Overview of Progent's Security Support Services
Progent's certified computer security experts can provide a broad selection of services designed to help businesses of all sizes to detect and correct security weaknesses, block assaults, remediate the problems caused by a breach of protection, and comply with regulatory mandates for guarding data and reporting incidents. Progent can provide a selection of service delivery models:

  • On-demand remote and on-site assistance invoiced by the minute
  • Continual managed services billed at an affordable flat monthly rate
  • Set-price service packages for a single security and compliance assessment
As-needed Security Consulting Services
After you register for Progent's services (signing up is free), you can get as-needed remote or onsite assistance from one of Progent security and compliance expert. This classic service model is primarily reactive and geared toward rapidly resolving IT issues that are affecting your productivity or that have stumped your in-house support personnel. Common scenarios include configuring a firewall or VPN connection, implementing a vital security update for a Cisco switch, designing compliant access to a public cloud, or restoring data after a ransomware attack. These security services are billed by the minute, which avoids the frustrating case of receiving large invoices for quick repairs.

Delivery options for Progent's on-demand support services include:

  • Remote Security Support Services
    Most security-related problems can be handled remotely via a mix of phone support and a remote Internet connection between Progent's Technical Response Center (TRC) and a client's computer. Progent's Technical Response Center can deliver online security support by offering easy access to consultants with the experience and resources to resolve many of the most difficult issues quickly, keeping your service costs affordable and reducing lost productivity.
  • On-premises Security Support Services
    For instances where onsite assistance is necessary, Progent can send a technical professional to major cities throughout the U.S. Progent can also send a security consultant with high-level certifications and world-class skills to any location in the U.S.
Progent's accredited security engineers are certified to support environments powered by Windows, Linux, Apple Mac, Solaris, and popular derivatives of UNIX. Progent's broad array of consulting services encompasses firewall expertise, email security, secure system architecture, and data restoration. Progent's support staff has been awarded the industry's top security credentials including CISA and Information System Security Architecture Professional. Progent also offers immediate access to online Cisco-certified CCIE network consultants who can deliver advanced assistance with complex network technology issues.

ProSight Fixed-price Managed Services for Information Assurance
Progent's low-cost ProSight family of network monitoring and management services is designed to provide small and mid-size businesses with enterprise-class support and state-of-the-art technology for all facets of information assurance. ProSight managed services offered by Progent include:

  • ProSight Email Guard: Inbound and Outbound Spam Filtering, Data Leakage Protection and Content Filtering
    ProSight Email Guard is Progent's email security platform that uses the services and infrastructure of leading data security vendors to provide centralized management and world-class security for all your inbound and outbound email. The hybrid structure of Email Guard managed service combines cloud-based filtering with a local gateway device to offer complete defense against spam, viruses, Dos Attacks, DHAs, and other email-borne threats. The Cloud Protection Layer acts as a first line of defense and keeps most threats from making it to your network firewall. This decreases your exposure to external threats and saves network bandwidth and storage space. Email Guard's on-premises gateway device provides a further level of analysis for incoming email. For outgoing email, the onsite security gateway provides AV and anti-spam protection, DLP, and email encryption. The local security gateway can also help Microsoft Exchange Server to track and protect internal email traffic that stays inside your corporate firewall. Learn more about Progent's ProSight Email Guard spam filtering, virus blocking, email content filtering and data leakage protection.

  • ProSight Active Security Monitoring (ASM): Endpoint Protection and Ransomware Recovery
    ProSight Active Security Monitoring (ASM) is an endpoint protection (EPP) solution that utilizes cutting edge behavior-based analysis technology to guard endpoints as well as physical and virtual servers against new malware assaults such as ransomware and file-less exploits, which routinely evade traditional signature-matching AV tools. ProSight Active Security Monitoring safeguards on-premises and cloud-based resources and provides a single platform to automate the entire threat progression including blocking, identification, mitigation, cleanup, and post-attack forensics. Top features include one-click rollback using Windows VSS and automatic system-wide immunization against new attacks. Find out more about Progent's ProSight Active Security Monitoring next-generation endpoint protection and ransomware recovery.

