing perimeters, incident response, traffic analysis, and web application security. Read the details about Progent's GIAC Professional Expertise.
Get in Touch with Progent for Computer Security Help
If you're looking for computer security consulting, call Progent at 800-993-9400 or go to Contact Progent.
















© 2002- 2018 Progent Corporation. All rights reserved.