Overview of Progent's Security and Compliance Support Services
Progent's industry certified network security and compliance experts offer a broad selection of support services intended to help businesses of any size to identify and eliminate security weaknesses, block assaults, recover from any issues resulting from a breakdown of protection, and comply with regulatory mandates for protecting information and reporting security incidents. Progent offers a choice of service models:

  • On-demand online and on-premises assistance billed by the minute
  • Continual managed services billed at an affordable fixed monthly fee
  • Set-price service bundles for a single security evaluation
As-needed Security Consulting Services
After you register for Progent's services (signing up is free), you can receive on-demand online or on-premises assistance from one of Progent security consultant. This traditional support model is essentially reactive and optimized for rapidly taking care of technical problems that are affecting your productivity or that have stymied your in-house support personnel. Typical examples are replacing a firewall or VPN connection, implementing a critical security update for a Cisco switch, designing secure access to a public cloud, or recovering from a ransomware assault. These security services are billed to the nearest minute, which avoids the frustrating case of getting large bills for quick repairs.

Delivery options for Progent's on-demand support services include:

  • Online Security Services
    The majority security issues can be resolved online via a mix of phone help and a remote connection between Progent's Technical Response Center (TRC) and a customer's network. Progent's Technical Response Center can deliver remote security help by offering efficient access to consultants who have the background and resources to fix some of the most challenging issues quickly, making your support expenses low and minimizing downtime.
  • On-premises Security Support Services
    For instances where onsite support is required, Progent can dispatch a technical expert to major cities across the U.S. Progent can also dispatch a security specialist with high-level certifications and advanced skills to any location in the U.S.
Progent's security engineers are certified to support systems based on Microsoft Windows, Linux, Mac, Solaris, and popular versions of UNIX. Progent's wide array of consulting services addresses firewall configuration, e-mail systems, secure network design, and data recovery. Progent's technical support team has earned the world's most advanced security certifications including Certified Information Security Manager and Certified Information Systems Security Professional. Progent also can provide immediate access to online Cisco-certified CCIE network engineers who can deliver advanced assistance with tough network integration issues.

ProSight Fixed-price Managed Services for Information Assurance
Progent's affordable ProSight family of managed services is intended to provide small and mid-size organizations with enterprise-class support and state-of-the-art technology for all aspects of information assurance and compliance. ProSight managed services offered by Progent include:

  • ProSight Email Guard: Inbound and Outbound Spam Filtering, Data Leakage Protection and Content Filtering
    ProSight Email Guard is Progent's email security solution that uses the services and infrastructure of top information security companies to deliver centralized control and world-class protection for all your inbound and outbound email. The hybrid architecture of Progent's Email Guard managed service combines cloud-based filtering with a local gateway appliance to provide advanced protection against spam, viruses, Denial of Service (DoS) Attacks, Directory Harvest Attacks, and other email-borne threats. The cloud filter acts as a preliminary barricade and keeps the vast majority of unwanted email from making it to your security perimeter. This decreases your exposure to inbound threats and saves network bandwidth and storage space. Email Guard's onsite gateway device provides a further level of analysis for incoming email. For outgoing email, the local security gateway offers anti-virus and anti-spam protection, DLP, and email encryption. The local gateway can also assist Microsoft Exchange Server to track and safeguard internal email traffic that stays within your corporate firewall. Learn more about Progent's ProSight Email Guard spam filtering, virus defense, email content filtering and data leakage prevention.

  • ProSight Active Security Monitoring (ASM): Endpoint Protection and Ransomware Recovery
    Progent's ProSight Active Security Monitoring is an endpoint protection (EPP) service that incorporates next generation behavior machine learning technology to defend endpoint devices as well as servers and VMs against modern malware attacks like ransomware and email phishing, which routinely escape traditional signature-based AV products. ProSight ASM safeguards local and cloud resources and provides a single platform to address the complete malware attack lifecycle including blocking, identification, containment, cleanup, and forensics. Top capabilities include one-click rollback using Windows Volume Shadow Copy Service and automatic network-wide immunization against newly discovered threats. Learn more about Progent's ProSight Active Security Monitoring next-generation endpoint protection and ransomware defense.

  • ProSight Data Protection Services: Managed Cloud Backup
    ProSight Data Protection Services from Progent provide small and mid-sized organizations an affordable and fully managed solution for secure backup/disaster recovery (BDR). Available at a low monthly rate, ProSight Data Protection Services automates and monitors your backup activities and allows rapid restoration of critical files, apps and virtual machines that have become lost or damaged as a result of component failures, software bugs, disasters, human error, or malicious attacks such as ransomware. ProSight DPS can help you protect, retrieve and restore files, folders, apps, system images, as well as Hyper-V and VMware virtual machine images. Critical data can be backed up on the cloud, to an on-promises storage device, or to both. Progent's cloud backup consultants can provide advanced expertise to set up ProSight Data Protection Services to to comply with government and industry regulatory requirements such as HIPPA, FINRA, and PCI and, when needed, can help you to recover your business-critical information. Learn more about ProSight DPS Managed Cloud Backup.

