Overview of Progent's Security and Compliance Support Services
Progent's certified network security and compliance experts can provide a wide range of support services intended to help organizations of all sizes to uncover and eliminate security vulnerabilities, defend against assaults, recover from the issues resulting from a breakdown of security, and meet regulatory requirements for protecting data and reporting incidents. Progent offers a choice of service delivery models:

  • On-demand online and on-site assistance invoiced by the minute
  • On-going managed services invoiced at a low fixed monthly fee
  • Value-priced service bundles for a one-time security evaluation
On-demand Security Support Services
Once you register for Progent's services (signing up is free), you can receive on-demand online or on-premises assistance from a Progent security expert. This traditional support model is primarily reactive and geared toward quickly taking care of IT problems that are disrupting your productivity or that have stymied your in-house support staff. Typical scenarios are configuring a firewall appliance or VPN connection, installing a vital security update for a Cisco switch, designing compliant access to a public cloud, or recovering from a ransomware assault. These services are invoiced by the minute, which eliminates the annoying case of getting big bills for fast fixes.

Delivery alternatives for Progent's on-demand support services include:

  • Remote Security Support
    The majority security-related problems can be resolved online through a combination of phone help and a remote connection between Progent's Technical Response Center (TRC) and a customer's computer. Progent's TRC group can provide online security support by offering efficient access to consultants with the background and resources to fix many of the most challenging issues quickly, keeping your service expenses low and minimizing lost productivity.
  • Onsite Security Services
    For cases where onsite assistance is necessary, Progent can dispatch a technical professional to major metropolitan areas across the United States. Progent can also send a security specialist with top certifications and advanced skills to any location in the U.S.
Progent's accredited security consultants are certified to support environments based on Windows, Linux, Apple Mac, Sun, and major versions of UNIX. Progent's wide array of services covers firewall configuration, email and messaging systems, protected system architecture, and data restoration. Progent's technical support team has earned the industry's top security certifications including Certified Information Security Manager and Information System Security Architecture Professional. Progent also offers immediate access to remote Cisco-certified CCIE network infrastructure engineers who can deliver advanced support with tough network integration problems.

ProSight Low-Cost Managed Services for Information Assurance
Progent's affordable ProSight portfolio of outsourced network management services is intended to provide small and mid-size businesses with enterprise-class support and cutting-edge technology for all facets of information assurance and compliance. ProSight managed services offered by Progent include:

  • ProSight Active Security Monitoring (ASM): Next Generation Endpoint Protection and Ransomware Defense
    ProSight Active Security Monitoring (ASM) is an endpoint protection service that incorporates cutting edge behavior-based analysis technology to guard endpoints as well as servers and VMs against new malware assaults such as ransomware and email phishing, which routinely escape traditional signature-matching AV products. ProSight ASM protects on-premises and cloud resources and offers a unified platform to automate the complete malware attack lifecycle including filtering, identification, mitigation, remediation, and forensics. Top capabilities include single-click rollback with Windows Volume Shadow Copy Service (VSS) and automatic network-wide immunization against newly discovered threats. Find out more about Progent's ProSight Active Security Monitoring next-generation endpoint protection and ransomware defense.

  • ProSight Enhanced Security Protection: Unified Endpoint Security
    Progent's ProSight Enhanced Security Protection managed services offer affordable in-depth security for physical and virtual servers, desktops, smartphones, and Exchange email. ProSight ESP uses contextual security and advanced heuristics for continuously monitoring and responding to security assaults from all vectors. ProSight ESP provides firewall protection, intrusion alerts, endpoint management, and web filtering through leading-edge technologies packaged within a single agent accessible from a single control. Progent's data protection and virtualization experts can assist you to design and configure a ProSight ESP environment that addresses your organization's unique needs and that helps you demonstrate compliance with government and industry data security regulations. Progent will help you specify and implement security policies that ProSight ESP will enforce, and Progent will monitor your IT environment and respond to alarms that call for urgent action. Progent can also help you to install and verify a backup and restore system such as ProSight Data Protection Services so you can get back in business rapidly from a destructive cyber attack such as ransomware. Find out more about Progent's ProSight Enhanced Security Protection unified physical and virtual endpoint protection and Exchange filtering.