  • ProSight Data Protection Services: Managed Cloud Backup and Recovery
    ProSight Data Protection Services provide small and medium-sized businesses an affordable end-to-end service for reliable backup/disaster recovery (BDR). Available at a fixed monthly cost, ProSight DPS automates your backup activities and allows fast recovery of vital files, applications and VMs that have become unavailable or corrupted as a result of hardware breakdowns, software bugs, natural disasters, human mistakes, or malware attacks like ransomware. ProSight DPS can help you back up, retrieve and restore files, folders, applications, system images, plus Microsoft Hyper-V and VMware virtual machine images. Important data can be backed up on the cloud, to a local storage device, or mirrored to both. Progent's BDR consultants can deliver world-class expertise to set up ProSight Data Protection Services to to comply with government and industry regulatory standards like HIPPA, FIRPA, and PCI and, whenever necessary, can help you to restore your business-critical data. Find out more about ProSight Data Protection Services Managed Backup.

  • ProSight WAN Watch: Network Infrastructure Remote Monitoring and Management
    ProSight WAN Watch is an infrastructure management service that makes it simple and inexpensive for smaller businesses to map out, track, reconfigure and debug their networking appliances like routers, firewalls, and wireless controllers plus servers, printers, client computers and other networked devices. Using state-of-the-art RMM technology, WAN Watch makes sure that network maps are always updated, captures and displays the configuration information of virtually all devices connected to your network, monitors performance, and generates notices when problems are discovered. By automating tedious network management activities, WAN Watch can cut hours off ordinary chores like network mapping, expanding your network, locating devices that require critical updates, or resolving performance issues. Find out more about ProSight WAN Watch network infrastructure management services.

  • ProSight LAN Watch: Server and Desktop Monitoring
    ProSight LAN Watch is Progentís server and desktop remote monitoring managed service that incorporates advanced remote monitoring and management (RMM) techniques to keep your network operating efficiently by checking the health of vital assets that drive your information system. When ProSight LAN Watch uncovers an issue, an alert is transmitted automatically to your designated IT staff and your Progent consultant so that any looming problems can be resolved before they can impact productivity Find out more details about ProSight LAN Watch server and desktop monitoring consulting.

  • ProSight Virtual Hosting: Hosted Virtual Machines at Progent's World-class Data Center
    With Progent's ProSight Virtual Hosting service, a small or mid-size organization can have its critical servers and apps hosted in a protected fault tolerant data center on a fast virtual machine host set up and maintained by Progent's network support experts. With Progent's ProSight Virtual Hosting service model, the customer retains ownership of the data, the OS platforms, and the applications. Since the environment is virtualized, it can be ported immediately to a different hardware environment without a lengthy and technically risky configuration process. With ProSight Virtual Hosting, you are not locked into a single hosting provider. Learn more details about ProSight Virtual Hosting services.

  • ProSight IT Asset Management: Network Documentation Management
    Progent's ProSight IT Asset Management service is a cloud-based IT documentation management service that allows you to capture, maintain, find and safeguard data related to your IT infrastructure, processes, applications, and services. You can instantly find passwords or IP addresses and be warned about upcoming expirations of SSLs or warranties. By updating and organizing your network documentation, you can save as much as 50% of time spent trying to find vital information about your IT network. ProSight IT Asset Management includes a common location for holding and sharing all documents related to managing your network infrastructure like recommended procedures and How-To's. ProSight IT Asset Management also supports advanced automation for gathering and relating IT information. Whether youíre making improvements, performing regular maintenance, or responding to an emergency, ProSight IT Asset Management gets you the knowledge you require when you need it. Learn more details about ProSight IT Asset Management service.
ProSight Network Audits
Progent's ProSight Network Audits are a fast and low-cost alternative for small and mid-size businesses to obtain an objective evaluation of the health of their information system. Based on some of the top remote monitoring and management (RMM) platforms in the industry, and overseen by Progent's world-class team of IT professionals, ProSight Network Audits help you see how closely the deployment of your core network devices adhere to industry best practices. The Basic and Advanced options for ProSight Network Audit services are offered at a budget-friendly, one-time cost and deliver immediate benefits like a more manageable Active Directory (AD) system. Both also include a year of state-of-the-art remote network monitoring and management (RMM). Advantages can include easier management, improved compliance with information security standards, higher utilization of network resources, quicker troubleshooting, more reliable backup and recovery, and higher availability. Read more information about Progent's ProSight Network Audits IT infrastructure review.

