Overview of Progent's Security and Compliance Consulting Services
Progent's industry certified network security consultants offer a broad selection of support services designed to help companies of all sizes to uncover and correct security vulnerabilities, block assaults, recover from any issues caused by a breach of security, and meet regulatory mandates for protecting information and reporting incidents. Progent can provide a selection of service modes:

  • On-demand online and on-premises support billed to the nearest minute
  • Continual fully managed services billed at a low flat monthly fee
  • Set-price service bundles for a one-time security evaluation
As-needed Security and Compliance Consulting Services
Once you register for Progent's services (signing up is free), you can get on-demand online or onsite support from a Progent security and compliance expert. This classic service model is essentially reactive and optimized for quickly resolving technical problems that are disrupting your network or that have stumped your own support staff. Typical examples include configuring a firewall or VPN connection, installing a vital security update for a Cisco switch, setting up compliant access to cloud-based resources, or recovering from a ransomware attack. These security services are invoiced by the minute, which avoids the frustrating case of getting big invoices for fast fixes.

Delivery alternatives for Progent's as-needed support services include:

  • Online Security Support
    Most security-related problems can be resolved remotely via a mix of phone support and a remote connection between Progent's Technical Response Center (TRC) and a customer's computer. Progent's Technical Response Center can provide remote security support by offering easy access to consultants who have the experience and resources to fix many of the most challenging problems quickly, keeping your service expenses low and reducing downtime.
  • On-premises Security Services
    For cases where on-premises assistance is necessary, Progent can dispatch a technical professional to major metropolitan areas across the U.S. Progent can also dispatch a security specialist with top certifications and world-class skills to any location in the U.S.
Progent's accredited consultants are qualified to provide help for environments based on Microsoft Windows, Linux, Apple Mac, Solaris, and popular versions of UNIX. Progent's broad range of services encompasses firewall technology, e-mail systems, secure system design, and information restoration. Progent's technical support staff has earned the industry's top security credentials including Certified Information Security Manager (CISM) and Information System Security Architecture Professional. Progent also can provide fast access to online Cisco-certified CCIE network consultants who can provide advanced support with complex network configuration problems.

ProSight Flat-rate Managed Services for Information Assurance
Progent's low-cost ProSight suite of network management outsourcing services is designed to provide small and mid-size organizations with enterprise-class support and cutting-edge technology for all facets of information assurance. ProSight managed services offered by Progent include:

  • ProSight Active Security Monitoring (ASM): Endpoint Protection and Ransomware Recovery
    ProSight Active Security Monitoring is an endpoint protection service that utilizes next generation behavior analysis technology to defend endpoints and servers and VMs against modern malware assaults like ransomware and email phishing, which routinely get by traditional signature-based anti-virus products. ProSight ASM safeguards on-premises and cloud-based resources and provides a unified platform to manage the entire threat progression including filtering, identification, containment, remediation, and forensics. Key features include single-click rollback using Windows Volume Shadow Copy Service (VSS) and automatic system-wide immunization against new attacks. Learn more about Progent's ProSight Active Security Monitoring endpoint protection and ransomware recovery.

  • ProSight Enhanced Security Protection: Unified Endpoint Security
    Progent's ProSight Enhanced Security Protection (ESP) services offer affordable in-depth protection for physical and virtual servers, desktops, mobile devices, and Microsoft Exchange. ProSight ESP uses adaptive security and modern behavior analysis for continuously monitoring and responding to security assaults from all attack vectors. ProSight ESP provides two-way firewall protection, intrusion alerts, endpoint control, and web filtering through cutting-edge tools packaged within a single agent managed from a unified console. Progent's data protection and virtualization consultants can help your business to design and implement a ProSight ESP deployment that meets your organization's unique requirements and that allows you demonstrate compliance with government and industry data protection regulations. Progent will assist you specify and implement security policies that ProSight ESP will manage, and Progent will monitor your IT environment and respond to alarms that require urgent attention. Progent can also help you to install and verify a backup and restore system like ProSight Data Protection Services (DPS) so you can recover quickly from a potentially disastrous security attack like ransomware. Learn more about Progent's ProSight Enhanced Security Protection (ESP) unified physical and virtual endpoint security and Exchange email filtering.

