Introduction to Progent's Security Consulting Services
Progent's industry certified computer security and compliance professionals can provide a broad selection of support services intended to assist organizations of all sizes to uncover and correct security weaknesses, defend against attacks, remediate any problems caused by a breach of protection, and comply with government mandates for protecting data and reporting security incidents. Progent offers a selection of service delivery modes:

  • On-demand online and on-site support invoiced to the nearest minute
  • On-going managed services invoiced at an affordable fixed monthly rate
  • Set-price service bundles for a single security and compliance evaluation
As-needed Security and Compliance Support Services
After you sign up for Progent's services (registration is free), you can get as-needed remote or onsite assistance from one of Progent security and compliance consultant. This traditional support model is essentially reactive and geared toward quickly resolving IT problems that are affecting your productivity or that are beyond the scope of your in-house support personnel. Common scenarios are debugging a firewall appliance or VPN tunnel, implementing a vital security patch for a Cisco switch, designing compliant access to a public cloud, or restoring data after a ransomware assault. These security services are invoiced to the nearest minute, which avoids the frustrating situation of getting large invoices for quick fixes.

Delivery options for Progent's as-needed support services include:

  • Online Security Services
    The majority security-related issues can be resolved remotely through a combination of phone-based help and an connection between Progent's Technical Response Center (TRC) and a customer's network. Progent's Technical Response Center can deliver remote security help by offering easy access to consultants who have the background and technical resources to fix some of the most difficult problems quickly, making your service costs affordable and minimizing downtime.
  • Onsite Security Services
    For instances where on-premises support is required, Progent can dispatch a technical expert to major cities throughout the U.S. Progent can also send a security consultant with top certifications and advanced skills to any location in the U.S.
Progent's accredited security consultants are certified to provide help for systems powered by Microsoft Windows, Linux, Mac, Sun, and major derivatives of UNIX. Progent's broad array of services covers firewall configuration, email systems, secure network design, and information recovery. Progent's support staff has earned the industry's top security certifications including Certified Information Security Manager (CISM) and Information System Security Architecture Professional. Progent also offers fast access to online Cisco-certified CCIE network infrastructure consultants who can provide advanced support with tough network integration issues.

ProSight Flat-rate Managed Services for Information Assurance
Progent's value-priced ProSight family of managed services is designed to provide small and mid-size organizations with enterprise-class support and cutting-edge technology for all facets of information assurance and compliance. ProSight managed services available from Progent include:

  • ProSight Active Security Monitoring (ASM): Next Generation Endpoint Protection and Ransomware Defense
    Progent's ProSight Active Security Monitoring is an endpoint protection solution that incorporates cutting edge behavior-based analysis technology to guard endpoints and servers and VMs against modern malware attacks such as ransomware and email phishing, which routinely escape legacy signature-matching anti-virus tools. ProSight ASM safeguards on-premises and cloud resources and provides a single platform to address the entire threat progression including filtering, infiltration detection, containment, cleanup, and forensics. Top capabilities include single-click rollback using Windows VSS and real-time system-wide immunization against new threats. Read more about Progent's ProSight Active Security Monitoring next-generation endpoint protection and ransomware recovery.

  • ProSight Enhanced Security Protection (ESP): Unified Endpoint Protection
    ProSight Enhanced Security Protection (ESP) services offer ultra-affordable multi-layer security for physical and virtual servers, desktops, mobile devices, and Exchange Server. ProSight ESP utilizes adaptive security and advanced machine learning for continuously monitoring and responding to security threats from all vectors. ProSight ESP delivers firewall protection, intrusion alarms, endpoint control, and web filtering through cutting-edge tools incorporated within one agent accessible from a unified console. Progent's security and virtualization experts can help you to plan and implement a ProSight ESP environment that addresses your organization's unique requirements and that helps you prove compliance with government and industry data security regulations. Progent will assist you define and implement policies that ProSight ESP will enforce, and Progent will monitor your network and respond to alarms that require urgent attention. Progent's consultants can also help you to set up and test a backup and disaster recovery system such as ProSight Data Protection Services so you can recover quickly from a potentially disastrous security attack like ransomware. Learn more about Progent's ProSight Enhanced Security Protection unified endpoint security and Exchange filtering.

