Introduction to Progent's Security and Compliance Consulting Services
Progent's certified network security experts offer a broad range of services intended to assist companies of any size to identify and eliminate security weaknesses, block malicious attacks, recover from any problems resulting from a breach of protection, and comply with regulatory mandates for protecting data and reporting incidents. Progent can provide a selection of service models:

  • On-demand remote and on-site support billed by the minute
  • On-going managed services billed at a low flat monthly fee
  • Set-price service bundles for a one-time security and compliance assessment
On-demand Security and Compliance Support Services
Once you register for Progent's services (signing up is free), you can get as-needed online or onsite support from a Progent security consultant. This traditional service model is primarily reactive and optimized for rapidly resolving technical issues that are affecting your productivity or that have stumped your own support staff. Common examples include configuring a firewall appliance or VPN connection, implementing a vital security update for a Cisco switch or router, setting up compliant access to a public cloud, or recovering from a ransomware attack. These security services are billed by the minute, which avoids the frustrating situation of receiving large bills for quick repairs.

Delivery alternatives for Progent's on-demand support include:

  • Remote Security Support
    Most security problems can be handled remotely via a combination of phone-based support and an Internet connection between Progent's Technical Response Center (TRC) and a client's computer. Progent's TRC group can deliver remote security support by offering easy access to consultants with the background and technical resources to fix some of the most difficult issues quickly, keeping your support expenses affordable and minimizing lost productivity.
  • On-premises Security Services
    For cases where onsite support is necessary, Progent can send a technical expert to major metropolitan areas across the United States. Progent can also dispatch a security consultant with high-level certifications and advanced skills to any location in the country.
Progent's security consultants are certified to provide help for systems powered by Microsoft Windows, Linux, Mac OS X, Solaris, and popular versions of UNIX. Progent's wide selection of consulting services encompasses firewall configuration, email security, secure network design, and information restoration. Progent's technical support staff has earned the industry's most advanced security accreditations including GIAC (Global Information Assurance Certification) and Certified Information Systems Security Professional. Progent also offers immediate access to remote Cisco-certified CCIE network engineers who can provide world-class assistance with complex network integration problems.

ProSight Fixed-price Managed Services for Information Assurance
Progent's affordable ProSight family of managed services is designed to provide small and mid-size organizations with enterprise-class support and state-of-the-art technology for all facets of information assurance. Managed services offered by Progent include:

  • ProSight Email Guard: Spam Filtering, Data Leakage Protection and Content Filtering
    ProSight Email Guard is Progent's email security solution that incorporates the services and infrastructure of leading information security companies to provide web-based management and comprehensive protection for your email traffic. The hybrid architecture of Progent's Email Guard managed service combines cloud-based filtering with an on-premises security gateway appliance to provide complete protection against spam, viruses, Denial of Service (DoS) Attacks, Directory Harvest Attacks, and other email-based threats. Email Guard's Cloud Protection Layer acts as a preliminary barricade and keeps the vast majority of threats from reaching your security perimeter. This decreases your exposure to inbound attacks and saves network bandwidth and storage space. Email Guard's onsite gateway device provides a further layer of inspection for incoming email. For outgoing email, the onsite gateway provides AV and anti-spam filtering, policy-based Data Loss Prevention, and encryption. The on-premises security gateway can also assist Microsoft Exchange Server to track and safeguard internal email traffic that stays inside your corporate firewall. Learn more about Progent's ProSight Email Guard spam filtering, virus defense, content filtering and data loss protection.

  • ProSight Active Security Monitoring: Endpoint Protection and Ransomware Recovery
    Progent's ProSight Active Security Monitoring (ASM) is an endpoint protection (EPP) solution that incorporates next generation behavior analysis tools to defend endpoints and servers and VMs against modern malware attacks such as ransomware and email phishing, which easily escape traditional signature-based AV products. ProSight Active Security Monitoring protects on-premises and cloud resources and offers a single platform to automate the complete threat progression including blocking, identification, mitigation, cleanup, and forensics. Top capabilities include single-click rollback with Windows Volume Shadow Copy Service and real-time system-wide immunization against newly discovered attacks. Learn more about Progent's ProSight Active Security Monitoring (ASM) next-generation endpoint protection and ransomware recovery.

  • ProSight Data Protection Services: Managed Cloud Backup and Recovery
    ProSight Data Protection Services from Progent offer small and mid-sized organizations a low cost and fully managed solution for secure backup/disaster recovery. For a low monthly cost, ProSight DPS automates and monitors your backup processes and allows fast restoration of vital data, apps and virtual machines that have become unavailable or damaged as a result of component breakdowns, software bugs, natural disasters, human mistakes, or malware attacks like ransomware. ProSight DPS can help you protect, recover and restore files, folders, applications, system images, as well as Microsoft Hyper-V and VMware virtual machine images. Important data can be protected on the cloud, to an on-promises storage device, or to both. Progent's BDR specialists can deliver world-class support to configure ProSight Data Protection Services to to comply with regulatory requirements such as HIPPA, FIRPA, and PCI and, when needed, can help you to restore your critical information. Find out more about ProSight DPS Managed Backup.

