Overview of Progent's Security and Compliance Consulting Services
Progent's industry certified computer security and compliance consultants offer a wide range of support services designed to assist organizations of any size to uncover and eliminate security weaknesses, block attacks, remediate any problems caused by a breach of protection, and meet government mandates for protecting information and reporting incidents. Progent offers a selection of service delivery modes:

  • On-demand remote and on-site support billed to the nearest minute
  • On-going managed services billed at an affordable flat monthly rate
  • Set-price service bundles for a one-time security and compliance evaluation
As-needed Security Consulting Services
Once you sign up for Progent's services (signing up is free), you can receive on-demand online or onsite assistance from one of Progent security consultant. This traditional support model is essentially reactive and geared toward rapidly resolving technical problems that are affecting your network or that are beyond the scope of your own support staff. Common scenarios include debugging a firewall appliance or VPN tunnel, implementing a vital security update for a Cisco switch or router, designing secure access to cloud-based resources, or restoring data after a ransomware assault. These services are invoiced by the minute, which eliminates the frustrating situation of receiving large bills for fast fixes.

Delivery options for Progent's on-demand support services include:

  • Remote Security Support Services
    Most security-related problems can be handled online via a mix of phone help and a remote connection between Progent's Technical Response Center (TRC) and a client's computer. Progent's Technical Response Center can deliver remote security help by offering easy access to consultants who have the experience and technical resources to resolve many of the most difficult issues quickly, keeping your service costs affordable and minimizing downtime.
  • On-premises Security Support
    For instances where onsite assistance is necessary, Progent can send a technical professional to major metropolitan areas throughout the United States. Progent can also dispatch a security consultant with top certifications and advanced skills to any site in the country.
Progent's accredited consultants are qualified to support environments powered by Microsoft Windows, Linux, Apple Mac, Solaris, and popular derivatives of UNIX. Progent's wide array of consulting services encompasses firewall configuration, e-mail systems, secure system design, and information recovery. Progent's technical support team has been awarded the industry's top security credentials including Certified Information Systems Auditor and CISSP. Progent also offers fast access to online Cisco-certified CCIE network consultants who can deliver advanced assistance with complex network configuration problems.

ProSight Fixed-price Managed Services for Information Assurance
Progent's low-cost ProSight portfolio of network management outsourcing services is intended to provide small and mid-size organizations with enterprise-class support and cutting-edge technology for all facets of information assurance. ProSight managed services offered by Progent include:

  • ProSight Email Guard: Spam Filtering, Data Leakage Protection and Content Filtering
    ProSight Email Guard is Progent's email filtering and encryption solution that incorporates the services and infrastructure of leading data security companies to provide web-based management and world-class security for your email traffic. The powerful structure of Progent's Email Guard integrates cloud-based filtering with an on-premises security gateway appliance to offer complete protection against spam, viruses, Denial of Service Attacks, DHAs, and other email-borne malware. The cloud filter acts as a preliminary barricade and blocks the vast majority of unwanted email from reaching your security perimeter. This reduces your exposure to inbound attacks and conserves system bandwidth and storage space. Email Guard's on-premises security gateway appliance adds a further level of inspection for incoming email. For outgoing email, the on-premises security gateway offers AV and anti-spam filtering, protection against data leaks, and email encryption. The local gateway can also help Microsoft Exchange Server to monitor and safeguard internal email that stays within your security perimeter. Find out more about Progent's ProSight Email Guard spam filtering, virus defense, content filtering and data leakage protection.

  • ProSight Active Security Monitoring (ASM): Endpoint Protection and Ransomware Defense
    Progent's ProSight Active Security Monitoring (ASM) is an endpoint protection (EPP) solution that incorporates next generation behavior machine learning technology to guard endpoint devices and physical and virtual servers against new malware attacks like ransomware and file-less exploits, which routinely evade legacy signature-based anti-virus products. ProSight Active Security Monitoring protects local and cloud-based resources and offers a unified platform to address the complete threat progression including blocking, identification, mitigation, cleanup, and forensics. Key capabilities include single-click rollback using Windows Volume Shadow Copy Service (VSS) and automatic system-wide immunization against new threats. Read more about Progent's ProSight Active Security Monitoring next-generation endpoint protection and ransomware defense.