  • ProSight Data Protection Services: Managed Backup and Recovery
    ProSight Data Protection Services offer small and medium-sized businesses a low cost end-to-end service for secure backup/disaster recovery. Available at a low monthly price, ProSight DPS automates your backup activities and allows fast recovery of critical files, applications and VMs that have become unavailable or damaged as a result of component failures, software glitches, disasters, human mistakes, or malicious attacks like ransomware. ProSight DPS can help you protect, recover and restore files, folders, applications, system images, as well as Hyper-V and VMware images. Critical data can be backed up on the cloud, to a local storage device, or mirrored to both. Progent's backup and recovery specialists can deliver world-class expertise to set up ProSight Data Protection Services to be compliant with regulatory requirements such as HIPPA, FIRPA, and PCI and, when necessary, can help you to restore your business-critical data. Read more about ProSight Data Protection Services Managed Backup and Recovery.

  • ProSight Email Guard: Spam Filtering, Data Leakage Protection and Content Filtering
    ProSight Email Guard is Progent's email filtering and encryption platform that uses the services and infrastructure of top data security companies to provide centralized management and world-class protection for your inbound and outbound email. The powerful architecture of Email Guard managed service integrates cloud-based filtering with a local security gateway device to provide complete defense against spam, viruses, Denial of Service (DoS) Attacks, DHAs, and other email-borne threats. The Cloud Protection Layer serves as a first line of defense and keeps the vast majority of threats from reaching your security perimeter. This decreases your exposure to inbound attacks and conserves network bandwidth and storage space. Email Guard's on-premises gateway device provides a further level of analysis for inbound email. For outgoing email, the on-premises gateway provides anti-virus and anti-spam protection, policy-based Data Loss Prevention, and email encryption. The on-premises security gateway can also assist Exchange Server to track and safeguard internal email that stays within your security perimeter. Find out more about Progent's ProSight Email Guard spam filtering, virus blocking, email content filtering and data leakage protection.

  • ProSight WAN Watch: Network Infrastructure Management
    Progentís ProSight WAN Watch is an infrastructure monitoring and management service that makes it easy and inexpensive for smaller organizations to map out, monitor, enhance and troubleshoot their networking hardware such as switches, firewalls, and access points as well as servers, client computers and other devices. Incorporating state-of-the-art Remote Monitoring and Management (RMM) technology, WAN Watch makes sure that infrastructure topology maps are always updated, copies and manages the configuration information of almost all devices on your network, monitors performance, and generates alerts when problems are discovered. By automating tedious management activities, ProSight WAN Watch can knock hours off common chores like network mapping, reconfiguring your network, locating appliances that require important updates, or resolving performance bottlenecks. Find out more details about ProSight WAN Watch network infrastructure monitoring and management consulting.

  • ProSight LAN Watch: Server and Desktop Monitoring
    ProSight LAN Watch is Progentís server and desktop monitoring managed service that incorporates advanced remote monitoring and management (RMM) techniques to help keep your network operating at peak levels by tracking the health of vital computers that drive your information system. When ProSight LAN Watch uncovers a problem, an alarm is sent immediately to your specified IT management personnel and your Progent engineering consultant so that any looming issues can be addressed before they have a chance to impact your network Learn more about ProSight LAN Watch server and desktop remote monitoring services.

  • ProSight Virtual Hosting: Hosted VMs at Progent's World-class Data Center
    With Progent's ProSight Virtual Hosting service, a small business can have its critical servers and applications hosted in a protected fault tolerant data center on a high-performance virtual host set up and managed by Progent's IT support professionals. With Progent's ProSight Virtual Hosting service model, the customer owns the data, the OS platforms, and the apps. Since the system is virtualized, it can be ported easily to an alternate hosting solution without a time-consuming and technically risky reinstallation process. With ProSight Virtual Hosting, you are not tied a single hosting provider. Learn more details about ProSight Virtual Hosting services.