Progent's ProSight Ransomware Preparedness Report Service
The ProSight Ransomware Preparedness Report is a low-cost service centered on a brief phone interview with a Progent backup/recovery expert. The fact-finding interview is designed to evaluate your company's ability either to block or recover rapidly after a ransomware incident. Progent will work with you directly to gather information about your existing antivirus tools and backup/recovery system, and Progent will then produce a written Basic Security and Best Practices Report document describing how you can apply best practices to deploy a cost-effective AV and backup/recovery system that aligns with your company's requirements. For details, refer to Progent's ProSight Ransomware Preparedness Report Service.

Flat-rate Security Evaluation and Verification Packages
Progent has put together a variety of set-price security evaluation packages that provide exceptional value by utilizing Progent's advanced system monitoring software plus Progent's consulting experience to create an unbiased and comprehensive assessment of your IT environment security profile.

  • Security Assessment Service Bundles for Small Organizations
    Progent offers two ultra-affordable security inventory scanning service packages designed to allow small organizations to get a professional security assessment from a certified security consultant. With Progent's External Security Inventory Scan, a consultant manages a comprehensive examination of your network from outside your firewalled perimeter to determine possible risks in the security posture you expose to the outside. With Progent's Internal Security Inventory Scan, a certified security expert executes a network scan from an authorized machine inside your firewalled perimeter to assess your exposure to inside assaults. These two security inventory scans are set up and executed from a secured offsite location. The scan is managed by a consultant who has been awarded advanced security certifications and who produces a report that details and evaluates the data collected by the security scan and recommend various improvements where appropriate.
  • Security Vulnerability Evaluation Packages for Large Organizations
    Progent offers three levels of flat-rate security evaluation service packages designed for large organizations who need to meet security standards required by state or industry agencies. Progent's security assessment service packages offer larger organizations a chance to get an objective assessment at the viability of their security posture. For every security assessment package, Progent consultants with advanced security credentials study and report on collected data and provide recommendations for cost-effective improvements. Each of the network security assessment bundles include an extra-cost option for onsite consultants at any location in the U.S.
  • Stealth Penetration Testing
    Stealth penetration testing, often called PEN testing, is an accepted tool for allowing organizations to determine how open their network systems are to modern attacks. Progent's stealth penetration testing test how well your corporate security procedures and technologies resist authorized but unannounced intrusion attempts managed by Progent's experienced security experts using cutting-edge hacking techniques. Find out about Progent's stealth penetration testing (PEN Test) services.
Our System Has Been Hacked: What Do We Do Now?
Network Security ConsultantsIf you are currently experiencing a security emergency and you do not have a formal recovery procedure, go to Progent's Online Technical Support to learn how to receive fast help. Progent provides remote assistance from experienced network technicians and can escalate problems to certified security specialists if required. Your company does not need to be a registered Progent customer to receive emergency help for a security breach, but you can register as a Progent customer in advance at no cost and your status as a current customer can save precious time during an emergency.