  • ProSight Data Protection Services: Managed Cloud Backup
    ProSight Data Protection Services from Progent provide small and mid-sized businesses a low cost end-to-end service for secure backup/disaster recovery (BDR). Available at a fixed monthly cost, ProSight Data Protection Services automates your backup processes and allows fast restoration of vital files, apps and VMs that have become lost or corrupted as a result of hardware failures, software glitches, natural disasters, human error, or malicious attacks like ransomware. ProSight DPS can help you protect, recover and restore files, folders, applications, system images, as well as Microsoft Hyper-V and VMware images. Important data can be backed up on the cloud, to a local device, or mirrored to both. Progent's BDR specialists can provide advanced expertise to set up ProSight Data Protection Services to to comply with regulatory requirements such as HIPPA, FINRA, and PCI and, whenever needed, can help you to restore your business-critical information. Learn more about ProSight DPS Managed Cloud Backup.

  • ProSight WAN Watch: Infrastructure Management
    Progentís ProSight WAN Watch is a network infrastructure management service that makes it easy and inexpensive for small and mid-sized businesses to map, track, enhance and troubleshoot their connectivity hardware like routers and switches, firewalls, and access points as well as servers, endpoints and other devices. Incorporating state-of-the-art Remote Monitoring and Management technology, WAN Watch ensures that infrastructure topology diagrams are always current, copies and manages the configuration information of almost all devices connected to your network, tracks performance, and sends alerts when issues are detected. By automating complex network management processes, WAN Watch can knock hours off ordinary tasks such as network mapping, expanding your network, locating devices that require critical updates, or isolating performance issues. Find out more details about ProSight WAN Watch network infrastructure management consulting.

  • ProSight LAN Watch: Server and Desktop Monitoring
    ProSight LAN Watch is Progentís server and desktop monitoring managed service that incorporates state-of-the-art remote monitoring and management (RMM) techniques to help keep your network operating efficiently by checking the state of vital computers that drive your business network. When ProSight LAN Watch detects a problem, an alert is sent immediately to your specified IT management personnel and your Progent consultant so all looming problems can be addressed before they can impact productivity Learn more details about ProSight LAN Watch server and desktop monitoring consulting.

  • ProSight Virtual Hosting: Hosted Virtual Machines at Progent's World-class Data Center
    With ProSight Virtual Hosting service, a small or mid-size business can have its key servers and applications hosted in a protected Tier III data center on a fast virtual machine host configured and maintained by Progent's IT support experts. With Progent's ProSight Virtual Hosting model, the client retains ownership of the data, the operating system platforms, and the apps. Because the system is virtualized, it can be ported easily to an alternate hardware environment without a time-consuming and difficult reinstallation procedure. With ProSight Virtual Hosting, your business is not tied one hosting service. Find out more about ProSight Virtual Hosting services.

  • ProSight IT Asset Management: Network Infrastructure Documentation Management
    Progent's ProSight IT Asset Management service is a cloud-based IT documentation management service that allows you to capture, update, retrieve and protect data related to your network infrastructure, processes, business apps, and services. You can instantly locate passwords or IP addresses and be warned about impending expirations of SSL certificates or warranties. By cleaning up and managing your IT infrastructure documentation, you can save as much as 50% of time spent trying to find vital information about your IT network. ProSight IT Asset Management includes a centralized location for storing and sharing all documents related to managing your business network like recommended procedures and How-To's. ProSight IT Asset Management also supports a high level of automation for gathering and relating IT information. Whether youíre making improvements, performing maintenance, or reacting to an emergency, ProSight IT Asset Management gets you the knowledge you need when you need it. Find out more details about ProSight IT Asset Management service.
ProSight Network Audits
Progent's ProSight Network Audits offer a quick and affordable alternative for small and medium-size businesses to get an unbiased assessment of the health of their IT system. Based on some of the top remote monitoring and management (RMM) tools available, and supervised by Progent's certified team of information technology experts, ProSight Network Audits help you see how well the configuration of your essential network devices conform to industry best practices. Both the Basic and Advanced options for ProSight Network Audit services are available at a low, one-time cost and deliver instant benefits like a cleaner Active Directory environment. Both also come with one year of cutting-edge remote network monitoring and management (RMM). Advantages can include easier network management, better compliance with data security standards, more efficient utilization of network assets, quicker problem resolution, more reliable backup and recovery, and less downtime. See more information about ProSight Network Audits network infrastructure assessment.

Set-price Security Evaluation and Verification Packages
Progent offers a portfolio of flat-rate security and compliance evaluation bundles that provide exceptional value by utilizing Progent's advanced system monitoring software as well as Progent's technical skills to create an objective and comprehensive assessment of your IT environment security posture.