  • ProSight IT Asset Management: Network Documentation Management
    ProSight IT Asset Management service is a cloud-based IT documentation management service that allows you to create, maintain, retrieve and protect information related to your IT infrastructure, processes, business apps, and services. You can instantly find passwords or serial numbers and be alerted about upcoming expirations of SSLs or domains. By updating and managing your IT infrastructure documentation, you can eliminate as much as 50% of time wasted looking for vital information about your IT network. ProSight IT Asset Management features a common location for storing and sharing all documents related to managing your business network like standard operating procedures (SOPs) and How-To's. ProSight IT Asset Management also supports a high level of automation for collecting and associating IT information. Whether youíre making enhancements, performing maintenance, or reacting to an emergency, ProSight IT Asset Management delivers the data you require the instant you need it. Learn more details about Progent's ProSight IT Asset Management service.
ProSight Network Audits
Progent's ProSight Network Audits offer a quick and low-cost alternative for small and mid-size businesses to get an objective evaluation of the health of their information system. Powered by some of the top remote monitoring and management platforms in the industry, and overseen by Progent's world-class group of IT professionals, ProSight Network Audits help you see how well the deployment of your essential network assets adhere to industry best practices. Both the Basic and Advanced options for ProSight Network Audit services are available at a budget-friendly, one-time cost and provide instant benefits like a more manageable Active Directory (AD) environment. Both versions also come with one year of advanced remote network monitoring and management (RMM). Benefits can include easier management, better compliance with information security requirements, more efficient utilization of network resources, quicker problem resolution, more reliable backup and restore, and higher availability. See more information about Progent's ProSight Network Audits IT infrastructure review.

Progent's ProSight Ransomware Preparedness Report
The ProSight Ransomware Preparedness Report service is a low-cost service based on a brief phone discussion with a Progent information assurance consultant. The fact-finding interview is designed to help evaluate your company's preparedness either to stop or recover quickly after a ransomware incident. Progent will consult with you personally to gather information about your current security profile and backup/recovery system, and Progent will then deliver a written Basic Security and Best Practices Report detailing how you can apply industry best practices to build an efficient security and backup system that aligns with your business requirements. For additional information, see The ProSight Ransomware Preparedness Report.

Set-price Security Evaluation and Verification Bundles
Progent has put together a number of flat-rate security assessment bundles that deliver high value by utilizing Progent's enterprise-class system monitoring and analysis software as well as Progent's technical skills to produce an unbiased and thorough evaluation of your IT environment security posture.

  • Security Inventory Service Packages for Small Organizations
    Progent offers two value-priced security inventory scanning service packages designed to enable small businesses to obtain an objective security evaluation from a certified security consultant. With Progent's External Security Inventory Scan, an engineer administers a comprehensive assessment of your network from beyond your firewalled perimeter to identify possible risks in the security posture you present to the public. With Progent's Internal Security Inventory Scan, a security expert executes a system scan using an authorized computer inside your corporate firewall to assess your vulnerability to internal threats. The two security inventory scans are set up and run from a secured offsite location. The project is managed by an engineer who has been awarded advanced security certifications and who creates a document that describes and evaluates the information captured by the scan and recommend practical improvements where appropriate.
  • Security Vulnerability Assessment Packages for Large Organizations
    Progent has developed three levels of set-price security evaluation service bundles intended for enterprises who need to meet security standards required by state or industry agencies. Progent's security evaluation service bundles offer larger businesses a chance to get a professional assessment at the strength of their security posture. For every security evaluation bundle, Progent consultants with top security credentials analyze and report on collected data and offer suggestions for cost-effective improvements. Each of the network security assessment bundles include an added-cost option for onsite consultants anywhere in the United States.
  • Stealth Penetration Testing
    Stealth penetration testing, often referred to as PEN testing, is a critical technique for helping organizations to find out how vulnerable their network environments are to current-generation attacks. Progent's stealth penetration testing services test how well your corporate security procedures and technologies resist authorized but unannounced intrusion attempts managed by Progent's experienced security experts utilizing cutting-edge hacking methods. Read about Progent's stealth penetration testing services.
Our Network Has Been Hacked: What Can We Do?
Network Security ConsultantsIf you are now experiencing a security crisis and you have no formal recovery plan, visit Progent's Remote Computer Help to find out how to get fast assistance. Progent offers online help from skilled engineers and can escalate trouble tickets to high-level security specialists if necessary. Your organization does not have to be a current Progent client to receive urgent support for a security breach, but you can register as a Progent client in advance at no cost and your standing as a registered client could save precious time in case of an emergency.

