Overview of Progent's Security and Compliance Consulting Services
Progent's certified computer security experts can provide a wide selection of services designed to assist companies of any size to detect and correct security weaknesses, defend against malicious attacks, recover from any problems resulting from a breakdown of protection, and meet regulatory requirements for guarding information and reporting security incidents. Progent can provide a choice of service models:

  • On-demand online and on-premises assistance invoiced by the minute
  • Continual managed services billed at a low flat monthly fee
  • Set-price service bundles for a one-time security evaluation
On-demand Security Consulting Services
Once you register for Progent's services (signing up is free), you can get as-needed online or on-premises assistance from one of Progent security consultant. This classic service model is primarily reactive and geared toward rapidly resolving technical problems that are impacting your productivity or that are beyond the scope of your in-house support personnel. Typical examples are debugging a firewall appliance or VPN connection, installing a critical security patch for a Cisco switch, designing secure access to a public cloud, or restoring data after a ransomware assault. These services are invoiced by the minute, which eliminates the frustrating case of getting big invoices for quick fixes.

Delivery alternatives for Progent's as-needed support include:

  • Remote Security Support
    Most security problems can be handled online through a combination of phone help and an Internet connection between Progent's Technical Response Center (TRC) and a client's network. Progent's TRC group can deliver remote security support by offering easy access to consultants who have the background and resources to resolve some of the most challenging issues quickly, making your service expenses low and reducing lost productivity.
  • On-premises Security Services
    For instances where onsite support is necessary, Progent can send a technical professional to major metropolitan areas across the United States. Progent can also dispatch a security consultant with top certifications and advanced skills to any location in the U.S.
Progent's security consultants are certified to support systems powered by Windows, Linux, Mac, Solaris, and popular derivatives of UNIX. Progent's wide range of services addresses firewall technology, e-mail security, protected network design, and data restoration. Progent's technical support staff has been awarded the world's most advanced security certifications including GIAC and ISSAP. Progent also offers immediate access to online Cisco CCIE network engineers who can deliver world-class assistance with tough network integration problems.

ProSight Fixed-price Managed Services for Information Assurance
Progent's affordable ProSight portfolio of network management outsourcing services is intended to provide small and mid-size businesses with enterprise-class support and cutting-edge technology for all facets of information assurance and compliance. Managed services available from Progent include:

  • ProSight Active Security Monitoring (ASM): Next Generation Endpoint Protection and Ransomware Defense
    ProSight Active Security Monitoring is an endpoint protection service that incorporates cutting edge behavior-based machine learning tools to defend endpoints and servers and VMs against new malware assaults like ransomware and email phishing, which easily escape legacy signature-matching AV tools. ProSight ASM protects local and cloud resources and provides a single platform to address the entire threat lifecycle including blocking, detection, containment, remediation, and forensics. Key features include single-click rollback with Windows Volume Shadow Copy Service and real-time system-wide immunization against newly discovered threats. Find out more about Progent's ProSight Active Security Monitoring endpoint protection and ransomware defense.

  • ProSight Enhanced Security Protection: Unified Endpoint Protection
    ProSight Enhanced Security Protection (ESP) services deliver ultra-affordable in-depth protection for physical servers and VMs, desktops, mobile devices, and Exchange Server. ProSight ESP uses contextual security and advanced machine learning for continuously monitoring and reacting to cyber threats from all attack vectors. ProSight ESP delivers firewall protection, intrusion alarms, endpoint management, and web filtering through cutting-edge tools packaged within one agent accessible from a unified control. Progent's security and virtualization experts can assist you to design and configure a ProSight ESP environment that meets your organization's specific requirements and that helps you achieve and demonstrate compliance with government and industry information protection standards. Progent will assist you specify and configure policies that ProSight ESP will enforce, and Progent will monitor your network and respond to alarms that require immediate attention. Progent's consultants can also assist you to set up and test a backup and restore solution such as ProSight Data Protection Services (DPS) so you can recover rapidly from a potentially disastrous cyber attack like ransomware. Read more about Progent's ProSight Enhanced Security Protection unified physical and virtual endpoint security and Microsoft Exchange filtering.

