Overview of Progent's Security Consulting Services
Progent's industry certified network security professionals offer a broad selection of professional services intended to help companies of any size to identify and eliminate security vulnerabilities, block attacks, recover from the issues resulting from a breakdown of security, and meet government mandates for reporting incidents. Progent delivers remote and on premises service and also offers highly affordable fixed-cost security evaluation bundles to supplement Progent's regular time-based billing.

Support services delivery alternatives available from Progent include:

  • Remote Security Services
    Typical security problems can be resolved remotely by a mix of telephone assistance and secure Internet access between Progent's Technical Response Center (TRC) and the client's computer system. Progent's Technical Response support team includes network security professionals who have the knowledge and experience and technical resources to solve some of the most challenging issues quickly, keeping your service expenses affordable and reducing lost productivity. Progent provides security help on a by-the-minute model with no minimum billing for online consulting support. Progent's pricing model avoids scenarios where quick fixes entail major bills. Progent also offers a number of fixed-price online security and compliance evaluation bundles that provide extraordinary value by leveraging Progent's advanced system scanning technology as well as Progent's consulting experience to deliver an objective and thorough picture of your network security profile.

  • On-premises Security Support Options
    In cases where on-premises support is necessary, Progent can send a field service technician to larger cities throughout the United States Progent's certified security consultants are in addition available for projects that call for high-level security specialists to be on site anywhere in the U.S., and Progent's most advanced security evaluation bundles for large businesses include the participation of several qualified security engineers at your location.

  • Time-critical Security Support Services
    To get immediate help with network security issues, your company can have access to a seasoned online support expert from Progent's team of security engineers available at Progent's Technical Response Center. Progent's urgent remote security support staff is available to offer effective and low-cost assistance with security issues that threaten the productivity of your network. Progent's security engineers are certified to provide help for environments powered by Microsoft Windows, Linux, Macintosh, Sun, and major versions of UNIX. Progent's broad selection of consulting services encompasses firewall expertise, e-mail security, protected network architecture, and information restoration. Progent's support staff has earned the world's top security certifications including CISA and ISSAP. Progent also offers immediate access to online Cisco-certified CCIE network consultants who can provide advanced support with tough network technology problems.

Our Network Has Been Hacked: What Should We Do Now?
Network Security ConsultantsIf your company is now experiencing a network security emergency and you do not have a formal recovery plan, go to Progent's Online Computer Help to see how to get fast assistance. Progent offers remote help from skilled network technicians and can escalate problems to certified security experts if required. Your business does not need to be a current Progent customer to receive emergency help for a security breach, but you can sign up as a Progent client ahead of time for free and your status as a registered customer could save precious time in case of an emergency.

Typically, smaller businesses have no recovery plan in case of a damaging security breach. This is risky, since the damage from a successful security assault can be even more devastating for a small company than for a large enterprise. Progent's security specialists can help your company to design an efficient response and event reporting plan that minimizes the IT system downtime following an attack. The step-by-step post-attack response procedure promoted by GIAC (Global Information Assurance Certification) is Progent's preferred procedure for handling a serious security attack.

Practice Areas of Progent's Security Services
Managing network security and planning for recovering vital data and functions following an attack requires an on-going program that entails a variety of tools and processes. Progent's certified professionals can assist your business at any level in your efforts to safeguard your IT network and remain in compliance, Progent's services range from security evaluation to designing a comprehensive security strategy. Some technologies supported by Progent's experts include Planning and Prevention, Information Recovery and Security Failure Analysis, plus Outsourced Protection from Email-Borne Spam and Viruses.

