Overview of Progent's Security and Compliance Consulting Services
Progent's certified computer security and compliance consultants can provide a broad range of support services designed to assist businesses of any size to detect and correct security weaknesses, block assaults, remediate any problems resulting from a breach of protection, and comply with regulatory requirements for guarding information and reporting security incidents. Progent can provide a selection of service delivery modes:

  • On-demand online and on-site support invoiced to the nearest minute
  • Continual fully managed services invoiced at a low fixed monthly fee
  • Set-price service packages for a single security and compliance evaluation
As-needed Security Support Services
After you sign up for Progent's services (registration is free), you can get as-needed online or onsite assistance from a Progent security consultant. This traditional service model is essentially reactive and geared toward rapidly resolving IT problems that are impacting your productivity or that have stymied your own support personnel. Typical scenarios are configuring a firewall or VPN connection, implementing a critical security patch for a Cisco switch, designing compliant access to cloud-based resources, or restoring data after a ransomware assault. These services are invoiced by the minute, which avoids the frustrating situation of receiving big bills for fast repairs.

Delivery options for Progent's on-demand support services include:

  • Remote Security Services
    The majority security issues can be handled remotely via a combination of phone-based help and an connection between Progent's Technical Response Center (TRC) and a customer's network. Progent's Technical Response Center can deliver remote security help by offering efficient access to consultants who have the experience and resources to resolve many of the most challenging problems quickly, keeping your service costs affordable and minimizing downtime.
  • On-premises Security Services
    For instances where on-premises support is required, Progent can send a technical expert to major cities across the U.S. Progent can also dispatch a security specialist with top certifications and advanced skills to any site in the U.S.
Progent's accredited consultants are certified to support systems powered by Microsoft Windows, Linux, macOS and OS X, Sun Solaris, and major versions of UNIX. Progent's wide range of services encompasses firewall configuration, email and messaging security, secure network design, and information recovery. Progent's support staff has been awarded the industry's most advanced security credentials including GIAC and ISSAP. Progent also offers immediate access to online Cisco CCIE network infrastructure consultants who can deliver world-class assistance with tough network configuration issues.

ProSight Fixed-price Managed Services for Information Assurance
Progent's affordable ProSight line of network management outsourcing services is intended to provide small and mid-size businesses with enterprise-class support and state-of-the-art technology for all aspects of information assurance. Managed services offered by Progent include:

  • ProSight Active Security Monitoring (ASM): Endpoint Protection and Ransomware Defense
    Progent's ProSight Active Security Monitoring (ASM) is an endpoint protection solution that utilizes next generation behavior-based machine learning tools to guard endpoint devices as well as servers and VMs against modern malware assaults like ransomware and file-less exploits, which easily escape traditional signature-based anti-virus products. ProSight ASM protects local and cloud-based resources and offers a single platform to manage the entire threat progression including blocking, identification, containment, cleanup, and forensics. Key capabilities include single-click rollback using Windows Volume Shadow Copy Service (VSS) and automatic network-wide immunization against newly discovered attacks. Learn more about Progent's ProSight Active Security Monitoring next-generation endpoint protection and ransomware recovery.

  • ProSight Enhanced Security Protection: Unified Physical and Virtual Endpoint Security
    Progent's ProSight Enhanced Security Protection services offer ultra-affordable multi-layer security for physical servers and VMs, workstations, smartphones, and Exchange email. ProSight ESP utilizes contextual security and modern behavior analysis for round-the-clock monitoring and responding to cyber assaults from all attack vectors. ProSight ESP provides two-way firewall protection, intrusion alarms, device management, and web filtering via leading-edge tools packaged within a single agent managed from a single console. Progent's security and virtualization consultants can assist your business to design and implement a ProSight ESP environment that addresses your organization's specific needs and that allows you prove compliance with government and industry data protection regulations. Progent will assist you specify and configure policies that ProSight ESP will enforce, and Progent will monitor your network and react to alarms that call for urgent attention. Progent's consultants can also assist your company to set up and test a backup and disaster recovery system such as ProSight Data Protection Services so you can get back in business quickly from a potentially disastrous security attack such as ransomware. Learn more about Progent's ProSight Enhanced Security Protection unified physical and virtual endpoint security and Exchange filtering.