  • ProSight Data Protection Services: Managed Cloud Backup and Recovery
    ProSight Data Protection Services from Progent provide small and mid-sized businesses an affordable and fully managed service for reliable backup/disaster recovery. Available at a low monthly rate, ProSight DPS automates and monitors your backup activities and allows fast recovery of critical files, apps and VMs that have become unavailable or damaged as a result of component failures, software bugs, disasters, human error, or malware attacks like ransomware. ProSight Data Protection Services can help you protect, recover and restore files, folders, applications, system images, plus Hyper-V and VMware virtual machine images. Important data can be protected on the cloud, to a local device, or to both. Progent's cloud backup specialists can provide advanced support to set up ProSight DPS to be compliant with regulatory requirements like HIPPA, FIRPA, and PCI and, whenever necessary, can help you to restore your critical data. Learn more about ProSight DPS Managed Backup and Recovery.

  • ProSight Email Guard: Inbound and Outbound Spam Filtering, Data Leakage Protection and Content Filtering
    ProSight Email Guard is Progent's email security platform that uses the technology of top data security vendors to deliver web-based management and world-class security for all your email traffic. The powerful architecture of Email Guard integrates cloud-based filtering with an on-premises security gateway device to provide advanced protection against spam, viruses, Denial of Service (DoS) Attacks, Directory Harvest Attacks (DHAs), and other email-based threats. Email Guard's Cloud Protection Layer acts as a first line of defense and blocks most unwanted email from reaching your security perimeter. This reduces your exposure to external attacks and conserves network bandwidth and storage. Email Guard's onsite gateway device provides a further layer of inspection for inbound email. For outgoing email, the on-premises gateway provides anti-virus and anti-spam filtering, policy-based Data Loss Prevention, and encryption. The local security gateway can also help Microsoft Exchange Server to monitor and protect internal email that originates and ends inside your corporate firewall. Find out more about Progent's ProSight Email Guard spam filtering, virus defense, email content filtering and data loss protection.

  • ProSight WAN Watch: Infrastructure Management
    Progentís ProSight WAN Watch is an infrastructure management service that makes it simple and inexpensive for smaller organizations to diagram, monitor, enhance and troubleshoot their networking appliances like routers, firewalls, and wireless controllers as well as servers, printers, client computers and other networked devices. Incorporating state-of-the-art Remote Monitoring and Management (RMM) technology, ProSight WAN Watch makes sure that infrastructure topology maps are always current, captures and displays the configuration information of virtually all devices connected to your network, monitors performance, and sends notices when potential issues are detected. By automating complex management and troubleshooting activities, WAN Watch can cut hours off common chores like making network diagrams, reconfiguring your network, locating devices that need critical updates, or isolating performance bottlenecks. Learn more about ProSight WAN Watch infrastructure monitoring and management consulting.

  • ProSight LAN Watch: Server and Desktop Monitoring and Management
    ProSight LAN Watch is Progentís server and desktop remote monitoring managed service that incorporates advanced remote monitoring and management technology to keep your network operating at peak levels by checking the state of critical assets that drive your information system. When ProSight LAN Watch detects a problem, an alert is transmitted automatically to your specified IT management personnel and your assigned Progent engineering consultant so all potential issues can be resolved before they have a chance to disrupt your network Find out more details about ProSight LAN Watch server and desktop remote monitoring services.

  • ProSight Virtual Hosting: Hosted VMs at Progent's World-class Data Center
    With ProSight Virtual Hosting service, a small or mid-size organization can have its critical servers and applications hosted in a protected Tier III data center on a fast virtual machine host set up and managed by Progent's network support professionals. Under the ProSight Virtual Hosting service model, the customer owns the data, the OS software, and the apps. Since the environment is virtualized, it can be moved easily to a different hosting environment without requiring a time-consuming and difficult reinstallation procedure. With ProSight Virtual Hosting, your business is not locked into one hosting provider. Learn more details about ProSight Virtual Hosting services.

