Overview of Progent's Security and Compliance Consulting Services
Progent's industry certified network security experts can provide a wide range of services designed to help businesses of any size to detect and correct security vulnerabilities, block assaults, recover from the problems caused by a breach of protection, and comply with government mandates for guarding data and reporting incidents. Progent can provide a choice of service delivery modes:

  • As-needed online and on-premises support billed by the minute
  • On-going managed services billed at a low fixed monthly fee
  • Set-price service bundles for a one-time security evaluation
On-demand Security Consulting Services
After you register for Progent's services (registration is free), you can receive on-demand remote or on-premises support from a Progent security consultant. This classic support model is primarily reactive and optimized for quickly resolving technical issues that are impacting your network or that have stymied your own support staff. Typical scenarios include replacing a firewall appliance or VPN tunnel, installing a critical security update for a Cisco switch, designing secure access to cloud-based resources, or recovering from a ransomware attack. These security services are billed by the minute, which eliminates the annoying situation of receiving large invoices for fast fixes.

Delivery alternatives for Progent's as-needed support services include:

  • Online Security Services
    The majority security problems can be handled remotely via a mix of phone support and a remote connection between Progent's Technical Response Center (TRC) and a client's network. Progent's Technical Response Center can deliver online security help by offering efficient access to consultants who have the background and technical resources to resolve many of the most difficult issues quickly, making your support costs low and minimizing lost productivity.
  • Onsite Security Support
    For instances where on-premises assistance is required, Progent can dispatch a technical expert to major cities across the United States. Progent can also send a security specialist with top certifications and advanced skills to any site in the country.
Progent's accredited engineers are certified to provide help for environments powered by Microsoft Windows, Linux, Apple Mac, Solaris, and popular derivatives of UNIX. Progent's wide array of consulting services addresses firewall configuration, e-mail systems, protected system architecture, and information recovery. Progent's technical support team has been awarded the industry's most advanced security accreditations including GIAC (Global Information Assurance Certification) and Certified Information Systems Security Professional (CISSP). Progent also offers fast access to remote Cisco CCIE network engineers who can provide world-class assistance with tough network technology issues.

Progent's Fixed-price Managed Services for Information Assurance
Progent offers a selection of affordable, set-price monthly managed services intended to provide small and mid-size businesses with enterprise-class support and cutting-edge technology for all aspects of information assurance and compliance. Managed services available from Progent include:

  • ProSight Email Guard: Inbound and Outbound Spam Filtering, Data Leakage Protection and Email Encryption
    ProSight Email Guard is Progent's email security solution that uses the services and infrastructure of top information security vendors to deliver centralized control and world-class security for your email traffic. The powerful architecture of Email Guard integrates cloud-based filtering with an on-premises security gateway device to provide advanced protection against spam, viruses, Denial of Service Attacks, Directory Harvest Attacks (DHAs), and other email-based threats. Email Guard's cloud filter serves as a preliminary barricade and blocks most unwanted email from reaching your network firewall. This decreases your vulnerability to inbound threats and conserves network bandwidth and storage space. Email Guard's onsite security gateway device provides a further layer of analysis for incoming email. For outgoing email, the on-premises security gateway offers AV and anti-spam protection, protection against data leaks, and email encryption. The onsite security gateway can also help Exchange Server to monitor and safeguard internal email traffic that stays within your security perimeter. Learn more about Progent's ProSight Email Guard spam filtering, virus blocking, email content filtering and data leakage protection.

  • ProSight Active Security Monitoring (ASM): Endpoint Protection and Ransomware Defense
    ProSight Active Security Monitoring (ASM) is an endpoint protection service that utilizes next generation behavior-based analysis technology to defend endpoints and servers and VMs against new malware attacks such as ransomware and file-less exploits, which routinely evade traditional signature-matching anti-virus tools. ProSight Active Security Monitoring safeguards local and cloud resources and provides a single platform to automate the complete threat lifecycle including blocking, detection, containment, cleanup, and post-attack forensics. Top features include single-click rollback using Windows Volume Shadow Copy Service and real-time system-wide immunization against new attacks. Read more about Progent's ProSight Active Security Monitoring (ASM) next-generation endpoint protection and ransomware recovery.

