Introduction to Progent's Security Consulting Services
Progent's industry certified computer security consultants offer a wide selection of professional services designed to assist organizations of any size to identify and eliminate security vulnerabilities, defend against attacks, remediate the problems resulting from a breakdown of security, and comply with regulatory requirements for reporting incidents. Progent delivers remote and in person support and also offers economical set-price security evaluation packages to supplement Progent's regular by-the-minute billing.

Service delivery options available from Progent are:

  • Remote Security Support Services
    Most security issues can be handled remotely by a mix of telephone support and secure data connections between Progent's Technical Response Center (TRC) and a customer's computer system. Progent's Technical Response service team includes network security engineers with the knowledge and experience and tools to fix even the most challenging issues promptly, making your support expenses reasonable and minimizing lost productivity. Progent offers security support services on a per-minute model with no minimum billing for remote support. Progent's pricing policy eliminates situations where simple fixes turn into big expenses. Progent also offers a number of set-price online security assessment packages that provide extraordinary value by leveraging Progent's advanced security scanning technology as well as Progent's engineering expertise to produce a professional and actionable picture of your network vulnerability.

  • On-premises Security Support Options
    In cases in which on-site support is necessary, Progent can send a service professional to major metropolitan areas throughout the U.S. Progent's certified security consultants are in addition available to help with jobs that require high-level security specialists to be on premises anywhere in the U.S., and Progent's most advanced security evaluation packages for enterprises feature the services of a team of qualified security engineers at your location.

  • Urgent Security Services
    For fast assistance with critical computer security problems, your company can have access to a world-class online troubleshooting specialist by contacting Progent's roster of security engineers at Progent's Technical Response Center. Progent's urgent remote security service consultants are ready to offer effective and affordable help with security crises that are impacting the productivity of your information system. Progent's accredited engineers are qualified to support systems powered by Microsoft, Linux, Apple, Solaris, and major derivatives of UNIX. Progent's wide array of consulting services encompasses firewall technology, email and messaging systems, secure system design, and information recovery. Progent's support team has earned the industry's most advanced security certifications including CISA and ISSAP. Progent also can provide immediate access to remote Cisco CCIE network infrastructure engineers who can provide world-class support with tough network integration problems.

Our Network Has Been Hacked: What Are We Supposed to Do?
Network Security ConsultantsIf your company is now fighting a security crisis and you have no formal recovery procedure, refer to Progent's Remote Network Support to see how to receive fast help. Progent offers remote help from skilled engineers and can escalate trouble tickets to high-level security specialists if required. Your company does not have to be a registered Progent customer to receive urgent support for a security breakdown, but you can register as a Progent client ahead of time at no cost and your status as a registered client can save precious time in case of an emergency.

Typically, smaller organizations have no response plan in the event of a damaging penetration. This is not good, because the damage from a successful security attack can be more devastating for a small company than for a large corporation. Progent's security specialists can assist your company to design a sensible response and incident reporting plan that reduces the network downtime following a security breach. The formal post-attack response model outlined by GIAC (Global Information Assurance Certification) is Progent's preferred procedure for handling a major security attack.

Areas of Progent's Security Consulting Expertise
Managing network security and staying ready for restoring critical information and functions after a security breach requires a continual program that entails a variety of technologies and procedures. Progent's certified professionals can support your business at all levels in your efforts to secure your information system and remain in compliance, Progent's services range from security assessments to creating a complete security program. Important technologies covered by Progent's experts include Security Planning and Implementation, Information Restoration and Security Forensics, plus Outsourced Protection from E-mail-Borne Attacks.

