Overview of Progent's Security Consulting Services
Progent's certified computer security professionals offer a wide selection of professional services intended to assist organizations of all sizes to detect and eliminate security weaknesses, block assaults, recover from the damage resulting from a breach of protection, and meet government requirements for reporting incidents. Progent delivers remote and on-site support and also has developed economical set-price security assessment bundles to complement Progent's standard by-the-minute billing.

Service delivery alternatives available from Progent are:

  • On-line Security Services
    Typical security issues can be addressed remotely via a mix of telephone support and secure Internet access between Progent's Technical Response Center and the client's computer system. Progent's TRC support team includes network security engineers who have the background and the tools to solve even the most challenging issues promptly, keeping your service expenses reasonable and minimizing lost productivity. Progent provides security support services on a per-minute model without minimum billing for online support. Progent's billing model eliminates situations where quick fixes turn into big charges. Progent also offers a variety of fixed-price remote security and compliance assessment bundles that represent exceptional value by utilizing Progent's sophisticated system monitoring software and Progent's consulting expertise to deliver an objective and thorough analysis of your network security profile.

  • Onsite Security Support Services
    For cases where in-person support is necessary, Progent can dispatch a service technician to larger cities across the U.S. Progent's certified security consultants are in addition available to assist with jobs that require high-level security professionals to be on premises anywhere in the U.S., and Progent's most comprehensive security assessment packages for enterprises feature the participation of several qualified security engineers on site.

  • Urgent Security Services
    For immediate help with network security issues, your company can have access to a world-class online support specialist from Progent's team of certified security engineers at Progent's TRC. Progent's emergency online security support consultants are available to provide fast and low-cost assistance with security problems that are impacting the productivity of your network. Progent's accredited consultants are certified to provide help for environments based on Microsoft Windows, Linux, Apple, Sun Solaris, and major versions of UNIX. Progent's broad selection of services encompasses firewall expertise, email and messaging systems, secure network design, and data recovery. Progent's technical support team has earned the industry's most advanced security accreditations including CISA and CISSP. Progent also can provide immediate access to remote Cisco-certified CCIE network consultants who can deliver world-class support with tough network technology problems.

Our System Has Been Hacked: What Are We Supposed to Do?
Network Security ConsultantsIf you are currently fighting a security emergency and you have no detailed response plan, refer to Progent's Remote Computer Support to find out how to get immediate help. Progent offers online assistance from experienced network technicians and can refer problems to certified security specialists if required. Your company does not need to be a current Progent customer to get urgent support for a security breach, but you can sign up as a Progent customer ahead of time at no cost and your status as a current client could save valuable time when there is an emergency.

Typically, smaller businesses have no recovery procedure in the event of a damaging security breach. This is not good, since the cost of a serious security assault can be even more catastrophic for a small company than for a big corporation. Progent's security specialists can assist your you to create a sensible response and event reporting plan that minimizes the IT system disruption resulting from an attack. The step-by-step post-attack handling procedure promoted by GIAC (Global Information Assurance Certification) is Progent's suggested procedure for reacting to a serious security penetration.

Areas of Progent's Security Consulting Expertise
Managing data security and staying ready for restoring critical data and functions after an attack requires an on-going program that entails a variety of tools and processes. Progent's certified security professionals can help your business at any level in your efforts to safeguard your IT network and stay in compliance, Progent's services range from security assessments to creating a comprehensive security plan. Some areas supported by Progent's security consultants include Security Planning and Implementation, Information Recovery and Security Forensics, plus Managed Filtering of E-mail-Based Spam and Viruses.