  • Designing, Implementing, and Validating Secure Environments
    Every organization should develop a carefully thought out security strategy that incorporates both proactive and reactive activity. The proactive strategy is a collection of precautions that works to reduce vulnerabilities. The reactive strategy defines procedures to assist IT staff to assess the losses caused by an attack, repair the damage, record the experience, and restore network activity as soon as possible. Progent can show you how to design protection into your company operations, configure scanning utilities, define and implement a safe network architecture, and propose procedures and policies to enhance the protection of your network. Progent's security experts are available to assist you to configure a firewall, design secure offsite access to email and files, and configure an efficient virtual private network. If your company is interested in an affordable way for jobbing out your network security administration, Progent's Round-the-clock Network Support Options feature continual online network tracking and fast response to emergencies.
  • Data Restoration and Failure Analysis
    Progent offers skill in recovering networks and servers that have been hacked, are suspect, or have ceased to function as a result of a security breach. Progent can show you how to determine the losses resulting from the assault, return your company to normal business operations, and retrieve information lost as a result of the event. Progent's certified engineers can also manage a thorough failure evaluation by examining activity logs and using a variety of advanced forensics tools. Progent's experience with security consulting minimizes your business disruption and allows Progent to propose effective ways to prevent or mitigate future assaults.
  • Email Security with Spam Filtering, Virus Protection, Content Filtering, and Data Leakage Protection
    Email Guard is Progent's email security platform that incorporates the services and infrastructure of top data security vendors to provide centralized control and world-class protection for your email traffic. The powerful architecture of Progent's Email Guard managed service combines a Cloud Protection Layer with an on-premises gateway appliance to provide advanced protection against spam, viruses, Denial of Service Attacks, Directory Harvest Attacks, and other email-borne threats. The Cloud Protection Layer serves as a preliminary barricade and blocks the vast majority of threats from making it to your network firewall. This reduces your exposure to inbound attacks and saves network bandwidth and storage. Email Guard's on-premises security gateway device provides a deeper layer of inspection for inbound email. For outbound email, the local security gateway offers anti-virus and anti-spam protection, protection against data leaks, and email encryption. The local security gateway can also help Exchange Server to monitor and protect internal email that stays inside your corporate firewall. Learn more about Progent's Email Guard Spam Filtering, Virus Defense, Content Filtering and Data Loss Prevention.
Advanced Security Expertise Available from Progent
Progent's security engineers can provide specialized help in vital areas of IT security including:
  • Vulnerability Audits and Security Compliance Assessment
    Progent offers experience with information risk evaluation utilities like Microsoft Baseline Security Analyzer or LANguard from GFI for performing a variety of comprehensive network scans to reveal potential security gaps. Progent has extensive skills with monitoring utilities and can help your company to understand audit reports and respond efficiently. Progent's security engineers also offer web software testing and can perform thorough evaluation of enterprise-wide security to verify your organization's compliance with key worldwide security specifications such as FISMA, PCI, and ISO 17799. Also, Progent can evaluate the strength of your wireless security covering fixed wireless appliances plus mobile devices. Learn additional information about Progent's Information Risk Evaluation and Security Compliance Testing.
  • Security Inventory and Evaluation Packages for Small Companies
    Progent has put together two ultra-affordable security inventory service packages designed to allow small businesses to receive an impartial network security evaluation from a certified security consultant. With Progent's External Network Security Inventory Scan, an engineer runs a comprehensive examination of your network from beyond your company firewall to uncover possible weaknesses in the security profile you present to the public. With Progent's Internal Network Security Inventory Scan, a certified security professional runs a system scan from an authorized computer inside your company firewall to uncover vulnerabilities to inside attacks. Both security inventory packages are set up and executed from a secured external site. The project is managed by a consultant who has earned high-level security credentials who produces a document that details and analyzes the data collected by the security scan and proposes practical improvements if appropriate.
  • Security Vulnerability Assessment Bundles for Large Businesses
    Progent's certified security consultants can deliver a selection of set-price network security assessment bundles created for corporations who have to meet security standards required by state regulators or by vendors. Progent's security evaluation bundles offer larger businesses a chance to get an independent opinion about the strength of their security profile. For each security assessment package, Progent consultants with top security accreditations evaluate and report on collected information and make suggestions for effective remediation. The various security audit packages include an added-cost option for on-premises engineers anywhere in the U.S.
  • Migrating from Microsoft ISA Server and Microsoft Forefront TMG
    Microsoft Internet Security and Acceleration (ISA) Server and its replacement Microsoft Forefront Threat Management Gateway are software solutions that include an application-aware firewall that can protect systems from outside and inside threats. Both of these products provide deep examination of Internet protocols to uncover threats that can elude legacy firewalls. ISA Server 2006 was superseded by Forefront TMG 2010, which is based on ISA Server 2006's architecture while providing a variety of improved features. Forefront TMG 2010 has been discontinued by Microsoft, and the security functions offered by the platform are now usually taken over by dedicated physical devices from companies that include Cisco, Barracuda, SonicWALL and WatchGuard. (See Cisco ASA Firewall with Firepower Services integration and management.) Progent offers advanced Microsoft Forefront TMG support and Microsoft ISA Server consulting services to help you manage and troubleshoot your legacy firewall environment, and Progent can help your organization to migrate efficiently to a modern security solution by providing planning, integration, optimization, training and troubleshooting.
  • Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Firewalls, and PIX Firewalls Configuration and Debugging
    Cisco CCIE Security ConsultantsThe latest generation of Cisco ASA 5500-X Series Next-Generation Firewalls with Firepower Services deliver significantly more value than Cisco's earlier firewalls and have replaced the ASA 5500 and PIX 500 security appliances for all new installations. Following Cisco's purchase of Sourcefire, the whole line of Cisco ASA 5500-X firewalls can be configured to enable Firepower Services, built on Sourcefire's Snort technology, which is the world's most popular intrusion protection system. Firepower services bring powerful new capabilities such as advanced malware protection (AMP), URL filtering, real-time threat analytics, and automation. Progent's Cisco-certified CCIE network consultants can assist your company to manage your existing PIX or ASA 5500 firewalls or migrate efficiently to Cisco ASA 5500-X firewalls with Firepower Services. Progent's consultants offer online and on-premises support for ASA 5500-X firewalls with Firepower Services and can assist your business to design, deploy, tune, manage and troubleshoot firewall solutions based on Cisco ASA 5500-X firewalls with Firepower Services. See more details about ASA 5500-X Firewalls with Firepower Services configuration and troubleshooting services.
  • Additional Firewall and Virtual Private Network (VPN) Solutions
    As well as supporting a wide array of protection technologies available from Microsoft and Cisco, Progent can provide small organizations top-level support for technologies from other important firewall and VPN vendors such as:
  • SIEM Integration and Support
    Security information and event management (SIEM) software and services are designed to digest the enormous amounts of data collected in security event logs created by a wide range of sources including network appliances, operating systems, and applications and tools. SIEM software analyzes the security logs from these diverse sources and produces summary reports of security events as mandated by government regulations and industry compliance guidelines. Progent's GIAC-certified computer security experts and Cisco CCIE certified network infrastructure consultants can assist organizations to plan, install and operate a SIEM system that helps them to see the behavior of attacks and comply with security incident reporting requirements. (Visit Progent's Security information and Event Management solutions.)
Progent's Security Credentials
Progent's security engineers have earned the most respected accreditations available in the security industry. All of these certifications require exhaustive testing and demonstrated field experience to ensure that recipients have mastered a substantial body of security knowledge and techniques and can provide high-level security solutions to information environments of any complexity.
  • Certified Information Security Manager (CISM) Security Consulting Services
    Certified Information Security Manager (CISM) defines the basic competencies and international standards of performance that IT security professionals are required to master. It offers business management the confidence that those who have earned their certification possess the experience and skill to provide effective security management and consulting services. Progent can provide a CISM-certified consultant to assist your enterprise in vital security disciplines such as data security governance, risk management, data security program control, and incident response management. Read additional information concerning Progent's CISM Security Consulting Services.
  • Certified Information Systems Security Professionals (CISSP) Security Consulting Expertise
    Progent's Certified Information Systems Security Professionals (CISSPs) are security specialists who have earned CISSP accreditation through verified professional work, rigorous study, and exhaustive testing. CISSP Certification recognizes expertise in an international standard for information security. American National Standards Institute has given the CISSP credential official recognition in the area of IT security under ISO/IEC 17024. Fields of expertise included within CISSP include security management practices, security architecture and test systems, access control systems, software development security, business processes security, hardware security, cryptography, communications, network security, and business continuity planning. Get more details about Progent's Certified Information Systems Security Professionals (CISSP) Consulting Assistance.
  • ISSAP Engineering Support
    Progent's ISSAP qualified security consultants are experts who have been awarded ISSAP accreditation after rigorous testing and significant hands-on work with network security design. ISSAP consultants possess in-depth knowledge of access management mechanisms and techniques, phone system and network infrastructure protection, cryptography, needs evaluation, business continuity and disaster recovery planning (DRP), and physical security. Progent's ISSAP-certified security experts can help your company with all aspects of secure network architecture. Find out additional information about Progent's ISSAP Accredited Secure Network Infrastructure Consulting Services.
  • Certified Information Systems Auditor Consulting Expertise
    The Certified Information Systems Auditor (CISA) accreditation is a recognized achievement that signifies mastery in network security auditing. Certified by ANSI, the CISA credential has candidates pass an extensive examination given by the ISACA international professional association. Progent can provide the services of a CISA-certified security engineer able to assist businesses in the areas of IS audit services, IT governance, network assets and architecture lifecycle, information technology service delivery, protecting information assets, and disaster recovery planning. Read the details concerning Progent's Certified Information Systems Auditor Consulting Assistance.
  • Global Information Assurance Certification Support Expertise
    GIAC (Global Information Assurance Certification) was established in 1999 to validate the skill of information technology security professionals. GIAC's mission is to ensure that a certified security consultant possesses the skills necessary to provide support in critical areas of network, information, and software security. GIAC accreditations are acknowledged by companies and institutions around the world including and the U.S. NSA. Progent can provide the expertise of GIAC certified security engineers for any of the security capabilities addressed under GIAC accreditation programs including auditing security systems, incident handling, intrusion detection, and web application security. Get more details concerning Progent's GIAC Support Expertise.
Get in Touch with Progent for Computer Security Consulting Services
If you're trying to find computer security support services, telephone Progent at 800-993-9400 or go to Contact Progent.

© 2002- 2017 Progent Corporation. All rights reserved.