  • ProSight DPS: Managed Cloud Backup
    ProSight Data Protection Services from Progent provide small and medium-sized organizations an affordable end-to-end solution for reliable backup/disaster recovery. For a low monthly price, ProSight Data Protection Services automates your backup activities and enables fast restoration of critical data, applications and VMs that have become unavailable or damaged due to component breakdowns, software bugs, natural disasters, human error, or malicious attacks such as ransomware. ProSight DPS can help you back up, recover and restore files, folders, applications, system images, plus Microsoft Hyper-V and VMware images. Critical data can be protected on the cloud, to an on-promises device, or mirrored to both. Progent's backup and recovery specialists can deliver advanced expertise to set up ProSight Data Protection Services to to comply with regulatory standards like HIPPA, FIRPA, PCI and Safe Harbor and, when needed, can help you to recover your business-critical data. Read more about ProSight Data Protection Services Managed Backup.

  • ProSight Email Guard: Inbound and Outbound Spam Filtering, Data Leakage Protection and Email Encryption
    ProSight Email Guard is Progent's email filtering and encryption solution that uses the services and infrastructure of leading information security vendors to provide web-based control and world-class protection for your email traffic. The powerful architecture of Email Guard managed service combines a Cloud Protection Layer with an on-premises security gateway device to offer advanced protection against spam, viruses, Denial of Service Attacks, DHAs, and other email-based threats. The cloud filter serves as a preliminary barricade and blocks most threats from making it to your security perimeter. This decreases your exposure to external threats and saves network bandwidth and storage. Email Guard's onsite security gateway appliance provides a further layer of analysis for inbound email. For outbound email, the local gateway provides AV and anti-spam protection, protection against data leaks, and email encryption. The onsite gateway can also help Microsoft Exchange Server to monitor and protect internal email traffic that stays within your security perimeter. Find out more about Progent's ProSight Email Guard spam filtering, virus blocking, email content filtering and data loss prevention.

  • ProSight WAN Watch: Infrastructure Management
    ProSight WAN Watch is a network infrastructure management service that makes it easy and affordable for small and mid-sized businesses to map, monitor, enhance and troubleshoot their networking hardware like routers, firewalls, and load balancers plus servers, endpoints and other devices. Incorporating state-of-the-art Remote Monitoring and Management technology, WAN Watch ensures that network diagrams are kept updated, copies and displays the configuration information of virtually all devices on your network, tracks performance, and sends notices when problems are discovered. By automating complex management and troubleshooting processes, WAN Watch can knock hours off ordinary chores such as network mapping, expanding your network, finding appliances that require important software patches, or resolving performance bottlenecks. Find out more details about ProSight WAN Watch infrastructure management services.

  • ProSight LAN Watch: Server and Desktop Remote Monitoring
    ProSight LAN Watch is Progentís server and desktop remote monitoring service that incorporates advanced remote monitoring and management (RMM) technology to keep your network operating at peak levels by tracking the state of critical computers that power your information system. When ProSight LAN Watch uncovers a problem, an alert is sent immediately to your specified IT staff and your assigned Progent consultant so all looming problems can be addressed before they have a chance to impact your network Learn more details about ProSight LAN Watch server and desktop remote monitoring consulting.

  • ProSight Virtual Hosting: Hosted Virtual Machines at Progent's Tier III Data Center
    With ProSight Virtual Hosting service, a small or mid-size organization can have its critical servers and apps hosted in a secure fault tolerant data center on a fast virtual host configured and maintained by Progent's IT support experts. With the ProSight Virtual Hosting service model, the customer retains ownership of the data, the OS software, and the apps. Since the system is virtualized, it can be ported immediately to a different hardware solution without requiring a lengthy and difficult reinstallation procedure. With ProSight Virtual Hosting, your business is not locked into a single hosting service. Learn more details about ProSight Virtual Hosting services.