  • ProSight WAN Watch: Infrastructure Remote Monitoring and Management
    ProSight WAN Watch is a network infrastructure management service that makes it simple and affordable for small and mid-sized organizations to map, monitor, reconfigure and troubleshoot their networking hardware such as routers and switches, firewalls, and access points as well as servers, endpoints and other devices. Using state-of-the-art Remote Monitoring and Management (RMM) technology, ProSight WAN Watch makes sure that network maps are always updated, copies and displays the configuration of almost all devices connected to your network, monitors performance, and generates notices when problems are discovered. By automating tedious network management processes, ProSight WAN Watch can cut hours off common chores like making network diagrams, expanding your network, finding appliances that require critical software patches, or identifying the cause of performance problems. Learn more about ProSight WAN Watch infrastructure management consulting.

  • ProSight LAN Watch: Server and Desktop Remote Monitoring
    ProSight LAN Watch is Progentís server and desktop remote monitoring service that uses state-of-the-art remote monitoring and management techniques to help keep your IT system operating at peak levels by checking the state of critical computers that drive your business network. When ProSight LAN Watch uncovers an issue, an alarm is transmitted automatically to your designated IT management staff and your Progent engineering consultant so any looming problems can be addressed before they have a chance to disrupt productivity Learn more details about ProSight LAN Watch server and desktop monitoring consulting.

  • ProSight Virtual Hosting: Hosted Virtual Machines at Progent's Tier III Data Center
    With ProSight Virtual Hosting service, a small organization can have its key servers and applications hosted in a protected Tier III data center on a high-performance virtual machine host set up and managed by Progent's IT support professionals. Under the ProSight Virtual Hosting model, the client retains ownership of the data, the operating system software, and the apps. Because the system is virtualized, it can be ported immediately to a different hosting solution without a lengthy and technically risky configuration process. With ProSight Virtual Hosting, you are not locked into one hosting service. Learn more about ProSight Virtual Hosting services.

  • ProSight IT Asset Management: Network Documentation Management
    ProSight IT Asset Management service is a cloud-based IT documentation management service that allows you to capture, update, retrieve and safeguard data related to your IT infrastructure, procedures, business apps, and services. You can instantly locate passwords or serial numbers and be alerted about upcoming expirations of SSL certificates or warranties. By cleaning up and organizing your IT documentation, you can save up to 50% of time wasted searching for vital information about your IT network. ProSight IT Asset Management includes a centralized location for holding and sharing all documents related to managing your network infrastructure such as standard operating procedures (SOPs) and self-service instructions. ProSight IT Asset Management also supports a high level of automation for collecting and associating IT data. Whether youíre making enhancements, performing maintenance, or reacting to a crisis, ProSight IT Asset Management gets you the knowledge you need when you need it. Find out more details about ProSight IT Asset Management service.
ProSight Network Audits
Progent's ProSight Network Audits offer a fast and affordable alternative for small and mid-size businesses to get an objective assessment of the health of their network. Powered by some of the leading remote monitoring and management (RMM) tools available, and supervised by Progent's world-class team of information technology professionals, ProSight Network Audits help you see how well the configuration of your core network assets adhere to industry leading practices. The Basic and Advanced versions of ProSight Network Audit services are offered at a budget-friendly, one-time cost and deliver immediate ROI like a cleaner Active Directory (AD) environment. Both versions also include one year of cutting-edge remote network monitoring and management. Benefits can include lower-cost management, better compliance with information security requirements, higher utilization of IT assets, faster troubleshooting, more dependable backup and restore, and increased uptime. Learn more about ProSight Network Audits network infrastructure review.

Set-price Security Assessment and Verification Bundles
Progent has put together a variety of fixed-price security assessment bundles that provide high value by deploying Progent's advanced system monitoring and analysis tools plus Progent's technical experience to produce an unbiased and comprehensive evaluation of your network security posture.