  • ProSight DPS: Managed Cloud Backup and Recovery
    ProSight Data Protection Services from Progent provide small and medium-sized organizations a low cost end-to-end solution for secure backup/disaster recovery. Available at a fixed monthly cost, ProSight DPS automates and monitors your backup activities and allows rapid recovery of vital files, applications and virtual machines that have become unavailable or damaged as a result of component breakdowns, software glitches, natural disasters, human mistakes, or malware attacks like ransomware. ProSight Data Protection Services can help you protect, recover and restore files, folders, applications, system images, as well as Microsoft Hyper-V and VMware virtual machine images. Critical data can be protected on the cloud, to an on-promises storage device, or mirrored to both. Progent's backup and recovery specialists can provide advanced support to configure ProSight Data Protection Services to to comply with government and industry regulatory standards such as HIPPA, FINRA, and PCI and, when necessary, can help you to restore your business-critical data. Learn more about ProSight Data Protection Services Managed Cloud Backup and Recovery.

  • ProSight Email Guard: Spam Filtering, Data Leakage Protection and Content Filtering
    ProSight Email Guard is Progent's email filtering and encryption platform that uses the technology of top data security companies to provide centralized management and world-class security for all your email traffic. The hybrid structure of Email Guard managed service combines a Cloud Protection Layer with a local security gateway appliance to provide advanced protection against spam, viruses, Dos Attacks, Directory Harvest Attacks, and other email-based threats. The cloud filter acts as a first line of defense and blocks the vast majority of threats from reaching your network firewall. This decreases your vulnerability to external threats and conserves network bandwidth and storage. Email Guard's onsite security gateway appliance adds a deeper level of inspection for inbound email. For outbound email, the on-premises security gateway provides anti-virus and anti-spam filtering, policy-based Data Loss Prevention, and email encryption. The onsite security gateway can also help Microsoft Exchange Server to track and protect internal email that originates and ends within your corporate firewall. Find out more about Progent's ProSight Email Guard spam filtering, virus blocking, content filtering and data leakage prevention.

  • ProSight WAN Watch: Infrastructure Remote Monitoring and Management
    Progentís ProSight WAN Watch is a network infrastructure management service that makes it easy and inexpensive for small and mid-sized organizations to diagram, monitor, enhance and troubleshoot their networking hardware such as switches, firewalls, and load balancers plus servers, printers, endpoints and other networked devices. Using cutting-edge Remote Monitoring and Management technology, WAN Watch makes sure that network maps are always updated, captures and manages the configuration information of almost all devices connected to your network, monitors performance, and sends notices when potential issues are discovered. By automating tedious management and troubleshooting activities, WAN Watch can cut hours off ordinary tasks such as making network diagrams, expanding your network, finding appliances that need important software patches, or isolating performance problems. Find out more about ProSight WAN Watch network infrastructure management services.

  • ProSight LAN Watch: Server and Desktop Remote Monitoring
    ProSight LAN Watch is Progentís server and desktop monitoring service that uses state-of-the-art remote monitoring and management technology to help keep your IT system running efficiently by tracking the health of critical assets that power your business network. When ProSight LAN Watch detects a problem, an alert is transmitted automatically to your designated IT management personnel and your Progent consultant so any potential problems can be resolved before they can impact productivity Learn more details about ProSight LAN Watch server and desktop monitoring services.

  • ProSight Virtual Hosting: Hosted Virtual Machines at Progent's Tier III Data Center
    With ProSight Virtual Hosting service, a small or mid-size organization can have its key servers and apps hosted in a secure fault tolerant data center on a fast virtual machine host configured and managed by Progent's network support experts. Under the ProSight Virtual Hosting service model, the client retains ownership of the data, the operating system software, and the apps. Because the environment is virtualized, it can be moved immediately to an alternate hosting solution without a lengthy and technically risky reinstallation procedure. With ProSight Virtual Hosting, your business is not tied a single hosting provider. Find out more details about ProSight Virtual Hosting services.

