Overview of Progent's Security Support Services
Progent's certified computer security experts offer a wide range of services intended to help organizations of any size to identify and correct security weaknesses, defend against assaults, remediate the issues caused by a breakdown of security, and meet government mandates for guarding information and reporting security incidents. Progent offers a selection of service modes:

  • On-demand remote and on-premises support invoiced by the minute
  • On-going managed services invoiced at a low fixed monthly fee
  • Value-priced service packages for a single security evaluation
As-needed Security Consulting Services
After you register for Progent's services (registration is free), you can get as-needed online or onsite support from one of Progent security consultant. This classic support model is essentially reactive and optimized for quickly resolving IT problems that are affecting your productivity or that are beyond the scope of your in-house support personnel. Typical examples are debugging a firewall or VPN tunnel, installing a critical security patch for a Cisco switch or router, designing secure access to cloud-based resources, or restoring data after a ransomware assault. These security services are billed to the nearest minute, which avoids the annoying situation of getting big bills for fast repairs.

Delivery alternatives for Progent's on-demand support include:

  • Remote Security Support
    Most security issues can be resolved remotely through a mix of phone support and a remote connection between Progent's Technical Response Center (TRC) and a customer's computer. Progent's TRC group can provide online security support by offering efficient access to consultants with the background and resources to fix some of the most challenging issues quickly, making your support costs low and reducing downtime.
  • Onsite Security Services
    For instances where on-premises support is necessary, Progent can send a technical expert to major metropolitan areas throughout the U.S. Progent can also send a security consultant with top certifications and world-class skills to any location in the country.
Progent's security engineers are certified to support systems powered by Microsoft, Linux, Apple Mac, Sun, and major versions of UNIX. Progent's broad range of consulting services covers firewall configuration, e-mail systems, secure system design, and data recovery. Progent's technical support staff has been awarded the world's top security accreditations including Certified Information Systems Auditor and Certified Information Systems Security Professional. Progent also offers fast access to remote Cisco-certified CCIE network engineers who can provide world-class support with complex network integration issues.

Progent's Fixed-price Managed Services for Information Assurance
Progent's value-priced ProSight portfolio of network management outsourcing services is designed to provide small and mid-size businesses with enterprise-class support and state-of-the-art technology for all facets of information assurance. Managed services offered by Progent include:

  • ProSight Email Guard: Inbound and Outbound Spam Filtering, Data Leakage Protection and Content Filtering
    ProSight Email Guard is Progent's email security platform that uses the technology of top data security vendors to deliver centralized control and world-class protection for your inbound and outbound email. The hybrid structure of Progent's Email Guard managed service integrates a Cloud Protection Layer with a local gateway appliance to offer complete defense against spam, viruses, Dos Attacks, DHAs, and other email-based threats. Email Guard's Cloud Protection Layer acts as a first line of defense and blocks the vast majority of unwanted email from making it to your security perimeter. This reduces your exposure to external threats and saves system bandwidth and storage space. Email Guard's onsite gateway device adds a deeper layer of analysis for incoming email. For outgoing email, the local gateway offers anti-virus and anti-spam filtering, protection against data leaks, and encryption. The local gateway can also help Exchange Server to monitor and safeguard internal email traffic that stays inside your corporate firewall. Learn more about Progent's ProSight Email Guard spam filtering, virus defense, content filtering and data loss protection.

  • ProSight Active Security Monitoring: Next Generation Endpoint Protection and Ransomware Defense
    ProSight Active Security Monitoring (ASM) is an endpoint protection (EPP) solution that incorporates next generation behavior analysis technology to guard endpoint devices and physical and virtual servers against new malware attacks like ransomware and email phishing, which easily get by legacy signature-matching AV products. ProSight Active Security Monitoring protects local and cloud resources and offers a single platform to manage the entire malware attack lifecycle including blocking, detection, mitigation, remediation, and forensics. Top features include one-click rollback with Windows VSS and automatic network-wide immunization against newly discovered threats. Find out more about Progent's ProSight Active Security Monitoring (ASM) endpoint protection and ransomware defense.