  • ProSight WAN Watch: Network Infrastructure Management
    Progentís ProSight WAN Watch is an infrastructure management service that makes it easy and affordable for smaller organizations to diagram, monitor, optimize and troubleshoot their networking appliances like routers and switches, firewalls, and wireless controllers plus servers, printers, endpoints and other networked devices. Incorporating cutting-edge Remote Monitoring and Management technology, WAN Watch ensures that network diagrams are always updated, captures and manages the configuration of almost all devices on your network, tracks performance, and generates notices when potential issues are detected. By automating complex management and troubleshooting processes, ProSight WAN Watch can cut hours off ordinary tasks such as network mapping, reconfiguring your network, locating appliances that need critical software patches, or identifying the cause of performance bottlenecks. Learn more details about ProSight WAN Watch infrastructure management services.

  • ProSight LAN Watch: Server and Desktop Remote Monitoring
    ProSight LAN Watch is Progentís server and desktop monitoring service that incorporates advanced remote monitoring and management (RMM) technology to keep your network running at peak levels by checking the health of critical computers that power your information system. When ProSight LAN Watch uncovers a problem, an alarm is transmitted immediately to your designated IT management staff and your assigned Progent engineering consultant so that all potential issues can be addressed before they have a chance to impact productivity Learn more details about ProSight LAN Watch server and desktop remote monitoring services.

  • ProSight Virtual Hosting: Hosted VMs at Progent's World-class Data Center
    With Progent's ProSight Virtual Hosting service, a small or mid-size business can have its key servers and applications hosted in a protected fault tolerant data center on a fast virtual machine host set up and maintained by Progent's network support professionals. Under the ProSight Virtual Hosting service model, the client retains ownership of the data, the OS software, and the applications. Because the environment is virtualized, it can be moved immediately to an alternate hosting environment without requiring a lengthy and difficult reinstallation procedure. With ProSight Virtual Hosting, your business is not locked into one hosting provider. Learn more about ProSight Virtual Hosting services.

  • ProSight IT Asset Management: Network Infrastructure Documentation Management
    ProSight IT Asset Management service is an IT infrastructure documentation management service that allows you to create, maintain, find and protect information about your network infrastructure, processes, applications, and services. You can instantly find passwords or IP addresses and be alerted automatically about upcoming expirations of SSL certificates or domains. By updating and managing your IT infrastructure documentation, you can eliminate as much as half of time wasted searching for vital information about your network. ProSight IT Asset Management includes a common location for holding and collaborating on all documents related to managing your business network such as standard operating procedures and How-To's. ProSight IT Asset Management also offers advanced automation for gathering and associating IT data. Whether youíre planning improvements, performing regular maintenance, or responding to an emergency, ProSight IT Asset Management delivers the information you need when you need it. Learn more about ProSight IT Asset Management service.
ProSight Network Audits
Progent's ProSight Network Audits are a fast and low-cost alternative for small and medium-size organizations to get an unbiased assessment of the overall health of their IT system. Based on some of the leading remote monitoring and management platforms available, and overseen by Progent's world-class team of information technology experts, ProSight Network Audits help you see how well the deployment of your core network assets adhere to leading practices. Both the Basic and Advanced options for ProSight Network Audit services are offered at a low, one-time cost and provide immediate benefits like a cleaner Active Directory system. Both versions also come with a year of state-of-the-art remote network monitoring and management (RMM). Advantages can include simpler management, better compliance with government and industry security requirements, higher utilization of network resources, quicker problem resolution, more reliable backup and recovery, and less downtime. Read more about Progent's ProSight Network Audits IT infrastructure review.

The ProSight Ransomware Preparedness Report Service
The ProSight Ransomware Preparedness Report service is an affordable service based on a phone discussion with a Progent backup/recovery consultant. The interview is intended to help assess your company's preparedness to block or recover quickly from a ransomware attack. Progent will consult with you directly to gather information about your current antivirus tools and backup system, and Progent will then produce a custom Basic Security and Best Practices Report describing how you can apply industry best practices to deploy an efficient AV and backup/recovery system that meets your business requirements. For more information, see The ProSight Ransomware Preparedness Report Service.

Flat-rate Security Evaluation and Validation Packages
Progent has put together a selection of set-price security assessment packages that provide exceptional value by deploying Progent's advanced network monitoring software as well as Progent's consulting experience to produce an objective and comprehensive evaluation of your network security posture.