Usually, smaller organizations do not have a response procedure in case of a successful penetration. This is risky, because the cost of a successful security attack can be even more catastrophic for a small business than for a big enterprise. Progent's security engineers can help your you to create an efficient response and incident reporting plan that minimizes the IT system disruption following a security breach. The formal incident handling model outlined by Global Information Assurance Certification is Progent's recommended procedure for responding to a serious security attack.

Advanced Security Services Available from Progent
Progent's veteran engineers can provide world-class consulting in vital areas of IT compliance such as:

  • Security Vulnerability Audits and Security Compliance Assessment
    Progent offers experience with information risk evaluation software such as Microsoft Baseline Security Analyzer or LANguard from GFI for performing a variety of automatic system tests to reveal potential security problems. Progent has broad skills with these and similar utilities and can assist you to understand assessment reports and react appropriately. Progent's security engineers also provide web application testing and can perform thorough evaluation of enterprise-wide security to confirm your company's compliance with major industry security standards including FISMA, NIST, and ISO 17799. Also, Progent can evaluate the effectiveness of your wireless security covering fixed wireless appliances plus mobile handsets. Learn more details concerning Progent's Vulnerability Audits and Security Compliance Assessment.
  • Designing, Building, and Validating Protected Networks
    Any company ought to have a carefully considered security strategy that includes both preventive and reactive activity. The pre-attack strategy is a collection of precautions that works to minimize vulnerabilities. The reactive plan defines procedures to help security staff to assess the damage caused by a breach, remediate the damage, document the experience, and restore network activity as quickly as feasible. Progent can advise you how to incorporate security into your company processes, set up scanning software, define and execute a safe network infrastructure, and propose processes and policies that will maximize the protection of your computing environment. Progent's security experts are available to assist you to set up a firewall, design secure online and mobile access to email and data, and configure an efficient virtual private network (VPN). If your company is looking for an affordable way for jobbing out your network security administration, Progent's 24x7 Monitoring Services feature automated remote network tracking and quick response to problems.
  • Data Restoration and Failure Analysis
    Progent provides expertise in recovering networks and devices that have been hacked, are quarantined, or have stopped working as a result of a security attack. Progent can help assess the losses resulting from the assault, return your company to ordinary functions, and recover data lost owing to the attack. Progent's security specialists can also perform a thorough failure analysis by examining activity logs and using other proven assessment techniques. Progent's background with security issues reduces your business disruption and allows Progent to propose effective strategies to prevent or contain new attacks.
  • Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Firewalls, and PIX 500 Firewalls Integration and Troubleshooting
    Cisco Certified CCIE Network Security EngineersThe current Cisco ASA 5500-X Family Next-Generation Firewalls with Firepower Services deliver significantly more bang for the buck than Cisco's legacy PIX and ASA 5500 firewalls and have superseded the ASA 5500 and PIX firewalls for new deployments. After Cisco's acquisition of Sourcefire, the entire line of ASA 5500-X firewalls can be provisioned to support Firepower Services, built on Sourcefire's Snort product, which is the world's most popular network intrusion protection system (IPS). Firepower services bring powerful new features including advanced malware protection (AMP), URL filtering, real-time threat analytics, and automation. Progent's Cisco-qualified CCIE network experts can assist your company to manage your legacy PIX or ASA 5500 firewalls or upgrade efficiently to Cisco ASA 5500-X firewalls with Firepower Services. Progent's consultants offer online and on-premises help with ASA 5500-X firewalls with Firepower Services and can assist your company to plan, configure, optimize, manage and troubleshoot firewall environments built around Cisco ASA 5500-X firewalls with Firepower Services. Learn more details about Cisco ASA Firewalls with Firepower Services configuration and debugging services.
  • Other Firewall and Virtual Private Network Solutions
    As well as supporting a wide array of security technologies available from Microsoft and Cisco, Progent can provide small and mid-size businesses expert engineering services for products from other important firewall and Virtual Private Network (VPN) suppliers including:
  • SIEM Security Information and Event Management Solutions
    Security information and event management (SIEM) applications and services are intended to interpret the massive amounts of data represented by security incident records generated by a wide range of sources including network appliances, operating systems, and applications and monitoring tools. SIEM software organizes the security event records from these various sources and creates consolidated reports of security events as required by government regulations and business compliance standards. Progent's GIAC-certified information assurance experts and Cisco CCIE certified network infrastructure experts can help businesses to design, install and operate a SIEM solution that helps them to understand the progress of attacks and comply with security incident reporting requirements. (Visit Progent's SIEM solutions.)
Progent's Security Certifications
Progent's security professionals have earned the most respected certifications available in the security industry. All of these accreditations require extensive testing and demonstrated field background to ensure that candidates have acquired expertise with a significant amount of security knowledge and techniques and can provide advanced solutions to computer networks of any size.
  • Certified Information Security Manager (CISM) Security Consulting Services
    Certified Information Security Manager identifies the basic skills and international standards of performance that information technology security professionals are expected to achieve. CISM offers business management the confidence that those who have earned their certification possess the experience and skill to provide effective security management and consulting support. Progent can provide a CISM support professional to help your organization in critical security disciplines such as information protection governance, risk management, data protection process control, and incident handling support. Read additional information concerning Progent's CISM Security Support Services.