Usually, smaller companies do not have a response procedure in the event of a successful security breach. This is risky, because the damage from a serious security assault can be more catastrophic for a small company than for a big corporation. Progent's security specialists can assist your you to design a practical recovery and incident reporting plan that minimizes the IT system disruption following a security breach. The step-by-step incident handling model outlined by GIAC (Global Information Assurance Certification) is Progent's suggested method for handling a major security incident.

Advanced Security Expertise Offered by Progent
Progent's seasoned engineers offer advanced support in vital areas of network security such as:

  • Information Risk Evaluation and Security Compliance Testing
    Progent provides expertise with security evaluation utilities such as Microsoft Baseline Security Analyzer or LANguard for performing a variety of automatic system tests to uncover possible security problems. Progent has extensive experience with these tools and can help you to analyze assessment reports and respond efficiently. Progent's security engineers also can perform web software testing and can perform expert evaluation of enterprise-wide security to verify your organization's compliance with major worldwide security standards including FISMA, PCI, and ISO. In addition, Progent can evaluate the effectiveness of your wireless protection covering stationary wireless equipment plus portable devices. Get more information about Progent's Information Risk Audits and Compliance Assessment.
  • Designing, Building, and Validating Protected Environments
    Every business should develop a thoroughly thought out security strategy that incorporates both preventive and responsive elements. The pre-attack plan is a set of precautions that works to reduce security holes. The reactive strategy specifies activities to help security staff to inventory the damage caused by an attack, repair the damage, record the event, and revive network functions as soon as possible. Progent can advise you how to design security into your business processes, install auditing software, define and execute a safe IT infrastructure, and recommend procedures and policies that will enhance the protection of your information system. Progent's security experts are ready to help you to configure a firewall, design safe remote connectivity to email and files, and configure an effective VPN. If your company is interested in an economical option for jobbing out your security administration, Progent's 24x7 Monitoring Packages feature continual online server monitoring and immediate response to problems.
  • System Recovery and Security Forensics
    Progent has skill in restoring networks and servers that have been compromised, are in question, or have ceased to function following a security breakdown. Progent can help assess the damage resulting from the assault, restore normal functions, and retrieve data compromised as a result of the event. Progent's security specialists can also oversee a thorough failure analysis by examining activity logs and using a variety of proven forensics techniques. Progent's experience with security issues minimizes your downtime and permits Progent to recommend effective strategies to avoid or contain new assaults.
  • Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Series Firewalls, and PIX Firewalls Integration and Debugging
    Cisco CCIE Network Security EngineersThe latest generation of Cisco ASA 5500-X Family Next-Generation Firewalls with Firepower Services offer significantly more performance than Cisco's legacy firewalls and have replaced the ASA 5500 and PIX 500 firewalls for new installations. After Cisco's acquisition of Sourcefire, the whole family of ASA 5500-X devices can be provisioned to support Firepower Services, based on Sourcefire's Snort product, which is the world's most popular intrusion protection system. Firepower services provide enhanced capabilities such as advanced malware protection (AMP), URL filtering, dynamic threat analytics, and automation. Progent's Cisco-qualified CCIE network experts can assist your company to manage your legacy PIX or ASA 5500 firewalls and migrate to ASA 5500-X firewalls with Firepower Services. Progent's consultants can provide online and on-premises support for ASA 5500-X firewalls with Firepower Services and can help your company to plan, integrate, tune, administer and debug firewall environments built on Cisco ASA 5500-X firewalls with Firepower Services. Find out additional information about ASA 5500-X Firewalls with Firepower Services integration and debugging support.
  • Other Firewall and Virtual Private Network Consulting Services
    As well as being expert in a broad array of protection solutions available from Microsoft and Cisco, Progent can provide small businesses expert support for security products from other major firewall and Virtual Private Network (VPN) suppliers such as:
  • SIEM Integration and Support
    Security information and event management (SIEM) applications and services are designed to interpret the enormous quantity of information collected in security event records created by multiple sources such as network infrastructure appliances, servers, and applications and tools. SIEM software organizes the security event records from these diverse sources and creates summary reports of security incidents as required by state regulations and industry compliance standards. Progent's GIAC-certified network security consultants and Cisco-certified network experts can help organizations to plan, deploy and manage a SIEM solution that helps them to understand the behavior of security incidents and comply with security incident reporting requirements. (See Progent's Security information and Event Management solutions.)
Progent's Security Certifications
Progent's security specialists have been awarded the most respected certifications available in the security industry. All of these certifications require exhaustive testing and proven work experience to guarantee that recipients have mastered a significant amount of security knowledge and techniques and can provide advanced solutions to information environments of any complexity.
  • Certified Information Security Manager Security Support Services
    Certified Information Security Manager defines the fundamental skills and worldwide benchmarks of performance that IT security professionals are required to master. It provides executive management the confidence that those who have earned their accreditation have the background and knowledge to offer effective security administration and engineering services. Progent can provide a CISM expert to help your organization in key security areas including data security governance, vulnerability assessment, information security process management, and incident response management. Learn more information about Progent's CISM Security Support Assistance.

