Introduction to Progent's Security and Compliance Consulting Services
Progent's certified computer security and compliance consultants can provide a wide range of services designed to help businesses of all sizes to identify and correct security vulnerabilities, block assaults, recover from any problems resulting from a breach of security, and comply with government requirements for guarding information and reporting incidents. Progent can provide a choice of service delivery models:

  • As-needed online and on-site support invoiced by the minute
  • On-going fully managed services billed at a low fixed monthly rate
  • Set-price service packages for a one-time security and compliance evaluation
As-needed Security and Compliance Support Services
Once you sign up for Progent's services (registration is free), you can receive as-needed remote or on-premises assistance from one of Progent security and compliance expert. This traditional service model is primarily reactive and geared toward quickly taking care of IT problems that are disrupting your network or that have stymied your in-house support staff. Typical scenarios include replacing a firewall appliance or VPN tunnel, implementing a vital security update for a Cisco switch, setting up secure access to a public cloud, or recovering from a ransomware assault. These services are billed by the minute, which eliminates the annoying situation of receiving big invoices for quick repairs.

Delivery options for Progent's on-demand support services include:

  • Online Security Services
    Most security problems can be handled online via a mix of phone help and a remote Internet connection between Progent's Technical Response Center (TRC) and a client's network. Progent's Technical Response Center can provide online security support by offering efficient access to consultants who have the background and resources to resolve some of the most difficult problems quickly, making your support costs low and minimizing lost productivity.
  • On-premises Security Support
    For cases where onsite support is required, Progent can send a technical professional to major metropolitan areas throughout the U.S. Progent can also send a security consultant with top certifications and world-class skills to any location in the U.S.
Progent's accredited consultants are certified to support environments based on Microsoft, Linux, Mac OS X, Sun, and popular derivatives of UNIX. Progent's wide selection of consulting services encompasses firewall technology, e-mail systems, protected system architecture, and data restoration. Progent's technical support team has been awarded the industry's most advanced security accreditations including GIAC (Global Information Assurance Certification) and Certified Information Systems Security Professional (CISSP). Progent also can provide immediate access to online Cisco CCIE network consultants who can provide advanced support with tough network configuration issues.

ProSight Flat-rate Managed Services for Information Assurance
Progent's low-cost ProSight series of managed services is intended to provide small and mid-size businesses with enterprise-class support and state-of-the-art technology for all aspects of information assurance and compliance. Managed services available from Progent include:

  • ProSight Email Guard: Inbound and Outbound Spam Filtering, Data Leakage Protection and Content Filtering
    ProSight Email Guard is Progent's email filtering and encryption platform that uses the technology of top data security vendors to provide centralized control and world-class protection for your inbound and outbound email. The powerful structure of Progent's Email Guard integrates a Cloud Protection Layer with an on-premises gateway appliance to offer complete defense against spam, viruses, Dos Attacks, DHAs, and other email-borne threats. The Cloud Protection Layer serves as a first line of defense and keeps the vast majority of unwanted email from reaching your network firewall. This reduces your exposure to external threats and conserves system bandwidth and storage space. Email Guard's onsite gateway appliance adds a further layer of analysis for inbound email. For outgoing email, the local gateway offers anti-virus and anti-spam filtering, DLP, and email encryption. The on-premises security gateway can also assist Exchange Server to track and safeguard internal email that originates and ends within your corporate firewall. Find out more about Progent's ProSight Email Guard spam filtering, virus defense, content filtering and data leakage prevention.

  • ProSight Active Security Monitoring (ASM): Next Generation Endpoint Protection and Ransomware Defense
    Progent's ProSight Active Security Monitoring (ASM) is an endpoint protection solution that utilizes cutting edge behavior-based analysis technology to guard endpoint devices and servers and VMs against new malware attacks like ransomware and file-less exploits, which easily evade legacy signature-based AV products. ProSight Active Security Monitoring protects local and cloud resources and provides a single platform to automate the entire threat lifecycle including blocking, identification, containment, remediation, and forensics. Top features include one-click rollback using Windows Volume Shadow Copy Service (VSS) and automatic network-wide immunization against new attacks. Read more about Progent's ProSight Active Security Monitoring (ASM) endpoint protection and ransomware recovery.