  • Security Inventory Service Packages for Small Businesses
    Progent offers two value-priced security inventory packages intended to allow small businesses to obtain a professional security evaluation from a certified security engineer. With Progent's External Security Inventory Scan, a consultant manages an extensive examination of your IT system from outside your corporate firewall to determine possible risks in the security profile you expose to the public. With Progent's Internal Security Inventory Scan, a security expert executes a network scan using an authorized machine inside your corporate firewall to evaluate your exposure to internal attacks. These two security inventory services are configured and run from a secured external site. The project is administered by an engineer who has earned advanced security certifications and who produces a report that describes and evaluates the information captured by the scan and suggests various improvements where appropriate.
  • Security Vulnerability Evaluation Packages for Large Organizations
    Progent offers three levels of set-price security assessment service packages intended for large organizations who need to meet security standards required by state or industry agencies. Progent's security assessment service packages offer larger businesses an opportunity to obtain a professional look at the viability of their security posture. For every security evaluation package, Progent consultants with advanced security credentials analyze and report on collected data and provide recommendations for cost-effective improvements. Each of the network security assessment bundles include an added-cost option for onsite consultants at any location in the United States.
  • Stealth Penetration Testing Services
    Stealth penetration testing, often called PEN testing, is a critical tool for allowing businesses to find out how open their IT environments are to current-generation threats. Progent's stealth penetration testing services check how effectively your corporate security policies and platforms stand up to authorized but unannounced penetration attempts managed by Progent's veteran security experts utilizing cutting-edge hacking techniques. Read about Progent's stealth penetration testing (PEN Test) services.
Our System Has Been Hacked: What Can We Do?
Network Security ConsultantsIf your company is currently fighting a security crisis and you have no detailed response procedure, visit Progent's Online Computer Support to learn how to receive immediate assistance. Progent provides remote assistance from skilled engineers and can escalate problems to high-level security specialists if required. Your organization does not need to be a registered Progent customer to get emergency support for a security problem, but you can register as a Progent client in advance at no cost and your status as a registered customer could save valuable time in case of a crisis.

Usually, smaller companies have not documented a recovery plan in case of a successful attack. This is not good, since the damage from a serious security assault can be more catastrophic for a small company than for a large corporation. Progent's security consultants can assist your you to create a practical response and event reporting plan that reduces the network downtime resulting from a security breach. The formal incident response model outlined by GIAC is Progent's preferred method for reacting to a serious security attack.

Advanced Security Expertise Available from Progent
Progent's security engineers can provide expertise in vital areas of computer security such as:

  • Vulnerability Evaluation and Security Compliance Testing
    Progent provides expertise with security evaluation utilities such as Microsoft Baseline Security Analyzer and LANguard from GFI for conducting a set of comprehensive network scans to identify possible security holes. Progent has broad experience with scanning tools and can help you to analyze assessment reports and respond efficiently. Progent's certified security engineers also provide web software testing and can perform expert assessments of corporate-wide security to validate your company's compliance with key global security standards including FISMA, PCI, and ISO. Also, Progent can assess the effectiveness of your wireless protection including fixed wireless appliances as well as portable devices. Read additional information concerning Progent's Information Risk Audits and Compliance Assessment.
  • Designing, Building, and Testing Secure Networks
    Any company ought to develop a carefully considered security strategy that incorporates both proactive and reactive activity. The pre-attack strategy is a set of steps that helps to minimize security holes. The post-attack plan defines activities to help IT staff to evaluate the damage resulting from a breach, remediate the damage, record the experience, and restore business functions as quickly as feasible. Progent can show you how to design security into your company processes, configure auditing software, define and execute a safe computer infrastructure, and propose procedures and policies that will optimize the safety of your computing environment. Progent's security professionals are available to help you to set up a firewall, deploy safe online and mobile connectivity to email and files, and configure an efficient virtual private network (VPN). If you are interested in an affordable option for jobbing out your network security management, Progent's 24x7 Network Support Packages feature non-stop remote network monitoring and quick resolution of emergencies.
  • System Recovery and Security Forensics
    Progent has skill in recovering systems and devices that have been compromised, are in question, or have failed because of a security penetration. Progent can show you how to determine the damage caused by the attack, restore ordinary business operations, and recover information lost as a result of the event. Progent's certified engineers can also manage a comprehensive forensic analysis by going over activity logs and using other advanced assessment techniques. Progent's background with security problems reduces your business disruption and allows Progent to suggest efficient strategies to prevent or contain new assaults.
  • Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Firewalls, and PIX Security Appliances Configuration and Debugging
    Cisco CCIE Network Security ConsultantsThe new Cisco ASA 5500-X Series Next-Generation Firewalls with Firepower Services offer substantially more value than Cisco's earlier PIX and ASA 5500 firewalls and have replaced the ASA 5500 and PIX security appliances for all new installations. Following Cisco's acquisition of Sourcefire, the whole line of Cisco ASA 5500-X devices can be provisioned to enable Firepower Services, based on Sourcefire's Snort technology, which is the market's most deployed intrusion protection system. Firepower services provide enhanced capabilities such as advanced malware protection (AMP), URL filtering, dynamic threat analytics, and automation. Progent's Cisco-qualified CCIE network experts can assist your company to maintain your existing PIX or Cisco ASA 5500 firewalls and migrate efficiently to ASA 5500-X firewalls with Firepower Services. Progent's consultants can provide online and on-premises support for ASA 5500-X firewalls with Firepower Services and can help your organization to plan, deploy, tune, administer and troubleshoot firewall solutions built around Cisco ASA 5500-X firewalls with Firepower Services. Read more details about Cisco ASA 5500-X Firewalls with Firepower Services configuration and debugging services.
  • Other Firewall and Virtual Private Network Solutions
    As well as being expert in a wide array of security solutions from Microsoft and Cisco, Progent offers small and mid-size companies expert support for products from other important firewall and VPN vendors including:
  • SIEM Security Information and Event Management Solutions
    Security information and event management (SIEM) software and services are designed to digest the enormous amounts of information represented by security incident logs created by a wide range of sources such as network infrastructure appliances, operating systems, and applications and tools. SIEM applications analyzes the security event records from these various sources and creates consolidated reports of security events as mandated by government regulations and business compliance standards. Progent's GIAC-certified information assurance consultants and Cisco-certified network infrastructure consultants can assist organizations to plan, install and manage a SIEM solution that enables them to see the behavior of attacks and comply with security incident reporting regulations. (See Progent's Security information and Event Management (SIEM) solutions.)
Progent's Security Credentials
Progent's security engineers have earned the most prestigious accreditations available in the industry. All of these accreditations require exhaustive testing and proven work experience to guarantee that candidates have mastered a significant body of security knowledge and techniques and can offer advanced solutions to information networks of any complexity.
  • Certified Information Security Manager Security Consulting Services
    Certified Information Security Manager (CISM) defines the fundamental competencies and worldwide benchmarks of performance that information security managers are required to master. It provides executive management the confidence that those who have earned their CISM have the experience and skill to offer efficient security administration and engineering services. Progent can provide a CISM expert to help your organization in critical security areas including information protection governance, risk assessment, data security program management, and incident response support. Get more details concerning Progent's CISM Security Support Services.