  • ProSight Data Protection Services: Managed Cloud Backup and Recovery
    ProSight Data Protection Services provide small and medium-sized businesses a low cost end-to-end solution for secure backup/disaster recovery (BDR). For a fixed monthly cost, ProSight DPS automates your backup processes and enables rapid restoration of vital files, apps and virtual machines that have become lost or corrupted due to hardware failures, software glitches, natural disasters, human error, or malicious attacks like ransomware. ProSight Data Protection Services can help you back up, recover and restore files, folders, apps, system images, plus Microsoft Hyper-V and VMware images. Critical data can be protected on the cloud, to an on-promises device, or to both. Progent's BDR consultants can deliver world-class support to set up ProSight DPS to be compliant with regulatory requirements like HIPPA, FIRPA, and PCI and, when needed, can assist you to restore your critical data. Read more about ProSight Data Protection Services Managed Cloud Backup.

  • ProSight Email Guard: Inbound and Outbound Spam Filtering, Data Leakage Protection and Email Encryption
    ProSight Email Guard is Progent's email filtering and encryption platform that uses the services and infrastructure of top information security vendors to deliver web-based control and world-class security for all your inbound and outbound email. The powerful architecture of Email Guard managed service integrates a Cloud Protection Layer with an on-premises gateway appliance to offer complete defense against spam, viruses, Dos Attacks, DHAs, and other email-borne malware. Email Guard's cloud filter acts as a preliminary barricade and keeps the vast majority of unwanted email from making it to your security perimeter. This decreases your vulnerability to inbound threats and saves network bandwidth and storage. Email Guard's onsite security gateway appliance adds a deeper layer of analysis for incoming email. For outgoing email, the onsite security gateway offers AV and anti-spam protection, policy-based Data Loss Prevention, and email encryption. The local security gateway can also assist Microsoft Exchange Server to monitor and protect internal email traffic that originates and ends within your security perimeter. Find out more about Progent's ProSight Email Guard spam filtering, virus blocking, content filtering and data loss prevention.

  • ProSight WAN Watch: Network Infrastructure Management
    ProSight WAN Watch is an infrastructure management service that makes it simple and inexpensive for small and mid-sized businesses to map out, track, optimize and troubleshoot their connectivity hardware like routers and switches, firewalls, and load balancers plus servers, client computers and other devices. Using cutting-edge RMM technology, ProSight WAN Watch makes sure that infrastructure topology diagrams are kept updated, captures and displays the configuration information of almost all devices connected to your network, monitors performance, and sends alerts when problems are detected. By automating time-consuming management and troubleshooting activities, ProSight WAN Watch can knock hours off common chores such as network mapping, expanding your network, finding appliances that need important software patches, or identifying the cause of performance issues. Learn more about ProSight WAN Watch infrastructure management consulting.

  • ProSight LAN Watch: Server and Desktop Monitoring
    ProSight LAN Watch is Progentís server and desktop remote monitoring service that uses state-of-the-art remote monitoring and management technology to keep your network running efficiently by tracking the state of vital computers that power your business network. When ProSight LAN Watch uncovers an issue, an alarm is transmitted immediately to your specified IT management staff and your assigned Progent engineering consultant so any potential problems can be resolved before they can impact your network Learn more about ProSight LAN Watch server and desktop remote monitoring consulting.

  • ProSight Virtual Hosting: Hosted VMs at Progent's Tier III Data Center
    With Progent's ProSight Virtual Hosting service, a small or mid-size business can have its key servers and apps hosted in a protected Tier III data center on a fast virtual machine host set up and maintained by Progent's network support professionals. Under Progent's ProSight Virtual Hosting service model, the customer owns the data, the operating system platforms, and the applications. Since the system is virtualized, it can be moved immediately to a different hardware solution without requiring a time-consuming and difficult reinstallation process. With ProSight Virtual Hosting, you are not locked into a single hosting provider. Find out more details about ProSight Virtual Hosting services.