  • ProSight Data Protection Services: Managed Backup and Recovery
    ProSight Data Protection Services from Progent provide small and medium-sized organizations an affordable end-to-end service for reliable backup/disaster recovery. Available at a low monthly rate, ProSight DPS automates and monitors your backup activities and enables rapid recovery of vital files, apps and virtual machines that have become lost or damaged as a result of hardware breakdowns, software bugs, disasters, human error, or malicious attacks such as ransomware. ProSight DPS can help you protect, retrieve and restore files, folders, apps, system images, as well as Microsoft Hyper-V and VMware images. Important data can be protected on the cloud, to a local device, or to both. Progent's cloud backup specialists can deliver world-class support to configure ProSight DPS to be compliant with government and industry regulatory requirements such as HIPPA, FINRA, and PCI and, whenever needed, can assist you to recover your business-critical information. Read more about ProSight Data Protection Services managed cloud backup.

  • ProSight WAN Watch: Infrastructure Management
    ProSight WAN Watch is an infrastructure monitoring and management service that makes it easy and inexpensive for small and mid-sized organizations to diagram, monitor, optimize and debug their networking appliances such as switches, firewalls, and wireless controllers plus servers, endpoints and other networked devices. Using cutting-edge Remote Monitoring and Management technology, ProSight WAN Watch makes sure that network maps are kept updated, captures and manages the configuration of almost all devices on your network, monitors performance, and generates notices when issues are discovered. By automating tedious management and troubleshooting processes, ProSight WAN Watch can knock hours off ordinary tasks like making network diagrams, reconfiguring your network, locating appliances that require important software patches, or resolving performance bottlenecks. Find out more details about ProSight WAN Watch network infrastructure monitoring and management consulting.

  • ProSight Systems Watch: Server and Desktop Monitoring
    ProSight Systems Watch is Progentís server and desktop and management service that uses advanced remote monitoring and management techniques to keep your network operating efficiently by checking the state of critical assets that drive your information system. When ProSight Systems Watch detects a problem, an alarm is transmitted immediately to your designated IT management staff and your Progent engineering consultant so any potential issues can be resolved before they can disrupt productivity Learn more details about ProSight Systems Watch server and desktop management consulting.
Flat-rate Security Assessment and Verification Packages
Progent has put together a variety of fixed-price security assessment packages that provide high value by utilizing Progent's enterprise-class network monitoring software as well as Progent's consulting skills to produce an objective and comprehensive evaluation of your IT environment security posture.
  • Security Inventory Service Packages for Small Organizations
    Progent offers two ultra-affordable security inventory scanning packages designed to enable small businesses to get an objective security assessment from a certified security consultant. With Progent's External Security Inventory Scan, an engineer manages an extensive assessment of your IT system from outside your corporate firewall to determine possible gaps in the security posture you present to the outside world. With Progent's Internal Security Inventory Scan, a certified security expert runs a network scan from an authorized machine inside your corporate firewall to assess your exposure to inside assaults. The two security inventory scanning services are configured and executed from a secured external site. The scan is managed by a consultant who has been awarded advanced security certifications and who produces a document that describes and interprets the data captured by the scan and recommend various improvements where required.
  • Security Vulnerability Assessment Bundles for Enterprises
    Progent has developed three levels of fixed-price security evaluation service packages designed for enterprises who want to meet compliance standards required by government or industry regulators. Progent's security assessment service packages offer larger businesses a chance to obtain an objective assessment at the viability of their security posture. For each security assessment bundle, Progent engineers with top security credentials analyze and report on collected data and offer recommendations for efficient remediation. All the network security assessment bundles include an extra-cost option for on-premises consultants anywhere in the U.S.
  • Stealth Penetration Testing Services
    Stealth penetration testing, often referred to as PEN testing, is a critical tool for helping businesses to determine how vulnerable their network systems are to current-generation threats. Progent's stealth penetration testing services test how well your existing security policies and technologies stand up to authorized but unannounced intrusion attempts launched by Progent's veteran security specialists utilizing advanced hacking techniques. Read about Progent's stealth penetration testing services.
We've Been Hacked: What Can We Do Now?
Network Security ConsultantsIf you are currently fighting a network security emergency and you have not prepared a formal recovery procedure, refer to Progent's Online Computer Support to see how to receive immediate assistance. Progent offers online assistance from experienced network technicians and can escalate problems to high-level security specialists if necessary. Your company does not need to be a registered Progent client to receive urgent support for a security breach, but you can register as a Progent customer ahead of time at no cost and your standing as a current customer can save valuable time in case of a crisis.

