Introduction to Progent's Security and Compliance Consulting Services
Progent's certified network security and compliance professionals can provide a wide selection of services designed to help businesses of all sizes to identify and eliminate security weaknesses, block attacks, remediate any issues resulting from a breach of security, and meet government mandates for protecting data and reporting incidents. Progent can provide a selection of service models:

  • As-needed online and on-site assistance billed by the minute
  • Continual fully managed services billed at a low fixed monthly rate
  • Value-priced service packages for a one-time security assessment
As-needed Security Support Services
Once you sign up for Progent's services (signing up is free), you can receive on-demand online or on-premises assistance from one of Progent security expert. This classic support model is primarily reactive and geared toward quickly taking care of IT issues that are affecting your productivity or that have stymied your own support staff. Typical examples include debugging a firewall or VPN connection, installing a vital security update for a Cisco switch or router, setting up compliant access to a public cloud, or recovering from a ransomware attack. These security services are invoiced by the minute, which eliminates the annoying case of receiving big invoices for quick fixes.

Delivery options for Progent's as-needed support include:

  • Remote Security Support Services
    Most security-related problems can be resolved online through a combination of phone-based help and a remote Internet connection between Progent's Technical Response Center (TRC) and a customer's computer. Progent's TRC group can deliver remote security support by offering efficient access to consultants with the background and resources to fix some of the most difficult issues quickly, making your support expenses low and reducing downtime.
  • On-premises Security Support
    For cases where onsite support is necessary, Progent can dispatch a technical expert to major cities across the United States. Progent can also dispatch a security specialist with high-level certifications and advanced skills to any site in the U.S.
Progent's security consultants are qualified to support systems based on Microsoft Windows, Linux, Apple Mac, Solaris, and popular derivatives of UNIX. Progent's wide array of consulting services addresses firewall technology, e-mail systems, protected network design, and data restoration. Progent's support staff has earned the industry's top security certifications including GIAC (Global Information Assurance Certification) and CISSP. Progent also can provide immediate access to remote Cisco-certified CCIE network engineers who can deliver advanced support with complex network integration issues.

ProSight Low-Cost Managed Services for Information Assurance
Progent's value-priced ProSight suite of managed services is intended to provide small and mid-size organizations with enterprise-class support and cutting-edge technology for all facets of information assurance. ProSight managed services available from Progent include:

  • ProSight Active Security Monitoring (ASM): Next Generation Endpoint Protection and Ransomware Defense
    Progent's ProSight Active Security Monitoring is an endpoint protection solution that utilizes cutting edge behavior machine learning technology to guard endpoints as well as physical and virtual servers against modern malware assaults such as ransomware and file-less exploits, which routinely evade legacy signature-matching AV tools. ProSight ASM protects local and cloud-based resources and offers a single platform to address the complete malware attack lifecycle including protection, infiltration detection, mitigation, cleanup, and post-attack forensics. Top features include single-click rollback using Windows VSS and automatic system-wide immunization against newly discovered attacks. Find out more about Progent's ProSight Active Security Monitoring endpoint protection and ransomware defense.

  • ProSight Enhanced Security Protection: Unified Physical and Virtual Endpoint Security
    Progent's ProSight Enhanced Security Protection managed services deliver affordable in-depth security for physical servers and virtual machines, desktops, smartphones, and Microsoft Exchange. ProSight ESP uses contextual security and advanced heuristics for continuously monitoring and reacting to cyber threats from all vectors. ProSight ESP delivers firewall protection, intrusion alarms, device management, and web filtering through leading-edge technologies incorporated within one agent managed from a unified console. Progent's security and virtualization consultants can assist your business to plan and configure a ProSight ESP environment that addresses your company's specific requirements and that helps you achieve and demonstrate compliance with legal and industry data security standards. Progent will assist you define and configure policies that ProSight ESP will enforce, and Progent will monitor your IT environment and respond to alarms that call for urgent attention. Progent's consultants can also assist your company to install and test a backup and disaster recovery system like ProSight Data Protection Services (DPS) so you can get back in business quickly from a destructive security attack such as ransomware. Learn more about Progent's ProSight Enhanced Security Protection (ESP) unified endpoint protection and Microsoft Exchange email filtering.