  • ProSight IT Asset Management: Network Documentation Management
    Progent's ProSight IT Asset Management service is a cloud-based IT documentation management service that makes it easy to create, update, retrieve and safeguard information about your IT infrastructure, processes, business apps, and services. You can quickly find passwords or IP addresses and be warned about impending expirations of SSLs or warranties. By updating and managing your IT documentation, you can eliminate as much as half of time wasted looking for critical information about your network. ProSight IT Asset Management features a centralized location for holding and collaborating on all documents related to managing your business network such as standard operating procedures and self-service instructions. ProSight IT Asset Management also offers a high level of automation for gathering and associating IT data. Whether youíre making improvements, performing regular maintenance, or responding to an emergency, ProSight IT Asset Management delivers the knowledge you need when you need it. Learn more about ProSight IT Asset Management service.
ProSight Network Audits
Progent's ProSight Network Audits offer a fast and affordable alternative for small and medium-size organizations to obtain an objective evaluation of the overall health of their information system. Based on a selection of the leading remote monitoring and management platforms in the industry, and overseen by Progent's certified group of information technology experts, ProSight Network Audits help you see how closely the configuration of your core infrastructure assets adhere to best practices. Both the Basic and Advanced options for ProSight Network Audit services are available at a budget-friendly, one-time cost and provide immediate benefits such as a more manageable Active Directory system. Both also come with one year of state-of-the-art remote network monitoring and management (RMM). Advantages can include lower-cost network management, better compliance with information security requirements, more efficient utilization of network assets, quicker troubleshooting, more reliable backup and restore, and higher availability. Learn more about Progent's ProSight Network Audits network infrastructure assessment.

Progent's ProSight Ransomware Preparedness Report Service
Progent's ProSight Ransomware Preparedness Report is a low-cost service centered on a brief discussion with a Progent information assurance consultant. The fact-finding interview is intended to help assess your company's ability either to block or recover quickly from a ransomware attack. Progent will consult with you directly to collect information about your current AV defense and backup/recovery platform, and Progent will then deliver a custom Basic Security and Best Practices Report describing how you can apply best practices to build a cost-effective security and backup/recovery environment that meets your business requirements. For additional information, see Progent's ProSight Ransomware Preparedness Report Service.

Set-price Security Assessment and Validation Bundles
Progent offers a selection of set-price security evaluation packages that provide high value by deploying Progent's advanced network monitoring software as well as Progent's consulting experience to create an objective and thorough assessment of your IT environment security profile.

  • Security Assessment Service Packages for Small Organizations
    Progent offers two ultra-affordable security inventory packages designed to allow small organizations to obtain a professional security assessment from an accredited security engineer. With Progent's External Security Inventory Scan, an engineer administers a comprehensive assessment of your network from outside your firewalled perimeter to determine potential risks in the security profile you present to the outside. With Progent's Internal Security Inventory Scan, a certified security consultant executes a system scan using an authorized computer inside your company firewall to evaluate your vulnerability to inside attacks. These two security inventory services are set up and executed from a secured offsite location. The scan is managed by an engineer who has been awarded advanced security certifications and who creates a report that details and interprets the information collected by the security scan and suggests practical enhancements where appropriate.
  • Security Vulnerability Assessment Packages for Large Organizations
    Progent offers three levels of set-price security evaluation service packages designed for enterprises who need to meet security standards required by state or industry agencies. Progent's security assessment service bundles offer larger organizations a chance to obtain an objective assessment at the strength of their security posture. For each security evaluation package, Progent consultants with top security credentials study and report on collected data and provide suggestions for efficient remediation. Each of the network security assessment packages include an added-cost option for onsite consultants at any location in the United States.
  • Stealth Penetration Testing Services
    Stealth penetration testing, commonly known as PEN testing, is a critical tool for helping businesses to determine how open their IT environments are to modern attacks. Progent's stealth penetration testing services check how effectively your existing security policies and technologies stand up to authorized but unannounced intrusion attempts managed by Progent's veteran security specialists utilizing cutting-edge hacking methods. Read about Progent's stealth penetration testing services.
Our Network Has Been Hacked: What Can We Do?
Network Security ConsultantsIf your company is now fighting a security emergency and you do not have a formal response plan, visit Progent's Online Technical Help to see how to receive fast assistance. Progent provides remote technical support from experienced network technicians and can escalate problems to high-level security specialists if required. Your business does not need to be a registered Progent customer to receive urgent help for a security breakdown, but you can register as a Progent client in advance for free and your status as a registered client could save precious time when there is an emergency.