  • Security Assessment Service Bundles for Small Businesses
    Progent offers two value-priced security inventory scanning service packages intended to enable small businesses to obtain a professional security evaluation from a certified security engineer. With Progent's External Security Inventory Scan, a consultant administers a comprehensive examination of your network from beyond your corporate firewall to determine potential risks in the security profile you expose to the outside world. With Progent's Internal Security Inventory Scan, a security expert executes a network scan using an authorized machine within your firewalled perimeter to assess your vulnerability to internal attacks. These two security inventory scans are set up and executed from a secured external site. The scan is managed by a consultant who has earned advanced security certifications and who produces a document that details and interprets the data collected by the security scan and suggests various improvements where appropriate.
  • Security Vulnerability Assessment Packages for Large Organizations
    Progent has developed three levels of fixed-price security assessment service packages designed for enterprises who need to meet compliance standards required by state or industry regulators. Progent's security evaluation service packages offer larger organizations a chance to obtain a professional assessment at the strength of their security profile. For each security assessment package, Progent engineers with advanced security credentials analyze and report on captured data and offer suggestions for efficient improvements. Each of the network security audit packages include an extra-cost option for onsite consultants anywhere in the United States.
  • Stealth Penetration Testing Services
    Stealth penetration testing, often referred to as PEN testing, is a critical tool for allowing businesses to find out how vulnerable their network systems are to current-generation threats. Progent's stealth penetration testing check how effectively your existing security policies and platforms resist authorized but unannounced penetration attempts managed by Progent's veteran security specialists utilizing advanced hacking methods. Find out about Progent's stealth penetration testing (PEN Test) services.
We've Been Hacked: What Are We Supposed to Do Now?
Network Security ConsultantsIf you are now fighting a security crisis and you have not prepared a formal response procedure, visit Progent's Online Network Help to find out how to receive fast help. Progent provides remote assistance from experienced engineers and can refer trouble tickets to certified security specialists if required. Your organization does not have to be a current Progent client to get emergency help for a security breakdown, but you can sign up as a Progent customer ahead of time for free and your status as a registered customer could save valuable time when there is an emergency.

Usually, smaller companies do not have a response plan in the event of a damaging attack. This is not good, because the cost of a successful security attack can be more devastating for a small company than for a big enterprise. Progent's security engineers can assist your company to design a practical response and event reporting procedure that reduces the network disruption following an attack. The formal incident response procedure promoted by Global Information Assurance Certification is Progent's suggested method for reacting to a serious security incident.

High-value Security Services Available from Progent
Progent's veteran engineers offer expertise in vital facets of network security including:

  • Vulnerability Audits and Security Compliance Assessment
    Progent offers experience with security evaluation tools like Microsoft Baseline Security Analyzer or LANguard for performing a variety of comprehensive network scans to uncover potential security gaps. Progent has extensive experience with scanning utilities and can help your company to understand assessment reports and react efficiently. Progent's certified security consultants also provide web application testing and can perform thorough assessments of enterprise-wide security to determine your organization's compliance with important global security standards including FISMA, PCI, and ISO. Also, Progent can assess the effectiveness of your wireless security covering fixed wireless equipment plus mobile handsets. Find out additional information about Progent's Information Risk Evaluation and Security Compliance Assessment.
  • Designing, Building, and Testing Secure Environments
    Every business ought to develop a thoroughly considered security plan that incorporates both preventive and responsive activity. The proactive plan is a set of precautions that helps to minimize security holes. The reactive strategy defines procedures to help IT staff to evaluate the losses resulting from a breach, remediate the damage, document the experience, and revive business functions as quickly as feasible. Progent can advise you how to incorporate protection into your company operations, install scanning utilities, create and implement a safe network infrastructure, and propose procedures and policies to enhance the safety of your computing environment. Progent's security professionals are ready to help you to set up a firewall, design protected remote access to email and files, and install an efficient VPN. If you are looking for an affordable way for outsourcing your network security management, Progent's Round-the-clock Network Support Options feature automated remote server tracking and fast resolution of problems.
  • Data Recovery and Failure Analysis
    Progent has skill in restoring networks and servers that have been compromised, are in question, or have failed because of a security attack. Progent can show you how to evaluate the losses resulting from the assault, return your company to normal functions, and retrieve information compromised as a result of the assault. Progent's certified engineers can also manage a comprehensive forensic analysis by going over event logs and using other advanced assessment tools. Progent's experience with security problems reduces your off-air time and allows Progent to propose effective ways to avoid or contain future attacks.
  • Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Firewalls, and PIX 500 Security Appliances Integration and Debugging
    Cisco CCIE Security ConsultantsThe latest generation of ASA 5500-X Family of firewalls with Firepower Services deliver significantly more value than Cisco's earlier firewalls and have superseded the ASA 5500 and PIX security appliances for all new installations. Since Cisco's acquisition of Sourcefire, the entire family of Cisco ASA 5500-X devices can be provisioned to enable Firepower Services, built on Sourcefire's Snort technology, which is the world's most deployed intrusion protection system (IPS). Firepower services provide powerful new capabilities including advanced malware protection (AMP), URL filtering, dynamic threat analytics, and automation. Progent's Cisco-qualified CCIE network experts can help your company to manage your existing PIX or ASA 5500 firewalls and migrate to Cisco ASA 5500-X firewalls with Firepower Services. Progent's consultants offer online and onsite support for ASA 5500-X firewalls with Firepower Services and can assist you to plan, integrate, tune, manage and troubleshoot firewall environments built around Cisco ASA 5500-X firewalls with Firepower Services. Find out more details about Cisco ASA Firewalls with Firepower integration and debugging services.
  • Other Firewall and VPN Solutions
    As well as supporting a wide range of network security technologies from Microsoft and Cisco, Progent can provide small organizations expert consulting for technologies from other popular firewall and VPN vendors including:
  • SIEM Security Information and Event Management Solutions
    Security information and event management (SIEM) applications and services are intended to digest the enormous amounts of data represented by security incident records created by a wide range of sources including network appliances, operating systems, and application software and tools. SIEM software organizes the security logs from these diverse sources and creates summary reports of security incidents as required by government regulations and business compliance guidelines. Progent's GIAC-certified information assurance experts and Cisco CCIE certified network infrastructure consultants can help organizations to plan, install and manage a SIEM solution that helps them to see the progress of attacks and comply with security incident reporting requirements. (Visit Progent's Security information and Event Management solutions.)
Progent's Security Accreditations
Progent's security consultants have earned the most prestigious accreditations available in the industry. These certifications demand exhaustive examinations and demonstrated field experience to ensure that candidates have acquired expertise with a substantial amount of security information and techniques and can offer high-level consulting to computer networks of any complexity.
  • CISM Security Support Expertise
    Certified Information Security Manager (CISM) identifies the core competencies and international benchmarks of performance that information technology security professionals are expected to achieve. CISM offers executive management the confidence that those who have been awarded their certification possess the background and skill to offer efficient security administration and engineering services. Progent can provide a CISM-certified support professional to assist your enterprise in key security areas including data security governance, vulnerability assessment, information protection program control, and crisis response support. Find out additional details concerning Progent's CISM Security Support Expertise.