  • Certified Information Systems Security Professionals (CISSP) Security Support Expertise
    Progent's CISSP experts are security engineers who have been awarded CISSP status as a result of verified professional work, rigorous study, and formal examination. CISSP qualification recognizes mastery of an international standard for IT security. American National Standards Institute has granted the CISSP credential accreditation in the area of IT security under ISO/IEC 17024. Fields of knowledge covered under CISSP include security administration practices, security design and models, access permission systems, software development security, business processes security, hardware security, encryption, telecommunications, Internet security, and business continuity planning. Learn the details about Progent's Certified Information Systems Security Professionals (CISSP) Support Services.

  • CISSP-ISSAP Cybersecurity Architecture Consulting Support
    Progent's CISSP-ISSAP qualified cybersecurity architecture experts have earned ISSAP status after thorough testing and substantial experience. field experience with network security architecture. ISSAP security experts have acquired in-depth knowledge of access management systems and methodologies, telecommunications and network security, cryptography, requirements analysis, business continuity and disaster recovery, and physical security integration. Progent's CISSP-ISSAP-qualified security experts can assist your company with all phases of architecture security. Find out additional information about Progent's ISSAP Certified Secure System Infrastructure Consulting Support.

  • Certified Information Systems Auditor Support Expertise
    The Certified Information Systems Auditor accreditation is a prestigious qualification that signifies mastery in IS security audit and control. Accredited by the American National Standards Institute, the CISA accreditation requires that candidates pass an exhaustive examination given by the ISACA international professional group. Progent offers the expertise of a CISA-certified security consultant trained to help companies in the fields of information systems audit services, IT enforcement, network assets and infrastructure lifecycle, IT support, protecting data resources, and business continuity preparedness. Learn additional information about Progent's Certified Information Systems Auditor (CISA) Consulting Expertise.

  • CRISC-certified Network Risk Management Consultants
    The Certified in Risk and Information Systems Control (CRISC) program was established by ISACA to validate a consultant's skills to plan, implement, and support IS controls to mitigate network risk. Progent can provide the expertise of a CRISC-certified consultant to help you to develop and execute a business continuity strategy based on industry best practices promoted by CRISC and crafted to match your organization's risk tolerance, business goals, and IT budget. Progent's risk management services are a good fit the services provided by Progent's CISA-certified security engineers for objectively auditing your IS management mechanisms and also with the services of Progent's CISM-certified support professionals for designing company-wide security policies. Learn the details about Progent's CRISC-certified IT Risk Management Consulting.

  • GIAC Professional Services
    GIAC was founded in 1999 to validate the knowledge of IT security professionals. GIAC's goal is to assure that an accredited professional possesses the knowledge necessary to deliver services in vital categories of network, data, and application software security. GIAC accreditations are acknowledged by companies and government organizations around the world including and the United States National Security Agency. Progent offers the support of certified security engineers for all of the network security capabilities covered within GIAC certification topics such as auditing security systems, incident handling, intrusion detection, and web-based application security. Get more details concerning Progent's GIAC Professional Services.
Depend on Progent for Computer Security Support
If you're trying to find network security engineering help, call Progent at 800-993-9400 or refer to Contact Progent.
















© 2002- 2019 Progent Corporation. All rights reserved.