  • ProSight DPS: Managed Backup
    ProSight Data Protection Services offer small and medium-sized businesses an affordable and fully managed service for reliable backup/disaster recovery (BDR). Available at a fixed monthly price, ProSight DPS automates your backup activities and enables fast restoration of critical data, apps and virtual machines that have become lost or corrupted due to component failures, software glitches, disasters, human mistakes, or malware attacks such as ransomware. ProSight Data Protection Services can help you back up, recover and restore files, folders, applications, system images, as well as Hyper-V and VMware images. Important data can be backed up on the cloud, to a local storage device, or mirrored to both. Progent's BDR consultants can deliver world-class expertise to set up ProSight DPS to to comply with regulatory requirements like HIPPA, FINRA, PCI and Safe Harbor and, whenever needed, can help you to restore your business-critical information. Read more about ProSight Data Protection Services Managed Cloud Backup and Recovery.

  • ProSight WAN Watch: Infrastructure Management
    Progentís ProSight WAN Watch is an infrastructure monitoring and management service that makes it simple and inexpensive for small and mid-sized businesses to diagram, track, reconfigure and debug their networking hardware like switches, firewalls, and load balancers as well as servers, client computers and other networked devices. Incorporating state-of-the-art Remote Monitoring and Management (RMM) technology, WAN Watch makes sure that infrastructure topology diagrams are kept updated, copies and manages the configuration information of almost all devices on your network, monitors performance, and sends alerts when problems are detected. By automating complex management and troubleshooting activities, WAN Watch can cut hours off ordinary tasks like making network diagrams, reconfiguring your network, locating appliances that require critical updates, or isolating performance problems. Learn more details about ProSight WAN Watch network infrastructure management consulting.

  • ProSight LAN Watch: Server and Desktop Monitoring and Management
    ProSight LAN Watch is Progentís server and desktop remote monitoring service that incorporates advanced remote monitoring and management (RMM) technology to keep your IT system operating at peak levels by checking the state of critical assets that drive your information system. When ProSight LAN Watch detects an issue, an alarm is sent immediately to your designated IT personnel and your assigned Progent consultant so any looming problems can be addressed before they can disrupt productivity Find out more details about ProSight LAN Watch server and desktop remote monitoring consulting.

  • ProSight Virtual Hosting: Hosted Virtual Machines at Progent's Tier III Data Center
    With ProSight Virtual Hosting service, a small or mid-size organization can have its key servers and apps hosted in a secure fault tolerant data center on a fast virtual host configured and managed by Progent's network support professionals. With Progent's ProSight Virtual Hosting service model, the client retains ownership of the data, the operating system software, and the applications. Since the environment is virtualized, it can be ported easily to an alternate hardware environment without a lengthy and difficult reinstallation process. With ProSight Virtual Hosting, you are not locked into a single hosting provider. Find out more details about ProSight Virtual Hosting services.