  • ProSight IT Asset Management: Network Infrastructure Documentation Management
    ProSight IT Asset Management service is a cloud-based IT documentation management service that allows you to capture, update, find and protect information related to your network infrastructure, processes, business apps, and services. You can quickly locate passwords or serial numbers and be alerted automatically about upcoming expirations of SSLs or warranties. By updating and managing your network documentation, you can eliminate up to half of time thrown away looking for critical information about your network. ProSight IT Asset Management includes a centralized location for storing and sharing all documents required for managing your network infrastructure such as standard operating procedures and How-To's. ProSight IT Asset Management also supports a high level of automation for collecting and associating IT information. Whether youíre making enhancements, doing regular maintenance, or reacting to an emergency, ProSight IT Asset Management delivers the knowledge you need when you need it. Find out more about Progent's ProSight IT Asset Management service.
ProSight Network Audits
Progent's ProSight Network Audits offer a quick and low-cost alternative for small and mid-size businesses to obtain an unbiased assessment of the overall health of their network. Based on some of the leading remote monitoring and management platforms in the industry, and supervised by Progent's world-class group of IT experts, ProSight Network Audits help you see how closely the configuration of your core infrastructure assets conform to leading practices. The Basic and Advanced options for ProSight Network Audit services are available at a low, one-time cost and provide immediate ROI such as a more manageable Active Directory (AD) environment. Both versions also come with one year of state-of-the-art remote network monitoring and management (RMM). Benefits can include lower-cost management, improved compliance with data security standards, more efficient utilization of network assets, faster problem resolution, more dependable backup and restore, and higher availability. Learn more information about ProSight Network Audits IT infrastructure assessment.

The ProSight Ransomware Preparedness Report
The ProSight Ransomware Preparedness Report service is an affordable service based on a brief phone interview with a Progent backup/recovery expert. The interview is designed to assess your company's preparedness either to block or recover quickly after a ransomware attack. Progent will consult with you personally to gather information concerning your current antivirus tools and backup/recovery system, and Progent will then produce a written Basic Security and Best Practices Report document describing how you can follow best practices to create an efficient security and backup/recovery system that aligns with your business requirements. For more information, refer to The ProSight Ransomware Preparedness Report Service.

Fixed-price Security Assessment and Validation Bundles
Progent has put together a number of fixed-price security and compliance assessment packages that deliver high value by utilizing Progent's enterprise-class network monitoring tools plus Progent's consulting skills to create an objective and thorough evaluation of your IT environment security posture.

  • Security Assessment Service Packages for Small Organizations
    Progent offers two value-priced security inventory scanning packages intended to allow small organizations to obtain a professional security assessment from a certified security consultant. With Progent's External Security Inventory Scan, a consultant administers an extensive assessment of your IT system from outside your corporate firewall to identify possible risks in the security profile you present to the outside. With Progent's Internal Security Inventory Scan, a security consultant runs a network scan using an authorized machine inside your company firewall to evaluate your exposure to inside assaults. The two security inventory services are set up and run from a secured external site. The scan is managed by an engineer who has been awarded advanced security certifications and who creates a report that details and interprets the data captured by the scan and suggests practical enhancements where required.
  • Security Vulnerability Evaluation Bundles for Large Businesses
    Progent has developed three levels of flat-rate security evaluation service bundles intended for large organizations who want to meet compliance standards required by government or industry regulators. Progent's security assessment service packages offer enterprises a chance to obtain an objective assessment at the viability of their security profile. For every security assessment bundle, Progent engineers with advanced security credentials study and report on collected data and provide suggestions for efficient remediation. Each of the network security assessment packages include an added-cost option for onsite consultants anywhere in the United States.
  • Stealth Penetration Testing Services
    Stealth penetration testing, commonly known as PEN testing, is an accepted technique for allowing organizations to find out how vulnerable their network environments are to modern threats. Progent's stealth penetration testing check how well your existing security procedures and platforms resist authorized but unannounced intrusion attempts managed by Progent's certified security experts utilizing advanced hacking methods. Find out about Progent's stealth penetration testing (PEN Test) services.
We've Been Hacked: What Are We Supposed to Do Now?
Network Security ConsultantsIf you are currently experiencing a security emergency and you have no formal recovery plan, refer to Progent's Online Network Support to learn how to get immediate assistance. Progent offers remote assistance from experienced network technicians and can escalate trouble tickets to high-level security specialists if required. Your organization does not have to be a current Progent customer to receive emergency support for a security breakdown, but you can register as a Progent client in advance at no cost and your standing as a registered client could save valuable time when there is a crisis.