  • Designing, Implementing, and Validating Secure Networks
    Any company should have a thoroughly considered security plan that includes both preventive and reactive activity. The proactive strategy is a collection of precautions that helps to reduce security holes. The reactive plan defines activities to help IT personnel to assess the damage caused by an attack, remediate the damage, record the event, and restore network functions as quickly as possible. Progent can show you how to build security into your business processes, install auditing software, define and implement a safe computer infrastructure, and recommend processes and policies to optimize the safety of your information system. Progent's security professionals are ready to assist you to configure a firewall, design secure offsite access to e-mail and files, and configure an efficient virtual private network (VPN). If your company is looking for an economical way for outsourcing your security management, Progent's Round-the-clock Network Support Services feature automated remote network tracking and fast resolution of problems.
  • System Recovery and Failure Analysis
    Progent provides expertise in recovering networks and servers that have been hacked, are quarantined, or have failed because of a security penetration. Progent can show you how to evaluate the losses resulting from the breach, restore normal business operations, and recover data compromised owing to the event. Progent's certified specialists can also perform a thorough failure evaluation by examining activity logs and using other proven forensics tools. Progent's experience with security problems reduces your off-air time and allows Progent to suggest effective ways to avoid or contain future attacks.
  • Email Security with Spam Filtering, Virus Protection, Content Filtering, and Data Leakage Protection
    Email Guard is Progent's email security platform that uses the services and infrastructure of top data security companies to provide centralized management and comprehensive protection for your email traffic. The hybrid structure of Progent's Email Guard managed service combines a Cloud Protection Layer with a local security gateway appliance to offer advanced defense against spam, viruses, Denial of Service (DoS) Attacks, DHAs, and other email-based malware. The cloud filter serves as a preliminary barricade and keeps most threats from making it to your security perimeter. This reduces your vulnerability to external threats and conserves network bandwidth and storage. Email Guard's on-premises security gateway device provides a deeper layer of analysis for inbound email. For outbound email, the local gateway offers anti-virus and anti-spam filtering, policy-based Data Loss Prevention, and email encryption. The on-premises gateway can also assist Microsoft Exchange Server to monitor and protect internal email traffic that originates and ends inside your corporate firewall. Learn more about Progent's Email Guard Spam Filtering, Virus Defense, Content Filtering and Data Leakage Prevention.
Advanced Security Expertise Available from Progent
Progent's certified security engineers offer advanced support in key areas of IT compliance such as:
  • Information Risk Evaluation and Security Compliance Assessment
    Progent offers expertise with security auditing utilities such as MS Baseline Security Analyzer or LANguard from GFI for conducting a set of automatic network scans to uncover possible security gaps. Progent has broad experience with scanning utilities and can help your company to analyze assessment reports and react efficiently. Progent's security consultants also provide web application validation and can perform thorough assessments of corporate-wide security to determine your company's compliance with major industry security specifications such as HIPAA, PCI, and ISO. In addition, Progent can assess the effectiveness of your wireless security covering stationary wireless equipment as well as mobile devices. Find out additional information about Progent's Vulnerability Evaluation and Security Compliance Assessment.
  • Security Inventory Packages for Small Companies
    Progent offers two low-cost security inventory and evaluation packages designed to allow small companies to get a professional network security assessment from a qualified security engineer. With Progent's External Security Inventory Scan, a security expert administers an extensive examination of your IT infrastructure from outside your firewall to determine possible risks in the security posture you expose to the outside world. With Progent's Internal Network Security Inventory Scan, an engineer runs a system scan from a secure machine inside your firewall to assess the risk to inside assaults. Both security inventory packages are set up and executed from a secured remote location. The process is managed by an engineer who has earned top security credentials who produces a document that details and analyzes the data captured by the security scan and proposes practical remediation where appropriate.
  • Security Vulnerability Evaluation Bundles for Enterprises
    Progent's qualified security engineers can deliver a range of set-price security assessment bundles designed for institutions who need to meet security levels demanded by state regulators or by customers. Progent's network security audit service bundles give larger organizations a chance to receive a professional look at the effectiveness of their security environment. For every security assessment package, Progent engineers with high-level security accreditations evaluate and summarize scanned information and provide suggestions for effective remediation. The different security audit packages feature an extra-cost option for onsite engineers United States.
  • Upgrading from Microsoft Internet Security and Acceleration (ISA) Server 2006 and Forefront Threat Management Gateway
    ISA Server 2006 and its replacement Forefront TMG 2010 are software solutions that contain an application-aware firewall that can protect networks from outside and inside attacks. Both platforms provide deep examination of network protocols to detect exploits that can elude early-generation firewalls. Microsoft ISA Server 2006 was superseded by Forefront TMG, which is based on ISA Server 2006's technology while delivering a variety of enhanced features. Forefront TMG 2010 has subsequently been retired by Microsoft, and the security functions provided by the platform are now usually taken over by dedicated physical appliances from vendors such as Cisco, Check Point, SonicWALL and WatchGuard. (See Cisco ASA Firewall with Firepower Services configuration and management.) Progent offers advanced Microsoft Forefront TMG support services and ISA Server 2006 expertise to help you maintain and debug your legacy firewalls, and Progent can help you to upgrade efficiently to a more current firewall solution by providing system design, configuration, tuning, IT staff training and troubleshooting.
  • Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Firewalls, and PIX 500 Security Appliances Integration and Troubleshooting
    Cisco CCIE Network Security SpecialistsThe latest generation of ASA 5500-X Family Next-Generation Firewalls with Firepower Services provide significantly more value than Cisco's legacy firewalls and have superseded the ASA 5500 and PIX 500 security appliances for all new installations. Since Cisco's purchase of Sourcefire, the entire line of ASA 5500-X devices can be provisioned to support Firepower Services, based on Sourcefire's Snort product, which is the market's most deployed intrusion protection system. Firepower services bring powerful new features such as advanced malware protection (AMP), URL filtering, real-time threat analytics, and automation. Progent's Cisco-qualified CCIE network experts can help your company to manage your existing PIX or ASA 5500 firewalls and migrate efficiently to ASA 5500-X firewalls with Firepower Services. Progent's consultants can provide remote and onsite support for ASA 5500-X firewalls with Firepower Services and can assist your company to plan, configure, tune, manage and troubleshoot firewall environments built on Cisco ASA 5500-X firewalls with Firepower Services. Find out more information about Cisco ASA Firewalls with Firepower Services configuration and troubleshooting services.
  • Other Firewall and Virtual Private Network (VPN) Solutions
    As well as being expert in a wide array of security solutions available from Microsoft and Cisco, Progent can provide small and mid-size businesses expert support for technologies from other major firewall and Virtual Private Network vendors such as:
  • SIEM Solutions
    Security information and event management (SIEM) software and services are intended to make sense the enormous quantity of data collected in security event logs created by multiple sources including network infrastructure appliances, operating systems, and applications and monitoring tools. SIEM software organizes the security logs from these diverse sources and creates consolidated reports of security events as required by state regulations and business compliance standards. Progent's GIAC-certified computer security consultants and Cisco-certified network infrastructure consultants can help organizations to plan, deploy and operate a SIEM system that enables them to understand the progress of security incidents and comply with event reporting requirements. (Visit Progent's Security information and Event Management (SIEM) solutions.)
Progent's Security Certifications
Progent's security consultants have earned the most prestigious accreditations available in the security industry. These certifications require exhaustive testing and proven field background to ensure that candidates have mastered a substantial body of security information and methodologies and can provide high-level consulting to computer networks of any size.
  • Certified Information Security Manager (CISM) Security Support Services
    CISM defines the core skills and international benchmarks of service that IT security managers are expected to achieve. CISM offers business management the confidence that consultants who have earned their certification have the experience and skill to offer efficient security management and consulting support. Progent can offer a CISM-certified expert to assist your organization in key security disciplines such as data security governance, vulnerability management, data protection program control, and incident response management. Learn additional details about Progent's Certified Information Security Manager (CISM) Security Consulting Expertise.
  • CISSP Security Consulting Services
    Progent's CISSP experts are security engineers who have been awarded CISSP certification as a result of demonstrated experience, rigorous study, and exhaustive examination. CISSP Certification recognizes expertise in a worldwide standard for information security. ANSI has granted the CISSP credential accreditation in the area of IT security under ISO/IEC 17024. Fields of knowledge covered within CISSP include security administration practices, security architecture and test systems, connection control methodology, applications development security, business processes security, hardware security, encryption, communications, network security, and disaster recovery planning. Get more details concerning Progent's Certified Information Systems Security Professionals (CISSP) Support Expertise.
  • Information Systems Security Architecture Professionals (ISSAP) Engineering Services
    Progent's ISSAP certified security consultants are consultants who have earned ISSAP certification as a result of thorough testing and extensive experience. field experience with information security architecture. ISSAP security experts possess comprehensive knowledge of access control mechanisms and techniques, phone system and network infrastructure protection, cryptography, needs evaluation, BCP and disaster recovery, and physical security. Progent's ISSAP-qualified security experts can help your business with all aspects of secure network architecture. Get additional details about Progent's ISSAP Accredited Secure IT Infrastructure Engineering Assistance.
  • CISA Consulting Expertise
    The CISA accreditation is a prestigious achievement that indicates mastery in information system security audit and control. Certified by the American National Standards Institute, the CISA credential has candidates pass an exhaustive test given by the ISACA professional association. Progent offers the expertise of a CISA-certified security audit professional able to help businesses in the areas of information systems audit services, IT administration, network assets and architecture lifecycle, information technology service delivery, safeguarding data resources, and business continuity planning. Read more details about Progent's Certified Information Systems Auditor Consulting Services.
  • GIAC (Global Information Assurance Certification) Consulting Expertise
    Global Information Assurance Certification was founded in 1999 to certify the knowledge of IT security professionals. GIAC's mission is to make sure that an accredited professional possesses the skills appropriate to provide support in vital categories of network, data, and program security. GIAC accreditations are acknowledged by businesses and institutions around the world including and the U.S. National Security Agency (NSA). Progent can provide the help of certified professionals for any of the security disciplines addressed under GIAC certification programs including auditing security systems, incident handling, traffic analysis, and web services security. Find out more information concerning Progent's Global Information Assurance Certification Support Assistance.
Depend on Progent for Network Security Consulting Services
If you're looking for network security support services, phone Progent at 800-993-9400 or go to Contact Progent.

© 2002- 2017 Progent Corporation. All rights reserved.