Typically, smaller businesses have not documented a recovery procedure in the event of a damaging security breach. This is not good, since the damage from a serious security attack can be more devastating for a small company than for a large enterprise. Progent's security consultants can assist your business to create a sensible response and event reporting plan that reduces the IT system downtime resulting from an attack. The formal incident handling procedure outlined by GIAC (Global Information Assurance Certification) is Progent's recommended method for responding to a major security attack.

High-value Security Expertise Available from Progent
Progent's security consultants can provide expertise in key areas of IT compliance such as:

  • Security Vulnerability Evaluation and Compliance Assessment
    Progent offers expertise with security evaluation software like Microsoft Baseline Security Analyzer or LANguard from GFI for performing a set of comprehensive network tests to reveal potential security holes. Progent has broad experience with these utilities and can help you to analyze assessment reports and react appropriately. Progent's certified security engineers also can perform web application validation and can perform thorough assessments of enterprise-wide security to confirm your company's compliance with key industry security standards such as FISMA, NIST, and ISO 17799. Also, Progent can assess the effectiveness of your wireless protection covering stationary wireless appliances as well as portable handsets. Find out more information about Progent's Vulnerability Audits and Security Compliance Assessment.
  • Planning, Implementing, and Testing Protected Networks
    Any organization ought to develop a thoroughly thought out security plan that includes both preventive and responsive steps. The proactive strategy is a set of steps that works to minimize security holes. The post-attack strategy specifies procedures to assist security personnel to inventory the losses caused by an attack, repair the damage, document the experience, and revive business activity as soon as possible. Progent can show you how to build protection into your company processes, set up auditing utilities, define and execute a safe IT infrastructure, and propose processes and policies that will maximize the safety of your network. Progent's security experts are ready to assist you to set up a firewall, deploy protected remote access to e-mail and files, and install an efficient VPN. If you are looking for an affordable way for outsourcing your network security management, Progent's 24x7 Monitoring Options feature continual online network monitoring and fast response to problems.
  • Data Recovery and Failure Analysis
    Progent has expertise in restoring systems and servers that have been compromised, are in question, or have failed because of a security breach. Progent can help determine the losses resulting from the assault, return your company to normal functions, and retrieve information lost owing to the assault. Progent's security engineers can also oversee a thorough failure evaluation by examining event logs and utilizing other advanced assessment tools. Progent's background with security consulting reduces your off-air time and permits Progent to propose effective measures to prevent or mitigate new assaults.
  • Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Firewalls, and PIX Security Appliances Integration and Troubleshooting
    Cisco CCIE Security EngineersThe new ASA 5500-X Series of firewalls with Firepower Services deliver substantially more value than Cisco's legacy PIX and ASA 5500 firewalls and have replaced the ASA 5500 and PIX security appliances for all new deployments. Following Cisco's acquisition of Sourcefire, the entire family of ASA 5500-X firewalls can be configured to enable Firepower Services, built on Sourcefire's Snort product, which is the world's most popular network intrusion protection system (IPS). Firepower services bring powerful new features including advanced malware protection (AMP), URL filtering, dynamic threat analytics, and automation. Progent's Cisco-qualified CCIE network experts can help your company to maintain your existing PIX or ASA 5500 security appliances or migrate to ASA 5500-X firewalls with Firepower Services. Progent's consultants can provide online and onsite help with ASA 5500-X firewalls with Firepower Services and can help your business to design, integrate, tune, manage and troubleshoot firewall solutions built around Cisco ASA 5500-X firewalls with Firepower Services. Find out more information about ASA Firewalls with Firepower integration and debugging services.
  • Other Firewall and Virtual Private Network (VPN) Solutions
    As well as being expert in a wide range of security technologies available from Microsoft and Cisco, Progent offers small and mid-size businesses top-level support for technologies from other major firewall and Virtual Private Network vendors including:
  • SIEM Security Information and Event Management Solutions
    Security information and event management (SIEM) applications and services are intended to digest the enormous quantity of data represented by security incident logs created by a wide range of sources including network appliances, operating systems, and applications and monitoring tools. SIEM applications analyzes the security logs from these various sources and creates consolidated reports of security incidents as required by state regulations and business compliance standards. Progent's GIAC-certified computer security consultants and Cisco CCIE certified network infrastructure experts can assist businesses to design, install and operate a SIEM solution that helps them to understand the progress of security incidents and comply with security incident reporting regulations. (See Progent's Security information and Event Management solutions.)
Progent's Security Accreditations
Progent's security engineers have been awarded some of the most prestigious certifications available in the industry. These certifications require exhaustive testing and demonstrated work background to ensure that recipients have acquired expertise with a significant body of security knowledge and techniques and can offer high-level solutions to information environments of any size.
  • Certified Information Security Manager (CISM) Security Support Services
    CISM defines the fundamental skills and international standards of service that information security professionals are expected to achieve. It provides executive management the assurance that consultants who have earned their CISM possess the experience and skill to offer effective security administration and consulting support. Progent can offer a CISM-certified expert to assist your enterprise in key security disciplines including data protection governance, risk assessment, data protection program management, and crisis handling support. Find out the details about Progent's Certified Information Security Manager (CISM) Security Consulting Expertise.