  • ProSight IT Asset Management: Network Infrastructure Documentation Management
    ProSight IT Asset Management service is a cloud-based IT documentation management service that makes it easy to capture, update, find and protect information about your IT infrastructure, procedures, applications, and services. You can quickly locate passwords or IP addresses and be warned about upcoming expirations of SSL certificates or domains. By cleaning up and managing your IT documentation, you can save as much as half of time thrown away trying to find vital information about your network. ProSight IT Asset Management features a common location for holding and collaborating on all documents required for managing your business network like standard operating procedures and How-To's. ProSight IT Asset Management also offers advanced automation for collecting and relating IT information. Whether youíre planning improvements, performing regular maintenance, or responding to an emergency, ProSight IT Asset Management gets you the data you require when you need it. Learn more details about ProSight IT Asset Management service.
ProSight Network Audits
Progent's ProSight Network Audits offer a fast and low-cost way for small and medium-size businesses to get an unbiased evaluation of the overall health of their information system. Powered by a selection of the top remote monitoring and management tools available, and supervised by Progent's certified team of IT experts, ProSight Network Audits show you how well the deployment of your core infrastructure devices conform to leading practices. Both the Basic and Advanced versions of ProSight Network Audit services are offered at a budget-friendly, one-time cost and deliver immediate ROI like a more manageable Active Directory (AD) environment. Both versions also come with one year of cutting-edge remote network monitoring and management (RMM). Benefits can include simpler management, better compliance with government and industry security standards, more efficient utilization of network assets, quicker problem resolution, more dependable backup and recovery, and higher availability. See more information about ProSight Network Audits IT infrastructure assessment.

Progent's ProSight Ransomware Preparedness Report
The ProSight Ransomware Preparedness Report is an affordable service based on a brief phone interview with a Progent information assurance expert. The interview is designed to help assess your organization's ability to block or recover quickly after a ransomware incident. Progent will consult with you personally to gather information about your existing security profile and backup/recovery system, and Progent will then produce a custom Basic Security and Best Practices Report document describing how you can follow industry best practices to build a cost-effective AV and backup environment that aligns with your business requirements. For more information, visit Progent's ProSight Ransomware Preparedness Report Service.

Fixed-price Security Assessment and Validation Packages
Progent has put together a number of set-price security evaluation packages that deliver exceptional value by utilizing Progent's advanced system monitoring software as well as Progent's technical experience to produce an objective and comprehensive evaluation of your network security profile.

  • Security Inventory Service Bundles for Small Businesses
    Progent offers two value-priced security inventory packages designed to enable small businesses to get an objective security evaluation from a certified security engineer. With Progent's External Security Inventory Scan, a consultant manages a comprehensive examination of your IT system from beyond your firewalled perimeter to determine possible risks in the security profile you present to the public. With Progent's Internal Security Inventory Scan, a security consultant runs a network scan using an authorized computer inside your corporate firewall to assess your exposure to internal attacks. The two security inventory services are set up and executed from a secured offsite location. The scan is administered by a consultant who has earned advanced security certifications and who creates a document that describes and interprets the information collected by the security scan and recommend various enhancements where required.
  • Security Vulnerability Assessment Packages for Large Businesses
    Progent offers three levels of set-price security evaluation service bundles designed for large organizations who want to meet security standards required by government or industry agencies. Progent's security evaluation service bundles offer larger businesses an opportunity to obtain a professional assessment at the viability of their security posture. For each security evaluation bundle, Progent consultants with advanced security credentials analyze and report on captured data and provide recommendations for cost-effective remediation. Each of the network security audit packages include an added-cost option for onsite consultants at any location in the United States.
  • Stealth Penetration Testing Services
    Stealth penetration testing, commonly known as PEN testing, is an accepted technique for helping businesses to determine how vulnerable their network systems are to current-generation threats. Progent's stealth penetration testing services test how effectively your existing security policies and platforms stand up to authorized but unannounced intrusion attempts launched by Progent's certified security specialists utilizing advanced hacking methods. Find out about Progent's stealth penetration testing services.
We've Been Hacked: What Should We Do?
Network Security ConsultantsIf your company is now fighting a network security crisis and you have not prepared a detailed recovery plan, visit Progent's Remote Network Support to find out how to get fast help. Progent provides remote technical support from skilled network technicians and can escalate problems to certified security experts if necessary. Your business does not have to be a registered Progent customer to get urgent support for a security problem, but you can sign up as a Progent customer ahead of time at no cost and your standing as a current customer could save valuable time during an emergency.