  • ProSight IT Asset Management: Network Infrastructure Documentation Management
    Progent's ProSight IT Asset Management service is a cloud-based IT documentation management service that makes it easy to create, maintain, retrieve and safeguard data about your IT infrastructure, processes, business apps, and services. You can instantly find passwords or serial numbers and be warned about impending expirations of SSL certificates or warranties. By cleaning up and organizing your IT infrastructure documentation, you can save up to half of time wasted looking for vital information about your network. ProSight IT Asset Management features a common repository for holding and sharing all documents related to managing your network infrastructure such as standard operating procedures (SOPs) and How-To's. ProSight IT Asset Management also offers a high level of automation for gathering and relating IT data. Whether youíre planning enhancements, performing maintenance, or reacting to a crisis, ProSight IT Asset Management gets you the knowledge you need when you need it. Find out more about ProSight IT Asset Management service.
ProSight Network Audits
Progent's ProSight Network Audits are a quick and affordable alternative for small and medium-size businesses to obtain an unbiased assessment of the overall health of their network. Powered by a selection of the leading remote monitoring and management (RMM) tools in the industry, and overseen by Progent's world-class team of IT experts, ProSight Network Audits show you how closely the deployment of your essential infrastructure devices adhere to best practices. The Basic and Advanced options for ProSight Network Audit services are offered at a low, one-time cost and provide instant ROI such as a more manageable Active Directory (AD) environment. Both versions also come with a year of cutting-edge remote network monitoring and management. Benefits can include simpler management, better compliance with government and industry security requirements, more efficient utilization of IT resources, faster problem resolution, more dependable backup and restore, and increased uptime. Learn more information about Progent's ProSight Network Audits IT infrastructure review.

Progent's ProSight Ransomware Preparedness Report
The ProSight Ransomware Preparedness Report service is an affordable service based on a brief discussion with a Progent information assurance consultant. The interview is intended to evaluate your organization's preparedness to block or recover quickly after a ransomware attack. Progent will consult with you directly to gather information concerning your existing AV defense and backup/recovery platform, and Progent will then produce a custom Basic Security and Best Practices Report detailing how you can follow best practices to build a cost-effective security and backup environment that meets your company's requirements. For more information, refer to Progent's ProSight Ransomware Preparedness Report Service.

Set-price Security Evaluation and Validation Packages
Progent offers a number of flat-rate security and compliance evaluation bundles that deliver exceptional value by utilizing Progent's enterprise-class network monitoring software plus Progent's consulting skills to produce an unbiased and comprehensive evaluation of your network security posture.

  • Security Assessment Service Packages for Small Organizations
    Progent offers two value-priced security inventory service packages designed to enable small organizations to get an objective security evaluation from an accredited security engineer. With Progent's External Security Inventory Scan, a consultant manages an extensive assessment of your IT system from outside your firewalled perimeter to identify potential gaps in the security profile you present to the public. With Progent's Internal Security Inventory Scan, a security expert runs a network scan using an authorized machine within your firewalled perimeter to assess your vulnerability to inside threats. The two security inventory services are set up and run from a secured offsite location. The project is administered by a consultant who has been awarded high-level security certifications and who creates a report that describes and evaluates the information collected by the security scan and recommend various enhancements where appropriate.
  • Security Vulnerability Assessment Bundles for Enterprises
    Progent has developed three levels of flat-rate security evaluation service packages designed for large organizations who want to meet compliance standards required by government or industry agencies. Progent's security assessment service packages offer larger organizations a chance to obtain a professional look at the strength of their security profile. For each security assessment bundle, Progent engineers with advanced security credentials study and report on collected data and provide recommendations for cost-effective remediation. Each of the network security audit packages include an extra-cost option for onsite engineers at any location in the United States.
  • Stealth Penetration Testing Services
    Stealth penetration testing, often referred to as PEN testing, is a vital technique for allowing businesses to find out how open their IT systems are to modern threats. Progent's stealth penetration testing services test how effectively your corporate security procedures and technologies resist authorized but unannounced penetration attempts launched by Progent's experienced security specialists utilizing cutting-edge hacking techniques. Find out about Progent's stealth penetration testing services.
Our System Has Been Hacked: What Are We Supposed to Do Now?
Network Security ConsultantsIf your company is currently experiencing a network security crisis and you have no formal recovery procedure, visit Progent's Online Computer Support to see how to get immediate help. Progent provides online technical support from experienced network technicians and can escalate problems to high-level security specialists if required. Your company does not have to be a registered Progent client to receive emergency help for a security problem, but you can register as a Progent client in advance at no cost and your status as a current client could save valuable time during an emergency.