  • Designing, Building, and Validating Protected Networks
    Any company ought to develop a thoroughly considered security plan that incorporates both proactive and responsive activity. The proactive strategy is a set of steps that helps to reduce vulnerabilities. The post-attack plan defines activities to assist IT staff to evaluate the losses caused by a breach, repair the damage, record the experience, and revive network activity as soon as feasible. Progent can show you how to design security into your business operations, configure auditing utilities, define and build a secure IT architecture, and recommend processes and policies to enhance the safety of your information system. Progent's security experts are ready to help you to configure a firewall, design protected online and mobile access to e-mail and data, and configure an efficient virtual private network (VPN). If your company is interested in an affordable option for outsourcing your network security administration, Progent's Round-the-clock Network Support Options include automated remote server monitoring and fast response to emergencies.
  • Data Recovery and Security Forensics
    Progent offers skill in restoring networks and servers that have been compromised, are suspect, or have failed as a result of a security breakdown. Progent can show you how to determine the losses caused by the attack, return your company to ordinary business operations, and retrieve data lost owing to the event. Progent's certified engineers can also manage a thorough failure analysis by examining event logs and utilizing a variety of advanced forensics techniques. Progent's background with security issues reduces your business disruption and allows Progent to suggest efficient measures to prevent or mitigate new assaults.
  • Email Security with Spam Filtering, Virus Defense, Content Filtering, and Data Loss Protection
    Email Guard is Progent's email filtering and encryption platform that uses the services and infrastructure of leading information security companies to deliver web-based management and world-class protection for your email traffic. The powerful structure of Progent's Email Guard combines cloud-based filtering with a local security gateway appliance to provide complete protection against spam, viruses, Denial of Service Attacks, Directory Harvest Attacks, and other email-based malware. Email Guard's cloud filter serves as a first line of defense and blocks the vast majority of threats from reaching your network firewall. This decreases your vulnerability to inbound threats and conserves system bandwidth and storage. Email Guard's onsite security gateway appliance provides a deeper level of analysis for inbound email. For outgoing email, the onsite security gateway provides anti-virus and anti-spam protection, DLP, and encryption. The local gateway can also assist Exchange Server to track and protect internal email that originates and ends inside your corporate firewall. Find out more about Progent's Email Guard Spam Filtering, Virus Defense, Email Content Filtering and Data Leakage Protection.
High-value Security Services Offered by Progent
Progent's certified engineers can provide consulting support in vital areas of network protection such as:
  • Security Vulnerability Audits and Compliance Testing
    Progent offers experience with information risk evaluation utilities such as Microsoft Baseline Security Analyzer and LANguard for performing a set of automatic system tests to reveal possible security problems. Progent has extensive experience with scanning utilities and can help you to analyze audit reports and react efficiently. Progent's certified security engineers also offer web software validation and can perform expert evaluation of corporate-wide security to validate your company's compliance with important worldwide security specifications including HIPAA, NIST, and ISO. Also, Progent can evaluate the effectiveness of your wireless security including stationary wireless appliances as well as mobile devices. Learn additional details concerning Progent's Information Risk Evaluation and Security Compliance Testing.
  • Security Inventory and Evaluation Bundles for Small Businesses
    Progent has put together two low-cost security inventory service bundles intended to enable small companies to receive an independent network security assessment from a qualified security expert. With Progent's External Network Security Inventory Checkup, a security engineer runs a comprehensive test of your network from outside your firewall to uncover potential risks in the security posture you expose to the public. With Progent's Internal Network Security Inventory Scan, a security engineer runs a system scan from a secure computer inside your firewall to uncover vulnerabilities to inside assaults. The two security inventory services are set up and executed from a protected external site. The process is implemented by a consultant who has earned top security accreditations who produces a report that details and analyzes the data captured by the scan and suggests practical improvements where appropriate.
  • Security Assessment Packages for Large Companies
    Progent's certified security consultants can deliver a selection of set-price network security audit service bundles designed for corporations who have to meet security levels required by government regulators or by vendors. Progent's security assessment packages give larger organizations an opportunity to receive a professional look at the effectiveness of their security environment. For every security evaluation bundle, Progent consultants with high-level security accreditations analyze and summarize scanned data and provide recommendations for efficient improvements. The different security assessment packages include an extra-cost alternative for on-premises security engineers anywhere in the U.S.
  • Migrating from ISA Server and Microsoft Forefront Threat Management Gateway 2010
    ISA Server 2006 and its replacement Microsoft Forefront TMG are software solutions that include an application-layer firewall that can guard networks from external and internal attacks. Both of these products provide deep examination of Internet protocols to detect exploits that can get by traditional firewalls. Microsoft Internet Security and Acceleration Server was superseded by Forefront TMG, which is built on ISA Server's technology while delivering a number of enhanced features. Forefront TMG 2010 has in turn been retired by Microsoft, and the security features offered by the platform are now typically taken over by dedicated hardware devices from vendors such as Cisco, Barracuda, Juniper and WatchGuard. (See Cisco ASA Firewall with Firepower Services configuration and management.) Progent offers online Forefront TMG support services and ISA Server 2006 expertise to help you maintain and debug your older firewalls, and Progent can help you to migrate smoothly to a modern security solution by providing system design, integration, tuning, IT staff training and debugging.
  • Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Series Firewalls, and PIX Security Appliances Integration and Troubleshooting
    Cisco CCIE Security EngineersThe current ASA 5500-X Family Next-Generation Firewalls with Firepower Services deliver substantially more value than Cisco's legacy firewalls and have superseded the ASA 5500 and PIX 500 firewalls for new deployments. Since Cisco's acquisition of Sourcefire, the whole line of ASA 5500-X devices can be configured to support Firepower Services, based on Sourcefire's Snort product, which is the world's most deployed intrusion protection system (IPS). Firepower services provide powerful new features such as advanced malware protection (AMP), URL filtering, real-time threat analytics, and automation. Progent's Cisco-certified CCIE network consultants can assist you to maintain your existing PIX or ASA 5500 firewalls or upgrade to ASA 5500-X firewalls with Firepower Services. Progent's consultants offer remote and on-premises help with ASA 5500-X firewalls with Firepower Services and can assist you to plan, configure, tune, manage and debug firewall environments built on Cisco ASA 5500-X firewalls with Firepower Services. See additional details about ASA Firewalls with Firepower integration and troubleshooting services.
  • Additional Firewall and VPN Solutions
    In addition to supporting a wide range of network security solutions from Microsoft and Cisco, Progent can provide small companies expert support for products from other important firewall and Virtual Private Network suppliers such as:
  • SIEM Integration and Support
    Security information and event management (SIEM) software and services are designed to digest the enormous amounts of information represented by security incident records generated by a wide range of sources including network appliances, operating systems, and application software and tools. SIEM applications analyzes the security event records from these diverse sources and produces consolidated reports of security incidents as required by state regulations and industry compliance standards. Progent's GIAC-certified computer security experts and Cisco CCIE certified network consultants can assist businesses to design, install and operate a SIEM system that helps them to see the progress of security incidents and comply with security incident reporting regulations. (See Progent's SIEM solutions.)
Progent's Security Accreditations
Progent's security engineers have earned some of the most prestigious accreditations available in the industry. These accreditations require extensive testing and demonstrated field background to ensure that recipients have acquired expertise with a substantial amount of security information and methodologies and can provide high-level consulting to computer environments of any size.
  • Certified Information Security Manager Security Support Expertise
    CISM defines the basic competencies and international benchmarks of service that IT security professionals are required to master. It offers business management the assurance that consultants who have earned their CISM have the background and knowledge to offer efficient security administration and engineering support. Progent can provide a CISM consultant to assist your organization in critical security disciplines including information security governance, vulnerability management, information protection process control, and crisis response management. Find out the details about Progent's Certified Information Security Manager Security Consulting Expertise.
  • CISSP Security Support Expertise
    Progent's CISSP experts are security specialists who have earned CISSP status as a result of demonstrated professional work, extensive study, and exhaustive testing. CISSP Certification indicates expertise in a worldwide standard for IT security. American National Standards Institute has granted the CISSP status accreditation in the field of information security under ISO/IEC 17024. Fields of knowledge included under CISSP include security administration procedures, security architecture and test systems, access control methodology, applications development security, operations security, hardware security, encryption, communications, network security, and disaster recovery planning. Read additional details concerning Progent's CISSP Support Assistance.
  • ISSAP Engineering Support
    Progent's ISSAP certified security consultants are consultants who have been awarded ISSAP status after rigorous examination and substantial experience. field experience with network security architecture. ISSAP security experts have in-depth knowledge of access management mechanisms and methodologies, telecommunications and network protection, cryptography, needs evaluation, business continuity and DRP, and physical security integration. Progent's ISSAP-qualified security consultants can assist your company with all phases of secure network architecture. Find out additional information about Progent's ISSAP Accredited Protected Network Infrastructure Consulting Services.
  • CISA Professional Expertise
    The Certified Information Systems Auditor (CISA) credential is a recognized qualification that represents expertise in IS security audit and control. Accredited by the American National Standards Institute (ANSI), the CISA credential requires that consultants pass an extensive test administered by the ISACA professional group. Progent can provide the expertise of a CISA-qualified security professional trained to help businesses in the areas of IS audit services, information technology enforcement, network assets and infrastructure planned useful life, IT support, safeguarding information assets, and business continuity preparedness. Get additional details about Progent's CISA Support Assistance.
  • GIAC (Global Information Assurance Certification) Support Services
    GIAC was established in 1999 to certify the skill of network security experts. GIAC's mission is to make sure that an accredited professional possesses the skills appropriate to deliver services in important categories of system, data, and application security. GIAC accreditations are acknowledged by businesses and institutions around the world including and the United States National Security Agency. Progent offers the support of certified consultants for all of the security services addressed within GIAC certification programs such as auditing IT infrastructure, security incident handling, intrusion detection, and web-based services security. Learn more information about Progent's GIAC Consulting Assistance.
Depend on Progent for Network Security Consulting Services
If you need security engineering help, telephone Progent at 800-993-9400 or see Contact Progent.
















© 2002- 2017 Progent Corporation. All rights reserved.