  • ProSight DPS: Managed Backup
    ProSight Data Protection Services from Progent provide small and medium-sized businesses an affordable and fully managed service for secure backup/disaster recovery (BDR). Available at a fixed monthly cost, ProSight Data Protection Services automates and monitors your backup processes and allows fast recovery of vital data, applications and VMs that have become lost or damaged due to hardware breakdowns, software glitches, disasters, human error, or malware attacks such as ransomware. ProSight Data Protection Services can help you protect, recover and restore files, folders, applications, system images, plus Microsoft Hyper-V and VMware images. Critical data can be protected on the cloud, to a local device, or to both. Progent's cloud backup specialists can provide world-class expertise to configure ProSight DPS to be compliant with government and industry regulatory requirements such as HIPPA, FIRPA, and PCI and, whenever necessary, can assist you to restore your critical information. Read more about ProSight Data Protection Services managed cloud backup and recovery.

  • ProSight WAN Watch: Network Infrastructure Management
    Progentís ProSight WAN Watch is a network infrastructure management service that makes it easy and affordable for smaller businesses to map, track, enhance and troubleshoot their networking appliances like routers and switches, firewalls, and access points as well as servers, client computers and other devices. Using cutting-edge RMM technology, ProSight WAN Watch makes sure that infrastructure topology diagrams are always updated, captures and manages the configuration information of almost all devices on your network, monitors performance, and generates notices when issues are detected. By automating complex management processes, WAN Watch can cut hours off ordinary tasks like making network diagrams, expanding your network, locating appliances that need important software patches, or isolating performance issues. Learn more about ProSight WAN Watch infrastructure management services.

  • ProSight Systems Watch: Server and Desktop Monitoring
    ProSight Systems Watch is Progentís server and desktop monitoring service that incorporates state-of-the-art remote monitoring and management technology to help keep your IT system operating at peak levels by tracking the health of vital assets that drive your information system. When ProSight Systems Watch detects a problem, an alarm is transmitted automatically to your designated IT management staff and your assigned Progent engineering consultant so that all looming issues can be resolved before they have a chance to disrupt your network Find out more details about ProSight Systems Watch server and desktop management consulting.
Set-price Security Assessment and Verification Packages
Progent offers a number of set-price security and compliance evaluation bundles that deliver exceptional value by deploying Progent's advanced network monitoring software as well as Progent's consulting skills to produce an unbiased and comprehensive assessment of your IT environment security posture.
  • Security Assessment Service Packages for Small Businesses
    Progent offers two value-priced security inventory scanning service packages intended to enable small organizations to get a professional security assessment from an accredited security engineer. With Progent's External Security Inventory Scan, an engineer administers a comprehensive assessment of your network from beyond your corporate firewall to identify potential risks in the security posture you expose to the public. With Progent's Internal Security Inventory Scan, a certified security consultant executes a network scan using an authorized machine inside your firewalled perimeter to evaluate your vulnerability to internal threats. These two security inventory scanning services are set up and executed from a secured external site. The project is administered by a consultant who has been awarded advanced security certifications and who produces a report that details and evaluates the information collected by the scan and suggests various improvements where appropriate.
  • Security Vulnerability Assessment Bundles for Enterprises
    Progent has developed three levels of fixed-price security evaluation service bundles intended for enterprises who need to meet compliance standards required by state or industry agencies. Progent's security assessment service packages offer larger businesses an opportunity to obtain a professional look at the strength of their security profile. For each security assessment bundle, Progent engineers with top security credentials analyze and report on collected data and provide suggestions for efficient improvements. Each of the network security assessment packages include an extra-cost option for on-premises engineers anywhere in the U.S.
  • Stealth Penetration Testing Services
    Stealth penetration testing, commonly referred to as PEN testing, is a vital tool for allowing businesses to determine how vulnerable their IT systems are to modern threats. Progent's stealth penetration testing test how well your existing security procedures and technologies resist authorized but unannounced intrusion attempts managed by Progent's experienced security specialists utilizing cutting-edge hacking methods. Find out about Progent's stealth penetration testing (PEN Test) services.
Our System Has Been Hacked: What Do We Do Now?
Network Security ConsultantsIf your company is currently experiencing a network security crisis and you have not prepared a detailed response plan, go to Progent's Online Technical Support to learn how to receive immediate assistance. Progent provides remote assistance from experienced network technicians and can refer problems to certified security specialists if necessary. Your business does not have to be a registered Progent customer to get urgent support for a security breach, but you can register as a Progent customer ahead of time at no cost and your status as a registered client can save valuable time during a crisis.