  • Certified Information Systems Security Professionals (CISSP) Security Consulting Expertise
    Progent's Certified Information Systems Security Professionals (CISSPs) are security specialists who have been awarded CISSP certification as a result of verified professional work, extensive study, and formal testing. CISSP Certification recognizes expertise in an international standard for information security. American National Standards Institute has granted the CISSP status official recognition in the area of information security under ISO/IEC 17024. Areas of knowledge covered within CISSP include security management procedures, security architecture and test systems, access permission methodology, applications development security, business processes security, physical security, cryptography, telecommunications, network security, and disaster recovery planning. Read more information concerning Progent's Certified Information Systems Security Professionals (CISSP) Support Assistance.

  • Information Systems Security Architecture Professionals (ISSAP) Engineering Support
    Progent's ISSAP qualified security consultants are consultants who have been awarded ISSAP status after rigorous examination and extensive experience. field experience with network security architecture. ISSAP security experts have comprehensive understanding of access control systems and methodologies, telecommunications and network protection, cryptography, requirements analysis, business continuity planning (BCP) and disaster recovery planning (DRP), and physical security integration. Progent's ISSAP-qualified security consultants can assist your company with all aspects of architecture security. Get more details concerning Progent's ISSAP Certified Protected IT Architecture Consulting Support.

  • CISA Professional Expertise
    The Certified Information Systems Auditor credential is an important achievement that indicates expertise in network security audit and control. Certified by the American National Standards Institute (ANSI), the CISA accreditation has candidates undergo a comprehensive examination given by the ISACA international professional group. Progent can provide the services of a CISA-qualified security audit consultant able to help businesses in the areas of IS audit services, IT enforcement, systems and infrastructure planned useful life, IT support, protecting information resources, and business continuity planning. Read additional details about Progent's Certified Information Systems Auditor Support Expertise.

  • GIAC (Global Information Assurance Certification) Professional Services
    Global Information Assurance Certification was established in 1999 to validate the knowledge of information technology security engineers. GIAC's goal is to verify that a certified professional possesses the knowledge appropriate to deliver services in key areas of system, data, and application program security. GIAC accreditations are acknowledged by businesses and government organizations throughout the world including and the United States National Security Agency. Progent can provide the assistance of GIAC certified professionals for all of the security disciplines addressed under GIAC certification programs including auditing perimeters, incident handling, intrusion detection, and web-based application security. Get the details about Progent's GIAC Professional Expertise.
Get in Touch with Progent for Network Security Help
If you want security help, telephone Progent at 800-993-9400 or refer to Contact Progent.
















© 2002- 2018 Progent Corporation. All rights reserved.