Typically, smaller businesses do not have a recovery procedure in case of a successful security breach. This is risky, since the cost of a successful security attack can be even more catastrophic for a small business than for a big enterprise. Progent's security specialists can assist your business to design a practical response and event reporting procedure that reduces the IT system disruption following an attack. The formal post-attack response procedure outlined by Global Information Assurance Certification is Progent's suggested procedure for responding to a major security attack.

High-value Security Expertise Offered by Progent
Progent's seasoned consultants offer advanced support in vital facets of network protection including:

  • Information Risk Evaluation and Compliance Testing
    Progent provides experience with security evaluation tools like MS Baseline Security Analyzer or LANguard from GFI for conducting a variety of automatic network scans to uncover potential security holes. Progent has broad skills with monitoring tools and can assist you to understand audit results and respond efficiently. Progent's security engineers also provide web application validation and can conduct expert evaluation of enterprise-wide security to verify your company's compliance with key worldwide security standards including HIPAA, PCI, and ISO 17799. Also, Progent can evaluate the effectiveness of your wireless protection covering fixed wireless equipment plus mobile devices. Get more information about Progent's Security Vulnerability Evaluation and Compliance Testing.
  • Planning, Implementing, and Validating Secure Networks
    Any company should have a carefully considered security plan that incorporates both proactive and reactive activity. The pre-attack strategy is a collection of precautions that helps to reduce vulnerabilities. The post-attack strategy specifies activities to assist IT personnel to inventory the damage caused by a breach, remediate the damage, record the event, and revive business activity as quickly as feasible. Progent can show you how to design protection into your business operations, install scanning software, define and implement a secure computer infrastructure, and recommend procedures and policies to enhance the protection of your network. Progent's security professionals are ready to help you to set up a firewall, design protected remote connectivity to email and data, and install an effective VPN. If you are interested in an affordable option for outsourcing your network security management, Progent's Round-the-clock Monitoring Packages feature non-stop online server monitoring and fast resolution of problems.
  • Data Recovery and Security Forensics
    Progent provides expertise in restoring systems and computers that have been compromised, are quarantined, or have ceased to function because of a security attack. Progent can help assess the losses resulting from the attack, return your company to ordinary business operations, and retrieve data compromised as a result of the attack. Progent's certified engineers can also perform a comprehensive forensic evaluation by examining event logs and using other proven forensics techniques. Progent's experience with security issues reduces your off-air time and permits Progent to propose effective measures to prevent or mitigate new assaults.
  • Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Series Firewalls, and PIX 500 Firewalls Configuration and Troubleshooting
    Cisco Certified CCIE Security ConsultantsThe latest generation of ASA 5500-X Series of firewalls with Firepower Services deliver substantially more performance than Cisco's previous PIX and ASA 5500 firewalls and have superseded the ASA 5500 and PIX 500 security appliances for all new installations. After Cisco's acquisition of Sourcefire, the entire line of Cisco ASA 5500-X devices can be configured to enable Firepower Services, based on Sourcefire's Snort product, which is the market's most popular network intrusion protection system (IPS). Firepower services provide enhanced capabilities including advanced malware protection (AMP), URL filtering, dynamic threat analytics, and security automation. Progent's Cisco-qualified CCIE network consultants can help your company to maintain your existing PIX or Cisco ASA 5500 firewalls and migrate efficiently to ASA 5500-X firewalls with Firepower Services. Progent's consultants can provide remote and onsite help with ASA 5500-X firewalls with Firepower Services and can help your organization to plan, deploy, optimize, manage and troubleshoot firewall environments based around Cisco ASA 5500-X firewalls with Firepower Services. Learn more details about Cisco ASA Firewalls with Firepower Services configuration and debugging support.
  • Additional Firewall and VPN Solutions
    As well as supporting a wide range of network security solutions available from Microsoft and Cisco, Progent offers small and mid-size businesses top-level engineering services for solutions from other popular firewall and Virtual Private Network suppliers including:
  • SIEM Security Information and Event Management Solutions
    Security information and event management (SIEM) software and services are designed to digest the massive quantity of information collected in security incident records created by a wide range of sources such as network infrastructure appliances, operating systems, and application software and monitoring tools. SIEM applications organizes the security event records from these diverse sources and produces consolidated reports of security events as mandated by state regulations and industry compliance standards. Progent's GIAC-certified computer security experts and Cisco-certified network experts can help organizations to design, install and manage a SIEM solution that enables them to understand the behavior of attacks and comply with security incident reporting requirements. (See Progent's SIEM solutions.)
Progent's Security Accreditations
Progent's security specialists have been awarded some of the most respected accreditations available in the industry. These accreditations require exhaustive testing and demonstrated work background to ensure that candidates have mastered a significant body of security knowledge and techniques and can provide high-level security solutions to information environments of any complexity.
  • CISM Security Support Services
    Certified Information Security Manager (CISM) defines the basic skills and worldwide benchmarks of performance that computer security managers are required to master. It offers business management the assurance that consultants who have earned their certification have the background and knowledge to provide effective security management and consulting support. Progent can provide a CISM expert to help your enterprise in critical security areas including information security governance, vulnerability assessment, data security process control, and incident response management. Find out additional details concerning Progent's CISM Security Consulting Services.