Typically, smaller businesses do not have a recovery plan in the event of a successful attack. This is risky, since the damage from a serious security attack can be more devastating for a small business than for a large enterprise. Progent's security consultants can assist your business to create a practical response and event reporting procedure that minimizes the network disruption resulting from a security breach. The formal incident handling model promoted by GIAC is Progent's recommended method for handling a serious security attack.

High-value Security Services Available from Progent
Progent's seasoned engineers can provide consulting support in key areas of IT compliance such as:

  • Information Risk Audits and Security Compliance Testing
    Progent offers experience with information risk auditing tools like Microsoft Baseline Security Analyzer and LANguard from GFI for conducting a variety of automatic system tests to reveal possible security holes. Progent has extensive experience with scanning tools and can assist your company to understand assessment results and react efficiently. Progent's certified security consultants also provide web software validation and can conduct thorough evaluation of enterprise-wide security to determine your company's compliance with major global security specifications including FISMA, PCI, and ISO. In addition, Progent can evaluate the strength of your wireless protection covering fixed wireless equipment plus mobile devices. Read the details about Progent's Vulnerability Evaluation and Compliance Testing.
  • Planning, Implementing, and Testing Secure Networks
    Every business ought to have a thoroughly thought out security plan that incorporates both preventive and reactive elements. The pre-attack plan is a set of steps that helps to minimize vulnerabilities. The post-attack plan specifies procedures to assist IT staff to evaluate the losses caused by an attack, repair the damage, document the experience, and revive network activity as quickly as feasible. Progent can show you how to build security into your business operations, install scanning utilities, define and implement a safe network architecture, and propose procedures and policies to enhance the protection of your computing environment. Progent's security experts are ready to assist you to configure a firewall, design safe online and mobile access to e-mail and files, and configure an efficient virtual private network (VPN). If you are interested in an economical way for jobbing out your network security management, Progent's Round-the-clock Monitoring Options include automated online server monitoring and quick response to problems.
  • System Recovery and Security Forensics
    Progent offers expertise in recovering networks and devices that have been hacked, are in question, or have stopped working following a security attack. Progent can show you how to assess the damage resulting from the attack, return your company to normal business operations, and recover information compromised owing to the breach. Progent's certified specialists can also oversee a thorough failure analysis by examining event logs and using a variety of advanced forensics techniques. Progent's experience with security problems reduces your off-air time and allows Progent to suggest efficient ways to prevent or mitigate future assaults.
  • Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Series Firewalls, and PIX Security Appliances Configuration and Debugging
    Cisco Certified CCIE Security EngineersThe current Cisco ASA 5500-X Series of firewalls with Firepower Services deliver significantly more performance than Cisco's earlier PIX and ASA 5500 firewalls and have superseded the ASA 5500 and PIX 500 security appliances for all new deployments. After Cisco's acquisition of Sourcefire, the whole line of Cisco ASA 5500-X firewalls can be provisioned to support Firepower Services, built on Sourcefire's Snort product, which is the market's most popular network intrusion protection system. Firepower services bring enhanced capabilities such as advanced malware protection (AMP), URL filtering, dynamic threat analytics, and security automation. Progent's Cisco-certified CCIE network consultants can help your company to maintain your legacy PIX or ASA 5500 security appliances and migrate to ASA 5500-X firewalls with Firepower Services. Progent's consultants offer online and on-premises help with ASA 5500-X firewalls with Firepower Services and can help your business to design, configure, tune, manage and debug firewall solutions built on Cisco ASA 5500-X firewalls with Firepower Services. See more information about ASA Firewalls with Firepower Services integration and debugging services.
  • Other Firewall and Virtual Private Network Technologies
    In addition to being expert in a wide array of network security technologies available from Microsoft and Cisco, Progent offers small and mid-size companies expert support for security products from other popular firewall and Virtual Private Network vendors including:
  • SIEM Solutions
    Security information and event management (SIEM) applications and services are intended to interpret the enormous amounts of data collected in security incident logs generated by a wide range of sources including network infrastructure appliances, servers, and applications and monitoring tools. SIEM applications analyzes the security logs from these various sources and creates consolidated reports of security events as mandated by state regulations and business compliance standards. Progent's GIAC-certified computer security consultants and Cisco-certified network infrastructure consultants can assist organizations to plan, deploy and operate a SIEM solution that helps them to understand the progress of attacks and comply with security incident reporting regulations. (Visit Progent's Security information and Event Management solutions.)
Progent's Security Credentials
Progent's security engineers have earned the most respected accreditations offered in the industry. These certifications require exhaustive testing and proven work background to guarantee that candidates have acquired expertise with a significant body of security knowledge and techniques and can provide high-level consulting to information networks of any complexity.
  • Certified Information Security Manager (CISM) Security Consulting Expertise
    Certified Information Security Manager identifies the core competencies and international standards of service that information security managers are expected to master. It offers business management the assurance that consultants who have been awarded their accreditation have the experience and knowledge to offer effective security administration and engineering support. Progent can offer a CISM-certified support professional to assist your organization in critical security areas including information security governance, vulnerability assessment, information protection process management, and incident response management. Learn the details concerning Progent's Certified Information Security Manager (CISM) Security Consulting Assistance.