  • ProSight Data Protection Services: Managed Backup and Recovery
    ProSight Data Protection Services from Progent provide small and mid-sized organizations an affordable and fully managed service for reliable backup/disaster recovery. For a fixed monthly cost, ProSight Data Protection Services automates and monitors your backup processes and allows rapid restoration of vital files, apps and virtual machines that have become lost or corrupted due to hardware breakdowns, software glitches, disasters, human mistakes, or malicious attacks like ransomware. ProSight DPS can help you back up, recover and restore files, folders, applications, system images, as well as Microsoft Hyper-V and VMware images. Critical data can be backed up on the cloud, to an on-promises device, or mirrored to both. Progent's BDR specialists can provide advanced expertise to configure ProSight DPS to to comply with government and industry regulatory standards such as HIPPA, FIRPA, and PCI and, when needed, can help you to recover your critical information. Read more about ProSight DPS Managed Cloud Backup.

  • ProSight Email Guard: Spam Filtering, Data Leakage Protection and Content Filtering
    ProSight Email Guard is Progent's email security platform that incorporates the services and infrastructure of leading data security companies to deliver centralized control and world-class protection for all your email traffic. The hybrid architecture of Progent's Email Guard integrates a Cloud Protection Layer with a local security gateway appliance to offer advanced protection against spam, viruses, Dos Attacks, Directory Harvest Attacks (DHAs), and other email-based threats. Email Guard's Cloud Protection Layer serves as a preliminary barricade and keeps most threats from reaching your network firewall. This decreases your exposure to external attacks and conserves network bandwidth and storage. Email Guard's onsite security gateway appliance adds a deeper layer of inspection for incoming email. For outgoing email, the on-premises gateway offers anti-virus and anti-spam protection, protection against data leaks, and email encryption. The onsite gateway can also help Microsoft Exchange Server to monitor and protect internal email that stays inside your security perimeter. Find out more about Progent's ProSight Email Guard spam filtering, virus blocking, content filtering and data leakage protection.

  • ProSight WAN Watch: Network Infrastructure Management
    ProSight WAN Watch is a network infrastructure monitoring and management service that makes it simple and affordable for small and mid-sized businesses to map out, track, enhance and debug their networking appliances such as switches, firewalls, and access points plus servers, endpoints and other networked devices. Using state-of-the-art Remote Monitoring and Management (RMM) technology, WAN Watch ensures that network maps are always updated, copies and displays the configuration information of almost all devices on your network, tracks performance, and sends alerts when problems are discovered. By automating time-consuming management processes, WAN Watch can cut hours off ordinary tasks like making network diagrams, reconfiguring your network, locating appliances that require critical software patches, or isolating performance problems. Learn more about ProSight WAN Watch infrastructure management services.

  • ProSight LAN Watch: Server and Desktop Remote Monitoring and Management
    ProSight LAN Watch is Progentís server and desktop remote monitoring managed service that incorporates state-of-the-art remote monitoring and management techniques to keep your network running efficiently by tracking the health of critical computers that power your business network. When ProSight LAN Watch uncovers a problem, an alert is sent immediately to your designated IT management staff and your Progent engineering consultant so any looming issues can be addressed before they can disrupt your network Learn more about ProSight LAN Watch server and desktop remote monitoring consulting.

  • ProSight Virtual Hosting: Hosted VMs at Progent's World-class Data Center
    With Progent's ProSight Virtual Hosting service, a small or mid-size business can have its critical servers and apps hosted in a secure fault tolerant data center on a fast virtual machine host configured and maintained by Progent's IT support professionals. With Progent's ProSight Virtual Hosting service model, the customer owns the data, the operating system software, and the applications. Because the system is virtualized, it can be moved easily to a different hosting solution without requiring a lengthy and technically risky configuration procedure. With ProSight Virtual Hosting, your business is not locked into one hosting provider. Learn more details about ProSight Virtual Hosting services.