  • CISSP Security Consulting Expertise
    Progent's Certified Information Systems Security Professionals (CISSPs) are security specialists who have earned CISSP status as a result of verified professional work, rigorous study, and exhaustive examination. CISSP qualification recognizes mastery of an international standard for IT security. American National Standards Institute has granted the CISSP credential accreditation in the field of IT security under ISO/IEC 17024. Areas of knowledge included within CISSP include security management practices, security architecture and models, connection control systems, applications development security, operations security, hardware security, encryption, communications, Internet security, and disaster recovery planning. Find out more details concerning Progent's CISSP Consulting Assistance.

  • CISSP-ISSAP} Cybersecurity Architecture Consulting Services
    Progent's CISSP-ISSAP certified cybersecurity architecture experts have earned ISSAP certification following rigorous examination and substantial hands-on work with network security design. ISSAP security experts possess in-depth understanding of access management systems and methodologies, phone system and network protection, cryptography, requirements analysis, business continuity and DRP, and physical security. Progent's CISSP-ISSAP-certified security consultants can assist your business with all aspects of secure network architecture. Get additional details about Progent's ISSAP Accredited Protected System Architecture Consulting Services.

  • Certified Information Systems Auditor (CISA) Consulting Services
    The CISA accreditation is a recognized qualification that indicates expertise in IS security auditing. Certified by the American National Standards Institute, the CISA credential requires that consultants pass an exhaustive test administered by the ISACA professional group. Progent can provide the services of a CISA-certified security professional able to assist businesses in the fields of information systems audit services, information technology administration, network assets and architecture lifecycle, IT service delivery, protecting data assets, and disaster recovery planning. Find out more details about Progent's Certified Information Systems Auditor Support Expertise.

  • CRISC-certified Risk Management Specialists
    The Certified in Risk and Information Systems Control (CRISC) program was established by ISACA in 2010 to verify a consultant's skills to design, deploy, and maintain information system controls to mitigate network risk. Progent can provide the expertise of a CRISC-certified consultant to assist your company to create and execute a business continuity plan that follows leading practices promoted by CRISC and geared to match your company's risk tolerance, business goals, and budgetary guidelines. Progent's risk mitigation expertise is complementary to the support provided by Progent's CISA-certified consultants for impartially evaluating your IT management design and with the services of Progent's CISM-certified consultants for defining company-wide security policies. Read more information about Progent's CRISC-certified IT Risk Management Services.

  • GIAC (Global Information Assurance Certification) Consulting Expertise
    Global Information Assurance Certification was founded in 1999 to certify the skill of information technology security professionals. GIAC's goal is to verify that an accredited security consultant has the knowledge appropriate to provide support in critical areas of network, data, and software security. GIAC accreditations are acknowledged by companies and institutions throughout the world including and the United States NSA. Progent can provide the help of certified professionals for all of the network security services addressed under GIAC certification topics including assessing perimeters, security incident handling, traffic analysis, and web application security. Get the details concerning Progent's GIAC Professional Assistance.
Get in Touch with Progent for Computer Security Consulting Services
If you want computer security engineering help, call Progent at 800-993-9400 or refer to Contact Progent.

© 2002- 2019 Progent Corporation. All rights reserved.