  • CISSP Security Consulting Services
    Progent's Certified Information Systems Security Professionals (CISSPs) are security specialists who have been awarded CISSP status through demonstrated experience, extensive study, and formal testing. CISSP Certification recognizes mastery of a worldwide standard for information security. ANSI has granted the CISSP credential official recognition in the field of information security under ISO/IEC 17024. Fields of knowledge covered under CISSP include security administration procedures, security architecture and test systems, connection permission methodology, applications development security, business processes security, physical security, encryption, communications, Internet security, and business continuity planning. Read additional details about Progent's CISSP Consulting Expertise.

  • ISSAP Consulting Services
    Progent's ISSAP certified security experts are consultants who have been awarded ISSAP accreditation as a result of rigorous testing and significant experience. field experience with information security design. ISSAP consultants possess comprehensive understanding of access management mechanisms and techniques, phone system and network infrastructure security, cryptography, requirements analysis, BCP and disaster recovery planning (DRP), and physical security. Progent's ISSAP-certified security consultants can assist your company with all aspects of architecture security. Find out additional information concerning Progent's ISSAP Certified Protected IT Architecture Consulting Services.

  • Certified Information Systems Auditor Support Expertise
    The Certified Information Systems Auditor (CISA) credential is a recognized achievement that represents expertise in network security auditing. Certified by the American National Standards Institute, the CISA credential requires that consultants pass a comprehensive test given by the ISACA professional group. Progent can provide the expertise of a CISA-certified security audit engineer able to help companies in the areas of IS audit services, information technology governance, network assets and infrastructure planned useful life, information technology service delivery, protecting data resources, and disaster recovery preparedness. Get more information concerning Progent's Certified Information Systems Auditor Professional Services.

  • Global Information Assurance Certification Professional Expertise
    GIAC (Global Information Assurance Certification) was founded in 1999 to validate the knowledge of network security engineers. GIAC's mission is to make sure that an accredited professional has the knowledge needed to provide services in key areas of system, information, and application program security. GIAC accreditations are recognized by companies and government organizations around the world including and the United States National Security Agency (NSA). Progent offers the expertise of GIAC certified consultants for all of the network security services addressed within GIAC certification topics including auditing networks, security incident handling, traffic analysis, and web services security. Find out additional information about Progent's GIAC (Global Information Assurance Certification) Support Expertise.
Contact Progent for Computer Security Expertise
If you're trying to find network security expertise, telephone Progent at 800-993-9400 or go to Contact Progent.

© 2002- 2018 Progent Corporation. All rights reserved.