Typically, smaller organizations have no response procedure in the event of a successful security breach. This is risky, since the cost of a successful security attack can be more catastrophic for a small business than for a large corporation. Progent's security consultants can assist your company to design an effective recovery and event reporting procedure that reduces the IT system disruption following a security breach. The formal post-attack response procedure promoted by GIAC is Progent's suggested procedure for responding to a major security attack.

High-value Security Services Offered by Progent
Progent's security consultants can provide advanced support in key facets of IT security including:

  • Security Vulnerability Evaluation and Compliance Testing
    Progent provides experience with security evaluation tools like Microsoft Baseline Security Analyzer and LANguard for performing a variety of automatic network tests to reveal potential security holes. Progent has broad experience with monitoring tools and can help your company to understand assessment results and react efficiently. Progent's certified security engineers also provide web application testing and can perform expert assessments of enterprise-wide security to determine your company's compliance with key worldwide security specifications such as HIPAA, PCI, and ISO. Also, Progent can assess the strength of your wireless protection covering stationary wireless appliances plus mobile devices. Find out additional details concerning Progent's Security Vulnerability Audits and Compliance Testing.
  • Planning, Building, and Testing Secure Environments
    Any company should develop a carefully considered security plan that incorporates both preventive and reactive steps. The pre-attack plan is a collection of precautions that helps to reduce vulnerabilities. The post-attack plan specifies activities to help security personnel to evaluate the losses resulting from a breach, repair the damage, document the experience, and revive network functions as quickly as feasible. Progent can show you how to design protection into your business processes, configure scanning software, create and execute a safe computer architecture, and propose procedures and policies that will optimize the safety of your information system. Progent's security professionals are ready to help you to set up a firewall, deploy secure offsite access to email and data, and configure an effective virtual private network. If you are looking for an economical option for outsourcing your network security administration, Progent's 24x7 Monitoring Services feature continual remote server tracking and immediate response to problems.
  • System Restoration and Failure Analysis
    Progent has expertise in recovering networks and computers that have been compromised, are quarantined, or have failed because of a security breakdown. Progent can help evaluate the losses resulting from the attack, return your company to ordinary functions, and recover information compromised owing to the assault. Progent's security engineers can also oversee a comprehensive forensic evaluation by examining activity logs and utilizing a variety of advanced forensics techniques. Progent's experience with security problems minimizes your off-air time and permits Progent to recommend effective measures to prevent or mitigate new attacks.
  • Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Series Firewalls, and PIX 500 Security Appliances Configuration and Debugging
    Cisco Certified CCIE Security ExpertsThe new Cisco ASA 5500-X Series of firewalls with Firepower Services provide substantially more value than Cisco's previous firewalls and have superseded the ASA 5500 and PIX 500 firewalls for all new deployments. Following Cisco's purchase of Sourcefire, the whole line of Cisco ASA 5500-X devices can be provisioned to enable Firepower Services, built on Sourcefire's Snort technology, which is the market's most deployed network intrusion protection system. Firepower services provide powerful new capabilities such as advanced malware protection (AMP), URL filtering, dynamic threat analytics, and automation. Progent's Cisco-certified CCIE network consultants can help your company to manage your legacy PIX or ASA 5500 firewalls or upgrade to ASA 5500-X firewalls with Firepower Services. Progent's consultants can provide online and onsite help with ASA 5500-X firewalls with Firepower Services and can help you to plan, deploy, tune, administer and troubleshoot firewall environments based on Cisco ASA 5500-X firewalls with Firepower Services. Find out additional information about Cisco ASA Firewalls with Firepower Services integration and troubleshooting services.
  • Other Firewall and VPN Consulting Services
    In addition to being expert in a broad range of security technologies from Microsoft and Cisco, Progent can provide small and mid-size companies expert support for products from other important firewall and Virtual Private Network vendors such as:
  • SIEM Integration and Support
    Security information and event management (SIEM) software and services are designed to interpret the enormous amounts of data represented by security incident logs generated by a wide range of sources such as network appliances, operating systems, and applications and tools. SIEM software analyzes the security event records from these diverse sources and creates summary reports of security events as mandated by government regulations and business compliance guidelines. Progent's GIAC-certified network security consultants and Cisco CCIE certified network infrastructure consultants can assist businesses to design, install and manage a SIEM system that helps them to see the progress of security incidents and comply with security incident reporting regulations. (See Progent's SIEM solutions.)
Progent's Security Credentials
Progent's security consultants have earned some of the most respected certifications available in the industry. These certifications demand exhaustive examinations and proven field background to ensure that recipients have mastered a significant body of security knowledge and techniques and can offer high-level solutions to information environments of any size.
  • CISM Security Consulting Expertise
    Certified Information Security Manager (CISM) defines the basic competencies and worldwide benchmarks of service that information security professionals are required to master. CISM offers business management the confidence that consultants who have earned their accreditation possess the experience and skill to provide efficient security management and engineering services. Progent can provide a CISM expert to help your organization in vital security areas such as data security governance, risk management, data protection program control, and crisis response support. Read the details about Progent's Certified Information Security Manager (CISM) Security Consulting Assistance.