Typically, smaller organizations have no response plan in the event of a damaging penetration. This is not good, because the cost of a serious security attack can be even more catastrophic for a small company than for a big enterprise. Progent's security specialists can assist your company to design an efficient response and event reporting plan that minimizes the network disruption resulting from a security breach. The formal incident handling procedure promoted by GIAC is Progent's recommended method for handling a serious security incident.

High-value Security Expertise Offered by Progent
Progent's certified security engineers offer specialized help in vital areas of computer protection including:

  • Vulnerability Audits and Security Compliance Testing
    Progent offers experience with information risk auditing utilities such as MS Baseline Security Analyzer or LANguard for conducting a variety of comprehensive system tests to uncover potential security problems. Progent has broad experience with monitoring tools and can assist your company to understand assessment reports and respond efficiently. Progent's security engineers also can perform web application validation and can conduct expert assessments of enterprise-wide security to determine your organization's compliance with key global security specifications including FISMA, PCI, and ISO 17799. In addition, Progent can evaluate the strength of your wireless security including fixed wireless appliances plus mobile handsets. Read additional details about Progent's Information Risk Evaluation and Compliance Testing.
  • Planning, Implementing, and Validating Secure Environments
    Every organization ought to have a carefully considered security plan that includes both proactive and responsive activity. The proactive plan is a set of steps that helps to reduce vulnerabilities. The reactive plan specifies procedures to assist IT staff to assess the damage caused by a breach, repair the damage, document the event, and revive network activity as quickly as possible. Progent can show you how to design security into your business processes, set up auditing utilities, define and execute a secure computer architecture, and propose processes and policies that will optimize the safety of your computing environment. Progent's security experts are available to help you to configure a firewall, design protected offsite access to e-mail and data, and configure an effective virtual private network (VPN). If you are interested in an economical option for jobbing out your network security administration, Progent's 24x7 Monitoring Options feature non-stop remote server tracking and quick response to problems.
  • Data Recovery and Failure Analysis
    Progent offers skill in recovering networks and devices that have been hacked, are quarantined, or have stopped working because of a security penetration. Progent can show you how to determine the losses caused by the breach, restore normal functions, and recover information compromised as a result of the breach. Progent's security engineers can also manage a comprehensive failure analysis by going over event logs and utilizing other advanced assessment tools. Progent's experience with security issues reduces your downtime and allows Progent to propose efficient ways to avoid or mitigate future assaults.
  • Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Firewalls, and PIX 500 Security Appliances Integration and Debugging
    Cisco Certified CCIE Security ExpertsThe new Cisco ASA 5500-X Series Next-Generation Firewalls with Firepower Services deliver significantly more bang for the buck than Cisco's earlier PIX and ASA 5500 firewalls and have replaced the ASA 5500 and PIX security appliances for new installations. Since Cisco's purchase of Sourcefire, the whole family of ASA 5500-X devices can be provisioned to enable Firepower Services, based on Sourcefire's Snort technology, which is the market's most popular intrusion protection system (IPS). Firepower services provide enhanced features including advanced malware protection (AMP), URL filtering, real-time threat analytics, and security automation. Progent's Cisco-certified CCIE network experts can help your company to manage your current PIX or ASA 5500 firewalls or upgrade to Cisco ASA 5500-X firewalls with Firepower Services. Progent's consultants offer remote and on-premises help with ASA 5500-X firewalls with Firepower Services and can assist your business to design, integrate, optimize, manage and debug firewall environments built around Cisco ASA 5500-X firewalls with Firepower Services. See additional details about Cisco ASA 5500-X Firewalls with Firepower Services configuration and debugging services.
  • Other Firewall and Virtual Private Network Consulting Services
    As well as being expert in a broad range of security technologies available from Microsoft and Cisco, Progent can provide small and mid-size organizations expert consulting for solutions from other major firewall and Virtual Private Network suppliers including:
  • SIEM Security Information and Event Management Integration and Support
    Security information and event management (SIEM) software and services are designed to digest the enormous quantity of data represented by security event logs created by a wide range of sources including network appliances, servers, and application software and monitoring tools. SIEM applications analyzes the security logs from these diverse sources and produces consolidated reports of security events as required by state regulations and industry compliance guidelines. Progent's GIAC-certified computer security experts and Cisco CCIE certified network consultants can assist organizations to design, install and operate a SIEM system that helps them to understand the behavior of attacks and comply with event reporting regulations. (Visit Progent's SIEM solutions.)
Progent's Security Accreditations
Progent's security consultants have earned some of the most prestigious accreditations available in the industry. All of these certifications demand extensive testing and proven field background to guarantee that recipients have mastered a substantial body of security information and methodologies and can offer high-level security solutions to computer networks of any size.
  • Certified Information Security Manager (CISM) Security Support Services
    Certified Information Security Manager identifies the basic competencies and worldwide benchmarks of service that IT security managers are expected to achieve. It offers executive management the assurance that consultants who have been awarded their certification have the background and knowledge to provide effective security management and engineering support. Progent can provide a CISM support professional to help your organization in key security disciplines including data protection governance, vulnerability assessment, information protection program control, and crisis response support. Get more information concerning Progent's Certified Information Security Manager (CISM) Security Support Assistance.