Typically, smaller organizations have no recovery plan in the event of a successful penetration. This is risky, since the damage from a successful security attack can be more devastating for a small business than for a big corporation. Progent's security engineers can help your you to design a sensible response and incident reporting plan that reduces the IT system downtime following a security breach. The formal post-attack handling model outlined by GIAC (Global Information Assurance Certification) is Progent's recommended method for handling a serious security penetration.

High-value Security Expertise Offered by Progent
Progent's certified security engineers offer advanced support in vital facets of computer compliance including:

  • Vulnerability Audits and Compliance Testing
    Progent provides expertise with security evaluation software like MS Baseline Security Analyzer and LANguard for conducting a variety of comprehensive network tests to uncover potential security gaps. Progent has broad experience with scanning utilities and can assist you to analyze audit results and react appropriately. Progent's certified security consultants also can perform web software validation and can perform thorough assessments of enterprise-wide security to confirm your organization's compliance with important global security specifications including FISMA, PCI, and ISO. Also, Progent can assess the effectiveness of your wireless protection covering fixed wireless appliances plus mobile handsets. Get additional details concerning Progent's Vulnerability Audits and Compliance Testing.
  • Planning, Building, and Validating Protected Environments
    Any company should have a thoroughly thought out security plan that incorporates both proactive and responsive activity. The proactive plan is a set of steps that works to minimize vulnerabilities. The post-attack plan defines activities to assist security staff to assess the losses resulting from an attack, repair the damage, document the experience, and revive business functions as soon as possible. Progent can show you how to build security into your business processes, configure auditing software, create and build a safe IT architecture, and propose processes and policies that will optimize the safety of your information system. Progent's security experts are available to assist you to set up a firewall, deploy secure offsite connectivity to email and files, and configure an efficient virtual private network. If you are interested in an economical way for outsourcing your network security management, Progent's 24x7 Network Support Packages feature automated online system tracking and quick resolution of emergencies.
  • Data Restoration and Failure Analysis
    Progent provides expertise in restoring networks and devices that have been compromised, are in question, or have ceased to function as a result of a security attack. Progent can show you how to determine the losses resulting from the breach, return your company to normal business operations, and retrieve data lost as a result of the event. Progent's security engineers can also manage a comprehensive forensic evaluation by examining activity logs and using other proven assessment tools. Progent's background with security problems minimizes your business disruption and permits Progent to propose efficient strategies to prevent or contain future attacks.
  • Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Series Firewalls, and PIX Firewalls Integration and Debugging
    Cisco CCIE Security SpecialistsThe latest generation of ASA 5500-X Series Next-Generation Firewalls with Firepower Services deliver substantially more performance than Cisco's previous PIX and ASA 5500 firewalls and have superseded the ASA 5500 and PIX 500 firewalls for all new installations. Following Cisco's acquisition of Sourcefire, the whole family of Cisco ASA 5500-X devices can be configured to enable Firepower Services, based on Sourcefire's Snort product, which is the world's most popular network intrusion protection system (IPS). Firepower services provide powerful new capabilities such as advanced malware protection (AMP), URL filtering, dynamic threat analytics, and automation. Progent's Cisco-qualified CCIE network consultants can assist you to manage your legacy PIX or Cisco ASA 5500 security appliances or migrate to ASA 5500-X firewalls with Firepower Services. Progent's consultants can provide online and on-premises help with ASA 5500-X firewalls with Firepower Services and can assist your organization to design, configure, tune, administer and troubleshoot firewall environments built around Cisco ASA 5500-X firewalls with Firepower Services. Read additional details about Cisco ASA Firewalls with Firepower Services integration and troubleshooting support.
  • Other Firewall and Virtual Private Network (VPN) Technologies
    In addition to supporting a wide array of security solutions available from Microsoft and Cisco, Progent can provide small organizations expert consulting for solutions from other popular firewall and Virtual Private Network vendors including:
  • SIEM Security Information and Event Management Integration and Support
    Security information and event management (SIEM) applications and services are designed to make sense the massive quantity of data collected in security incident logs created by multiple sources such as network infrastructure appliances, operating systems, and applications and tools. SIEM software analyzes the security event records from these diverse sources and produces consolidated reports of security events as required by state regulations and business compliance standards. Progent's GIAC-certified network security experts and Cisco CCIE certified network consultants can help businesses to design, deploy and manage a SIEM solution that helps them to understand the behavior of security incidents and comply with security incident reporting requirements. (Visit Progent's Security information and Event Management (SIEM) solutions.)
Progent's Security Credentials
Progent's security consultants have been awarded the most respected certifications offered in the industry. These certifications require exhaustive testing and demonstrated field background to guarantee that recipients have acquired expertise with a significant amount of security knowledge and techniques and can provide advanced security solutions to information environments of any size.
  • CISM Security Support Expertise
    Certified Information Security Manager (CISM) identifies the fundamental competencies and international standards of service that information technology security professionals are required to master. It offers business management the confidence that consultants who have been awarded their certification possess the background and knowledge to offer efficient security management and consulting services. Progent can offer a CISM expert to help your organization in key security disciplines including information security governance, vulnerability management, data security program management, and incident response management. Find out the details concerning Progent's CISM Security Consulting Expertise.