  • ProSight IT Asset Management: Network Documentation Management
    Progent's ProSight IT Asset Management service is a cloud-based IT documentation management service that allows you to create, maintain, retrieve and protect data about your IT infrastructure, processes, applications, and services. You can instantly locate passwords or IP addresses and be warned automatically about upcoming expirations of SSL certificates ,domains or warranties. By cleaning up and managing your IT documentation, you can eliminate as much as 50% of time thrown away searching for critical information about your network. ProSight IT Asset Management includes a common repository for storing and collaborating on all documents required for managing your business network like standard operating procedures and How-To's. ProSight IT Asset Management also offers a high level of automation for gathering and relating IT information. Whether youíre making enhancements, doing regular maintenance, or reacting to an emergency, ProSight IT Asset Management gets you the information you need as soon as you need it. Learn more details about ProSight IT Asset Management service.
ProSight Network Audits
Progent's ProSight Network Audits are a fast and low-cost way for small and medium-size organizations to obtain an unbiased assessment of the overall health of their network. Powered by a selection of the top remote monitoring and management platforms available, and supervised by Progent's world-class team of IT professionals, ProSight Network Audits help you see how closely the deployment of your core network devices conform to industry leading practices. The Basic and Advanced options for ProSight Network Audit services are offered at a low, one-time cost and deliver instant benefits like a cleaner Active Directory (AD) system. Both also come with a year of cutting-edge remote network monitoring and management. Benefits can include lower-cost management, improved compliance with government and industry security requirements, higher utilization of network resources, quicker problem resolution, more reliable backup and recovery, and less downtime. Learn more information about ProSight Network Audits IT infrastructure review.

The ProSight Ransomware Preparedness Report
The ProSight Ransomware Preparedness Report service is a low-cost service built around a phone interview with a Progent backup/recovery consultant. The fact-finding interview is designed to help assess your organization's ability to stop or recover rapidly from a ransomware incident. Progent will work with you personally to gather information concerning your existing antivirus tools and backup/recovery platform, and Progent will then deliver a written Basic Security and Best Practices Report describing how you can follow best practices to create an efficient AV and backup environment that aligns with your business requirements. For more information, see The ProSight Ransomware Preparedness Report Service.

Set-price Security Assessment and Verification Packages
Progent offers a variety of set-price security and compliance evaluation bundles that deliver exceptional value by deploying Progent's enterprise-class system monitoring software as well as Progent's technical skills to create an objective and comprehensive assessment of your network security profile.

  • Security Assessment Service Bundles for Small Businesses
    Progent offers two value-priced security inventory packages designed to enable small businesses to obtain a professional security evaluation from an accredited security engineer. With Progent's External Security Inventory Scan, a consultant administers a comprehensive assessment of your IT system from beyond your firewalled perimeter to identify possible risks in the security profile you expose to the outside world. With Progent's Internal Security Inventory Scan, a security expert executes a network scan using an authorized machine inside your company firewall to assess your exposure to inside threats. The two security inventory scanning services are set up and executed from a secured external site. The project is managed by a consultant who has earned advanced security certifications and who produces a document that details and interprets the data captured by the security scan and recommend practical improvements where appropriate.
  • Security Vulnerability Evaluation Bundles for Large Businesses
    Progent offers three levels of flat-rate security evaluation service packages intended for large organizations who want to meet security standards required by state or industry agencies. Progent's security assessment service packages offer larger organizations a chance to get an objective assessment at the strength of their security profile. For each security assessment package, Progent consultants with top security credentials study and report on captured data and provide recommendations for cost-effective improvements. Each of the network security assessment bundles include an added-cost option for on-premises consultants at any location in the U.S.
  • Stealth Penetration Testing
    Stealth penetration testing, often called PEN testing, is an accepted tool for allowing businesses to determine how vulnerable their IT environments are to current-generation threats. Progent's stealth penetration testing test how well your existing security procedures and platforms stand up to authorized but unannounced intrusion attempts managed by Progent's veteran security experts using advanced hacking methods. Read about Progent's stealth penetration testing (PEN Test) services.
Our Network Has Been Hacked: What Are We Supposed to Do Now?
Network Security ConsultantsIf you are now fighting a network security emergency and you do not have a detailed recovery plan, go to Progent's Online Computer Support to find out how to receive fast help. Progent provides online technical support from experienced engineers and can refer trouble tickets to high-level security experts if necessary. Your company does not have to be a registered Progent customer to get emergency support for a security breakdown, but you can register as a Progent client in advance at no cost and your status as a current client can save precious time when there is an emergency.