  • CISSP Security Support Services
    Progent's CISSP consultants are security engineers who have been awarded CISSP certification through demonstrated experience, extensive study, and formal testing. CISSP qualification indicates expertise in an international standard for IT security. American National Standards Institute has granted the CISSP status accreditation in the area of IT security under ISO/IEC 17024. Fields of expertise included within CISSP include security management procedures, security architecture and models, access control systems, applications development security, business processes security, hardware security, encryption, telecommunications, Internet security, and business continuity planning. Get the details about Progent's CISSP Support Assistance.

  • ISSAP Engineering Support
    Progent's ISSAP certified security consultants are experts who have been awarded ISSAP status after thorough examination and substantial hands-on work with information security architecture. ISSAP consultants have comprehensive understanding of access control systems and methodologies, telecommunications and network infrastructure protection, cryptography, needs evaluation, business continuity planning (BCP) and disaster recovery, and physical security. Progent's ISSAP-certified security specialists can help your company with all aspects of architecture security. Get the details about Progent's ISSAP Certified Protected Network Infrastructure Consulting Support.

  • Certified Information Systems Auditor Professional Expertise
    The CISA accreditation is an important achievement that represents expertise in IS security audit and control. Certified by the American National Standards Institute (ANSI), the CISA accreditation has consultants pass an extensive examination given by the ISACA international professional group. Progent offers the services of a CISA-qualified security consultant trained to help companies in the fields of IS audit process, IT governance, systems and architecture planned useful life, information technology service delivery, protecting information resources, and disaster recovery planning. Get additional details about Progent's Certified Information Systems Auditor Professional Assistance.

  • GIAC (Global Information Assurance Certification) Consulting Services
    GIAC was established in 1999 to validate the skill of IT security professionals. GIAC's mission is to assure that a certified professional has the skills necessary to provide support in vital areas of system, data, and software security. GIAC certifications are acknowledged by companies and institutions around the world including and the U.S. NSA. Progent can provide the support of certified consultants for any of the network security services addressed within GIAC accreditation topics including assessing IT infrastructure, incident response, intrusion detection, and web-based services security. Read the details about Progent's Global Information Assurance Certification Support Expertise.
Get in Touch with Progent for Network Security Help
If you need security expertise, phone Progent at 800-993-9400 or refer to Contact Progent.
















© 2002- 2018 Progent Corporation. All rights reserved.