  • Certified Information Systems Security Professionals (CISSP) Security Support Expertise
    Progent's CISSP consultants are security engineers who have earned CISSP status through verified professional work, extensive study, and formal examination. CISSP Certification indicates expertise in a worldwide standard for IT security. ANSI has given the CISSP credential accreditation in the area of IT security under ISO/IEC 17024. Fields of expertise covered within CISSP include security administration practices, security design and test systems, access control systems, applications development security, operations security, physical security, encryption, communications, Internet security, and business continuity planning. Find out the details about Progent's CISSP Consulting Expertise.

  • CISSP-ISSAP} Security Architecture Consulting Support
    Progent's CISSP-ISSAP certified cybersecurity architecture consultants have earned ISSAP accreditation as a result of rigorous testing and substantial experience. field experience with information security architecture. ISSAP security experts have in-depth knowledge of access management mechanisms and methodologies, telecommunications and network security, cryptography, requirements analysis, business continuity planning (BCP) and DRP, and physical security integration. Progent's CISSP-ISSAP-qualified security experts can help your company with all aspects of secure network architecture. Read more details concerning Progent's ISSAP Accredited Protected IT Infrastructure Consulting Support.

  • Certified Information Systems Auditor Professional Services
    The Certified Information Systems Auditor credential is a recognized achievement that indicates mastery in IS security auditing. Certified by the American National Standards Institute, the CISA accreditation requires that candidates undergo an extensive examination administered by the ISACA international professional association. Progent offers the expertise of a CISA-qualified security engineer trained to help companies in the areas of information systems audit process, information technology enforcement, systems and architecture planned useful life, IT service delivery, safeguarding data resources, and business continuity planning. Read more information concerning Progent's Certified Information Systems Auditor (CISA) Professional Assistance.

  • CRISC IT Risk Mitigation Specialists
    The CRISC certification program was established by ISACA to validate an IT professional's ability to plan, implement, and support information system control mechanisms to reduce network risk. Progent can provide the expertise of a CRISC-certified consultant to assist your company to create and carry out a business continuity or disaster recovery strategy based on leading practices identified by CRISC and crafted to align with your organization's risk appetite, business goals, and budgetary guidelines. Progent's network risk management services are complementary to the services available from Progent's CISA-qualified security engineers for objectively auditing your IT management design and with the services of Progent's CISM consultants for designing company-wide security policies. Get the details concerning Progent's CRISC Risk Management Expertise.

  • GIAC Support Services
    GIAC (Global Information Assurance Certification) was founded in 1999 to certify the knowledge of IT security engineers. GIAC's mission is to verify that an accredited security consultant has the skills appropriate to deliver services in key categories of system, data, and application software security. GIAC accreditations are recognized by businesses and institutions all over the world including and the United States NSA. Progent offers the help of GIAC certified consultants for all of the security disciplines addressed under GIAC accreditation topics such as auditing security systems, security incident response, intrusion detection, and web services security. Find out more details about Progent's Global Information Assurance Certification Professional Services.
Depend on Progent for Network Security Support
If you need computer security consulting, call Progent at 800-993-9400 or go to Contact Progent.

© 2002- 2019 Progent Corporation. All rights reserved.