Typically, smaller businesses have no response plan in the event of a damaging security breach. This is risky, since the cost of a successful security assault can be even more catastrophic for a small company than for a big corporation. Progent's security specialists can assist your you to create a practical response and incident reporting plan that reduces the network downtime following a security breach. The formal post-attack response procedure outlined by GIAC is Progent's preferred procedure for reacting to a major security incident.

High-value Security Expertise Offered by Progent
Progent's certified security consultants offer advanced support in key areas of computer protection such as:

  • Vulnerability Evaluation and Compliance Assessment
    Progent offers experience with security auditing software like Microsoft Baseline Security Analyzer and LANguard for performing a variety of automatic system scans to identify potential security problems. Progent has broad skills with scanning tools and can assist you to understand assessment reports and react appropriately. Progent's certified security consultants also offer web application validation and can perform thorough assessments of enterprise-wide security to verify your organization's compliance with key global security specifications such as HIPAA, PCI, and ISO. In addition, Progent can evaluate the effectiveness of your wireless protection covering stationary wireless equipment as well as mobile handsets. Read more details about Progent's Information Risk Audits and Compliance Assessment.
  • Designing, Implementing, and Testing Secure Networks
    Every company should have a thoroughly considered security strategy that includes both proactive and responsive steps. The proactive strategy is a collection of steps that helps to reduce security holes. The post-attack plan defines procedures to assist IT staff to inventory the damage resulting from an attack, repair the damage, record the experience, and restore business activity as soon as possible. Progent can advise you how to incorporate security into your company operations, configure auditing utilities, define and execute a secure network infrastructure, and propose procedures and policies to optimize the protection of your information system. Progent's security experts are available to help you to configure a firewall, deploy safe offsite access to email and data, and configure an effective VPN. If your company is interested in an affordable option for jobbing out your security administration, Progent's Round-the-clock Network Support Packages include non-stop online network tracking and immediate resolution of problems.
  • System Restoration and Security Forensics
    Progent offers expertise in recovering networks and devices that have been hacked, are quarantined, or have stopped working as a result of a security breach. Progent can help assess the losses resulting from the assault, restore ordinary business operations, and retrieve information compromised as a result of the attack. Progent's certified specialists can also manage a thorough forensic analysis by examining event logs and using a variety of advanced assessment techniques. Progent's background with security consulting reduces your off-air time and allows Progent to suggest efficient ways to avoid or mitigate new attacks.
  • Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Series Firewalls, and PIX 500 Firewalls Integration and Debugging
    Cisco CCIE Network Security ExpertsThe latest generation of ASA 5500-X Series Next-Generation Firewalls with Firepower Services provide significantly more performance than Cisco's earlier PIX and ASA 5500 firewalls and have replaced the ASA 5500 and PIX 500 security appliances for all new installations. Following Cisco's acquisition of Sourcefire, the whole line of Cisco ASA 5500-X devices can be provisioned to enable Firepower Services, built on Sourcefire's Snort technology, which is the world's most deployed intrusion protection system (IPS). Firepower services provide powerful new features such as advanced malware protection (AMP), URL filtering, dynamic threat analytics, and security automation. Progent's Cisco-qualified CCIE network experts can help your company to maintain your legacy PIX or ASA 5500 security appliances or migrate to ASA 5500-X firewalls with Firepower Services. Progent's consultants offer remote and on-premises support for ASA 5500-X firewalls with Firepower Services and can help your business to plan, integrate, tune, manage and troubleshoot firewall environments based around Cisco ASA 5500-X firewalls with Firepower Services. Learn more information about Cisco ASA 5500-X Firewalls with Firepower integration and debugging services.
  • Other Firewall and VPN Consulting Services
    As well as supporting a wide array of protection solutions from Microsoft and Cisco, Progent offers small organizations top-level support for products from other important firewall and Virtual Private Network vendors including:
  • SIEM Integration and Support
    Security information and event management (SIEM) applications and services are designed to make sense the massive amounts of data represented by security incident records created by multiple sources such as network infrastructure appliances, servers, and applications and monitoring tools. SIEM software analyzes the security event records from these various sources and produces consolidated reports of security events as required by state regulations and industry compliance standards. Progent's GIAC-certified information assurance experts and Cisco CCIE certified network experts can help businesses to plan, deploy and manage a SIEM solution that enables them to understand the behavior of security incidents and comply with event reporting regulations. (Visit Progent's SIEM solutions.)
Progent's Security Accreditations
Progent's security consultants have been awarded the most respected accreditations available in the security industry. These accreditations demand extensive examinations and demonstrated work background to ensure that recipients have mastered a substantial body of security knowledge and techniques and can offer advanced solutions to information environments of any size.
  • Certified Information Security Manager (CISM) Security Support Services
    CISM defines the basic skills and international standards of performance that IT security managers are expected to master. CISM provides business management the confidence that consultants who have been awarded their accreditation possess the experience and knowledge to provide effective security management and engineering support. Progent can offer a CISM expert to help your enterprise in vital security areas including information protection governance, vulnerability management, information security process management, and crisis handling management. Get more details about Progent's Certified Information Security Manager (CISM) Security Consulting Expertise.