  • CISSP Security Support Expertise
    Progent's Certified Information Systems Security Professionals (CISSPs) are security specialists who have earned CISSP status as a result of demonstrated experience, extensive study, and exhaustive examination. CISSP Certification recognizes expertise in an international standard for IT security. American National Standards Institute has granted the CISSP status accreditation in the field of information security under ISO/IEC 17024. Fields of expertise covered under CISSP include security administration practices, security design and models, connection control methodology, software development security, business processes security, hardware security, encryption, telecommunications, network security, and disaster recovery planning. Get additional information about Progent's CISSP Support Assistance.

  • Information Systems Security Architecture Professionals (ISSAP) Engineering Services
    Progent's ISSAP certified security experts are experts who have earned ISSAP certification after thorough examination and significant experience. field experience with network security architecture. ISSAP security experts possess in-depth understanding of access management systems and techniques, telecommunications and network security, cryptography, requirements analysis, business continuity and DRP, and physical security integration. Progent's ISSAP-qualified security consultants can assist your business with all aspects of architecture security. Find out additional information about Progent's ISSAP Certified Secure IT Architecture Consulting Services.

  • CISA Consulting Expertise
    The Certified Information Systems Auditor (CISA) accreditation is a prestigious achievement that signifies expertise in information system security audit and control. Certified by the American National Standards Institute (ANSI), the CISA accreditation has candidates pass a comprehensive test administered by the ISACA professional group. Progent offers the services of a CISA-certified security consultant trained to assist businesses in the fields of IS audit services, IT governance, systems and architecture lifecycle, information technology service delivery, safeguarding information resources, and disaster recovery preparedness. Get more details about Progent's Certified Information Systems Auditor (CISA) Support Services.

  • Global Information Assurance Certification Support Expertise
    GIAC (Global Information Assurance Certification) was established in 1999 to certify the skill of information technology security experts. GIAC's mission is to assure that an accredited security consultant has the knowledge necessary to provide support in critical categories of system, data, and software security. GIAC accreditations are recognized by businesses and government organizations all over the world including and the U.S. National Security Agency. Progent offers the help of GIAC certified security engineers for all of the network security services covered within GIAC certification programs including auditing security systems, incident handling, intrusion detection, and web application security. Learn the details concerning Progent's GIAC (Global Information Assurance Certification) Professional Assistance.
Get in Touch with Progent for Computer Security Help
If you're trying to find computer security consulting, phone Progent at 800-993-9400 or visit Contact Progent.
















© 2002- 2018 Progent Corporation. All rights reserved.