  • CISSP Security Consulting Expertise
    Progent's CISSP experts are security engineers who have been awarded CISSP certification as a result of demonstrated professional work, extensive study, and formal testing. CISSP Certification recognizes mastery of an international standard for IT security. American National Standards Institute has granted the CISSP status accreditation in the area of IT security under ISO/IEC 17024. Fields of expertise covered under CISSP include security management practices, security design and models, access permission systems, applications development security, operations security, physical security, cryptography, communications, network security, and business continuity planning. Learn additional information concerning Progent's CISSP Consulting Expertise.

  • ISSAP Consulting Services
    Progent's ISSAP qualified security consultants are consultants who have been awarded ISSAP certification as a result of thorough testing and substantial hands-on work with information security design. ISSAP security experts have comprehensive knowledge of access control mechanisms and techniques, phone system and network protection, cryptography, needs evaluation, business continuity and DRP, and physical security. Progent's ISSAP-certified security consultants can help your business with all aspects of architecture security. Learn additional details concerning Progent's ISSAP Certified Protected Network Infrastructure Engineering Support.

  • Certified Information Systems Auditor Professional Services
    The CISA accreditation is a globally recognized qualification that represents expertise in network security audit and control. Accredited by the American National Standards Institute (ANSI), the CISA credential requires that consultants pass an exhaustive examination administered by the ISACA international professional group. Progent can provide the expertise of a CISA-qualified security engineer able to assist businesses in the areas of information systems audit process, IT governance, systems and infrastructure planned useful life, IT service delivery, safeguarding information assets, and business continuity planning. Get additional details concerning Progent's Certified Information Systems Auditor Consulting Assistance.

  • GIAC Support Expertise
    Global Information Assurance Certification was founded in 1999 to certify the knowledge of network security experts. GIAC's mission is to assure that an accredited professional has the knowledge appropriate to deliver support in critical areas of network, data, and software security. GIAC accreditations are acknowledged by companies and government organizations throughout the world including and the U.S. National Security Agency. Progent can provide the assistance of GIAC certified security engineers for all of the security disciplines addressed under GIAC certification topics such as auditing security systems, incident response, intrusion detection, and web-based application security. Learn additional details concerning Progent's GIAC (Global Information Assurance Certification) Support Services.
Contact Progent for Computer Security Help
If you're trying to find security engineering help, call Progent at 800-993-9400 or refer to Contact Progent.
















© 2002- 2018 Progent Corporation. All rights reserved.