  • Certified Information Systems Security Professionals (CISSP) Security Consulting Expertise
    Progent's CISSP consultants are security specialists who have earned CISSP accreditation as a result of demonstrated professional work, rigorous study, and exhaustive testing. CISSP Certification recognizes mastery of a worldwide standard for information security. American National Standards Institute has given the CISSP status accreditation in the area of information security under ISO/IEC 17024. Fields of knowledge included under CISSP include security administration procedures, security architecture and test systems, connection control methodology, software development security, operations security, physical security, encryption, communications, Internet security, and business continuity planning. Learn more information concerning Progent's Certified Information Systems Security Professionals (CISSP) Support Expertise.

  • ISSAP Engineering Support
    Progent's ISSAP certified security consultants are experts who have been awarded ISSAP status after thorough examination and substantial hands-on work with network security architecture. ISSAP consultants possess comprehensive understanding of access management mechanisms and methodologies, telecommunications and network protection, cryptography, needs evaluation, business continuity planning (BCP) and DRP, and physical security integration. Progent's ISSAP-qualified security experts can assist your business with all phases of architecture security. Find out the details about Progent's ISSAP Certified Secure IT Infrastructure Engineering Support.

  • Certified Information Systems Auditor (CISA) Support Services
    The Certified Information Systems Auditor accreditation is a globally recognized qualification that represents expertise in information system security auditing. Accredited by the American National Standards Institute (ANSI), the CISA accreditation has consultants undergo an extensive test administered by the ISACA professional association. Progent can provide the services of a CISA-certified security consultant able to help companies in the areas of information systems audit process, information technology enforcement, systems and architecture lifecycle, IT service delivery, protecting information resources, and disaster recovery preparedness. Find out more information concerning Progent's CISA Consulting Expertise.

  • GIAC Consulting Services
    GIAC (Global Information Assurance Certification) was founded in 1999 to validate the knowledge of computer security experts. GIAC's goal is to assure that a certified professional possesses the knowledge needed to deliver services in key areas of network, data, and application security. GIAC accreditations are acknowledged by companies and institutions all over the world including and the United States National Security Agency (NSA). Progent can provide the support of GIAC certified security engineers for any of the network security capabilities addressed under GIAC accreditation topics such as auditing perimeters, security incident response, traffic analysis, and web-based services security. Learn additional information about Progent's GIAC (Global Information Assurance Certification) Professional Assistance.
Depend on Progent for Network Security Support
If you need security consulting, telephone Progent at 800-993-9400 or refer to Contact Progent.

© 2002- 2018 Progent Corporation. All rights reserved.