  • CISSP Security Support Services
    Progent's Certified Information Systems Security Professionals (CISSPs) are security specialists who have earned CISSP accreditation through demonstrated professional work, extensive study, and formal testing. CISSP qualification indicates mastery of a worldwide standard for IT security. American National Standards Institute has given the CISSP status official recognition in the area of IT security under ISO/IEC 17024. Fields of knowledge included under CISSP include security management procedures, security architecture and models, connection control methodology, software development security, operations security, hardware security, encryption, telecommunications, Internet security, and business continuity planning. Learn more details concerning Progent's CISSP Support Services.

  • ISSAP Consulting Services
    Progent's ISSAP qualified security consultants are consultants who have earned ISSAP accreditation as a result of rigorous testing and extensive experience. field experience with network security architecture. ISSAP consultants possess in-depth knowledge of access control systems and methodologies, phone system and network infrastructure security, cryptography, needs evaluation, BCP and DRP, and physical security integration. Progent's ISSAP-qualified security specialists can assist your business with all aspects of architecture security. Find out the details concerning Progent's ISSAP Certified Secure IT Infrastructure Consulting Assistance.

  • Certified Information Systems Auditor (CISA) Consulting Services
    The Certified Information Systems Auditor (CISA) accreditation is a globally recognized achievement that signifies expertise in information system security audit and control. Certified by ANSI, the CISA accreditation has candidates undergo a comprehensive test given by the ISACA professional group. Progent can provide the expertise of a CISA-qualified security audit consultant able to help companies in the fields of IS audit process, IT governance, systems and infrastructure lifecycle, IT support, protecting data resources, and business continuity planning. Get additional information about Progent's CISA Professional Services.

  • GIAC Professional Services
    GIAC was established in 1999 to validate the knowledge of information technology security experts. GIAC's goal is to assure that an accredited professional has the skills needed to provide support in key categories of network, information, and software security. GIAC accreditations are acknowledged by companies and government organizations all over the world including and the United States National Security Agency (NSA). Progent can provide the support of certified professionals for all of the network security services covered within GIAC accreditation topics including auditing IT infrastructure, security incident handling, traffic analysis, and web services security. Find out additional details concerning Progent's GIAC Professional Assistance.
Contact Progent for Computer Security Expertise
If you're trying to find network security help, call Progent at 800-993-9400 or refer to Contact Progent.
















© 2002- 2018 Progent Corporation. All rights reserved.