  • Security Inventory Service Bundles for Small Organizations
    Progent offers two ultra-affordable security inventory service packages intended to enable small organizations to get a professional security evaluation from a certified security engineer. With Progent's External Security Inventory Scan, a consultant administers a comprehensive examination of your network from beyond your firewalled perimeter to determine potential risks in the security profile you expose to the public. With Progent's Internal Security Inventory Scan, a certified security consultant runs a system scan from an authorized computer inside your firewalled perimeter to assess your vulnerability to internal attacks. These two security inventory services are set up and run from a secured offsite location. The project is managed by a consultant who has been awarded advanced security certifications and who produces a report that details and evaluates the data collected by the scan and recommend practical enhancements where appropriate.
  • Security Vulnerability Evaluation Packages for Large Organizations
    Progent offers three levels of set-price security evaluation service packages intended for enterprises who want to meet compliance standards required by government or industry regulators. Progent's security evaluation service bundles offer larger businesses an opportunity to get a professional assessment at the viability of their security posture. For each security evaluation bundle, Progent consultants with top security credentials analyze and report on captured data and offer suggestions for efficient improvements. Each of the network security assessment packages include an added-cost option for on-premises engineers at any location in the U.S.
  • Stealth Penetration Testing Services
    Stealth penetration testing, commonly called PEN testing, is an accepted technique for allowing businesses to determine how vulnerable their IT systems are to current-generation threats. Progent's stealth penetration testing test how effectively your existing security procedures and platforms stand up to authorized but unannounced intrusion attempts managed by Progent's veteran security specialists utilizing advanced hacking techniques. Find out about Progent's stealth penetration testing (PEN Test) services.
Our System Has Been Hacked: What Should We Do?
Network Security ConsultantsIf you are now fighting a network security crisis and you do not have a detailed response procedure, refer to Progent's Remote Technical Support to see how to receive fast assistance. Progent offers remote technical support from skilled engineers and can refer problems to high-level security experts if necessary. Your organization does not have to be a registered Progent client to receive emergency support for a security problem, but you can sign up as a Progent client ahead of time at no cost and your standing as a current client could save precious time in case of an emergency.

Typically, smaller companies do not have a response plan in the event of a damaging attack. This is risky, since the damage from a serious security attack can be even more devastating for a small business than for a big corporation. Progent's security consultants can assist your you to create a sensible recovery and event reporting plan that minimizes the network downtime following an attack. The formal post-attack response procedure outlined by Global Information Assurance Certification is Progent's suggested procedure for reacting to a serious security attack.

Advanced Security Expertise Offered by Progent
Progent's seasoned engineers offer expertise in key areas of computer protection such as:

  • Vulnerability Audits and Security Compliance Testing
    Progent offers expertise with security auditing utilities such as MS Baseline Security Analyzer and LANguard from GFI for conducting a variety of automatic network scans to identify potential security gaps. Progent has broad experience with these tools and can assist you to understand audit reports and react appropriately. Progent's security engineers also provide web software testing and can conduct expert assessments of enterprise-wide security to confirm your company's compliance with major global security specifications such as FISMA, PCI, and ISO. Also, Progent can evaluate the strength of your wireless security covering stationary wireless equipment as well as mobile handsets. Learn more details concerning Progent's Vulnerability Audits and Compliance Testing.
  • Planning, Building, and Testing Protected Environments
    Any company should develop a carefully thought out security strategy that includes both proactive and reactive steps. The pre-attack plan is a collection of precautions that helps to reduce vulnerabilities. The reactive plan specifies procedures to help security staff to assess the losses caused by an attack, remediate the damage, record the experience, and revive business activity as soon as possible. Progent can advise you how to design security into your company processes, configure scanning utilities, define and execute a safe computer architecture, and propose procedures and policies to optimize the safety of your information system. Progent's security experts are ready to assist you to configure a firewall, design secure offsite connectivity to e-mail and files, and install an effective VPN. If you are interested in an affordable option for outsourcing your security administration, Progent's Round-the-clock Monitoring Options feature non-stop online network tracking and quick resolution of emergencies.
  • Data Restoration and Failure Analysis
    Progent provides skill in recovering networks and servers that have been compromised, are quarantined, or have failed as a result of a security breakdown. Progent can help determine the damage resulting from the assault, restore normal functions, and recover data lost as a result of the assault. Progent's security specialists can also perform a thorough failure analysis by examining activity logs and using a variety of advanced assessment tools. Progent's experience with security issues minimizes your off-air time and permits Progent to recommend effective measures to avoid or mitigate new attacks.
  • Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Series Firewalls, and PIX Firewalls Integration and Debugging
    Cisco CCIE Network Security SpecialistsThe current Cisco ASA 5500-X Series Next-Generation Firewalls with Firepower Services provide significantly more bang for the buck than Cisco's legacy firewalls and have replaced the ASA 5500 and PIX security appliances for all new deployments. After Cisco's acquisition of Sourcefire, the entire line of Cisco ASA 5500-X devices can be configured to enable Firepower Services, based on Sourcefire's Snort product, which is the market's most popular intrusion protection system. Firepower services provide enhanced features such as advanced malware protection (AMP), URL filtering, real-time threat analytics, and automation. Progent's Cisco-certified CCIE network experts can help your company to maintain your legacy PIX or Cisco ASA 5500 firewalls and upgrade efficiently to Cisco ASA 5500-X firewalls with Firepower Services. Progent's consultants offer online and onsite help with ASA 5500-X firewalls with Firepower Services and can help your organization to design, integrate, optimize, manage and debug firewall solutions built on Cisco ASA 5500-X firewalls with Firepower Services. Learn more information about ASA 5500-X Firewalls with Firepower Services configuration and debugging services.
  • Other Firewall and Virtual Private Network (VPN) Solutions
    In addition to supporting a wide range of security technologies from Microsoft and Cisco, Progent can provide small organizations expert consulting for technologies from other major firewall and Virtual Private Network vendors such as:
  • SIEM Security Information and Event Management Integration and Support
    Security information and event management (SIEM) software and services are designed to digest the enormous amounts of information collected in security incident logs generated by multiple sources including network appliances, servers, and applications and monitoring tools. SIEM applications organizes the security event records from these diverse sources and produces summary reports of security incidents as required by state regulations and industry compliance standards. Progent's GIAC-certified network security consultants and Cisco-certified network infrastructure experts can assist organizations to design, install and operate a SIEM system that helps them to understand the progress of attacks and comply with security incident reporting regulations. (See Progent's Security information and Event Management solutions.)
Progent's Security Certifications
Progent's security specialists have earned the most respected certifications offered in the industry. These certifications demand exhaustive testing and proven work background to ensure that candidates have mastered a substantial body of security information and techniques and can offer advanced solutions to information networks of any complexity.
  • CISM Security Support Services
    CISM identifies the fundamental competencies and international standards of service that information security professionals are required to master. CISM provides executive management the assurance that consultants who have earned their certification have the background and skill to offer effective security management and consulting services. Progent can offer a CISM-certified consultant to assist your enterprise in vital security areas including information protection governance, risk assessment, information security process control, and crisis response management. Read additional details about Progent's Certified Information Security Manager Security Consulting Services.

  • Certified Information Systems Security Professionals (CISSP) Security Support Services
    Progent's CISSP consultants are security specialists who have been awarded CISSP certification as a result of verified professional work, extensive study, and formal examination. CISSP Certification indicates expertise in an international standard for information security. American National Standards Institute has granted the CISSP credential accreditation in the field of information security under ISO/IEC 17024. Fields of knowledge included within CISSP include security management practices, security design and models, access control systems, applications development security, business processes security, hardware security, encryption, telecommunications, Internet security, and disaster recovery planning. Read more information concerning Progent's CISSP Consulting Services.

  • Information Systems Security Architecture Professionals (ISSAP) Consulting Support
    Progent's ISSAP qualified security consultants are consultants who have been awarded ISSAP accreditation as a result of rigorous examination and extensive hands-on work with information security architecture. ISSAP security experts possess in-depth knowledge of access management systems and methodologies, phone system and network protection, cryptography, needs evaluation, business continuity and disaster recovery, and physical security integration. Progent's ISSAP-qualified security experts can help your business with all aspects of architecture security. Find out additional details concerning Progent's ISSAP Certified Secure System Infrastructure Engineering Support.

  • CISA Support Services
    The Certified Information Systems Auditor (CISA) credential is an important qualification that indicates expertise in IS security audit and control. Certified by the American National Standards Institute (ANSI), the CISA credential requires that consultants pass an exhaustive examination given by the ISACA international professional association. Progent can provide the expertise of a CISA-certified security engineer able to assist companies in the areas of information systems audit services, IT enforcement, systems and infrastructure lifecycle, information technology service delivery, safeguarding information assets, and business continuity preparedness. Learn the details concerning Progent's CISA Professional Expertise.

  • Global Information Assurance Certification Professional Services
    GIAC (Global Information Assurance Certification) was founded in 1999 to validate the skill of computer security engineers. GIAC's mission is to make sure that a certified professional possesses the skills needed to provide support in key categories of system, data, and application security. GIAC certifications are acknowledged by businesses and government organizations throughout the world including and the U.S. National Security Agency (NSA). Progent offers the support of certified security engineers for any of the security services covered within GIAC certification programs including assessing networks, security incident handling, traffic analysis, and web application security. Read the details about Progent's GIAC (Global Information Assurance Certification) Support Assistance.
Contact Progent for Network Security Consulting Services
If you need network security consulting, phone Progent at 800-993-9400 or visit Contact Progent.
















© 2002- 2018 Progent Corporation. All rights reserved.