  • Certified Information Systems Security Professionals (CISSP) Security Consulting Expertise
    Progent's CISSP experts are security engineers who have earned CISSP status through demonstrated professional work, rigorous study, and formal testing. CISSP Certification recognizes mastery of an international standard for information security. American National Standards Institute has given the CISSP credential accreditation in the field of IT security under ISO/IEC 17024. Areas of knowledge covered within CISSP include security administration procedures, security architecture and test systems, access permission methodology, applications development security, business processes security, physical security, encryption, communications, Internet security, and disaster recovery planning. Read additional information concerning Progent's CISSP Consulting Expertise.

  • Information Systems Security Architecture Professionals (ISSAP) Consulting Services
    Progent's ISSAP certified security experts are consultants who have earned ISSAP certification following thorough examination and extensive hands-on work with information security architecture. ISSAP security experts have comprehensive understanding of access management mechanisms and techniques, telecommunications and network security, cryptography, requirements analysis, business continuity and disaster recovery, and physical security. Progent's ISSAP-certified security specialists can help your business with all phases of architecture security. Learn more details about Progent's ISSAP Accredited Secure IT Infrastructure Consulting Assistance.

  • Certified Information Systems Auditor Support Expertise
    The Certified Information Systems Auditor (CISA) credential is a prestigious qualification that signifies mastery in information system security auditing. Certified by the American National Standards Institute (ANSI), the CISA accreditation requires that candidates undergo a comprehensive test administered by the ISACA professional group. Progent can provide the services of a CISA-certified security professional trained to help companies in the fields of information systems audit process, IT enforcement, systems and architecture planned useful life, information technology service delivery, safeguarding data assets, and business continuity preparedness. Get additional information about Progent's CISA Professional Expertise.

  • GIAC (Global Information Assurance Certification) Support Services
    GIAC (Global Information Assurance Certification) was established in 1999 to certify the knowledge of computer security experts. GIAC's goal is to verify that an accredited security consultant possesses the skills needed to provide support in important areas of network, information, and application program security. GIAC certifications are acknowledged by businesses and government organizations all over the world including and the United States National Security Agency. Progent can provide the assistance of certified professionals for all of the network security services covered within GIAC accreditation programs including assessing perimeters, incident response, intrusion detection, and web services security. Learn additional details concerning Progent's GIAC (Global Information Assurance Certification) Consulting Services.
Get in Touch with Progent for Network Security Expertise
If you need computer security consulting expertise, telephone Progent at 800-993-9400 or go to Contact Progent.
















© 2002- 2018 Progent Corporation. All rights reserved.