  • ProSight IT Asset Management: Network Infrastructure Documentation Management
    Progent's ProSight IT Asset Management service is an IT infrastructure documentation management service that makes it easy to capture, maintain, retrieve and protect information about your IT infrastructure, procedures, applications, and services. You can quickly find passwords or serial numbers and be warned about upcoming expirations of SSLs or warranties. By updating and managing your IT infrastructure documentation, you can save up to 50% of time spent trying to find critical information about your network. ProSight IT Asset Management includes a common repository for holding and sharing all documents required for managing your business network like recommended procedures and How-To's. ProSight IT Asset Management also supports a high level of automation for gathering and associating IT information. Whether youíre planning enhancements, performing maintenance, or reacting to an emergency, ProSight IT Asset Management delivers the knowledge you need as soon as you need it. Find out more details about ProSight IT Asset Management service.
ProSight Network Audits
Progent's ProSight Network Audits are a fast and affordable alternative for small and mid-size businesses to obtain an unbiased evaluation of the overall health of their IT system. Based on a selection of the top remote monitoring and management (RMM) tools available, and overseen by Progent's certified team of IT experts, ProSight Network Audits show you how well the deployment of your core network assets conform to best practices. The Basic and Advanced versions of ProSight Network Audit services are offered at a low, one-time cost and deliver immediate ROI like a more manageable Active Directory system. Both versions also come with one year of cutting-edge remote network monitoring and management (RMM). Advantages can include simpler management, better compliance with data security regulations, more efficient utilization of network resources, faster problem resolution, more dependable backup and recovery, and increased uptime. See more information about ProSight Network Audits IT infrastructure assessment.

Progent's ProSight Ransomware Preparedness Report Service
The ProSight Ransomware Preparedness Report is an affordable service based on a phone discussion with a Progent information assurance consultant. The interview is designed to help evaluate your organization's ability either to block or recover quickly from a ransomware incident. Progent will consult with you directly to gather information concerning your current antivirus tools and backup/recovery system, and Progent will then deliver a written Basic Security and Best Practices Report document describing how you can apply best practices to deploy an efficient security and backup environment that aligns with your company's requirements. For details, visit Progent's ProSight Ransomware Preparedness Report Service.

Fixed-price Security Assessment and Validation Bundles
Progent offers a number of set-price security and compliance evaluation packages that provide high value by deploying Progent's advanced network monitoring software plus Progent's consulting skills to produce an objective and comprehensive assessment of your IT environment security posture.

  • Security Inventory Service Packages for Small Businesses
    Progent offers two value-priced security inventory scanning packages intended to enable small organizations to get an objective security evaluation from an accredited security engineer. With Progent's External Security Inventory Scan, a consultant administers a comprehensive assessment of your IT system from beyond your firewalled perimeter to determine potential gaps in the security profile you present to the outside world. With Progent's Internal Security Inventory Scan, a security consultant runs a system scan from an authorized machine within your firewalled perimeter to assess your exposure to internal attacks. The two security inventory scans are set up and executed from a secured external site. The scan is managed by an engineer who has earned advanced security certifications and who produces a document that describes and evaluates the data collected by the scan and recommend various improvements where required.
  • Security Vulnerability Assessment Packages for Large Businesses
    Progent offers three levels of flat-rate security assessment service bundles designed for large organizations who want to meet security standards required by government or industry regulators. Progent's security evaluation service packages offer larger businesses an opportunity to get a professional look at the viability of their security profile. For every security evaluation package, Progent consultants with top security credentials analyze and report on captured data and offer suggestions for efficient remediation. Each of the network security assessment packages include an extra-cost option for onsite engineers at any location in the United States.
  • Stealth Penetration Testing Services
    Stealth penetration testing, often known as PEN testing, is a vital tool for helping businesses to find out how open their network systems are to modern threats. Progent's stealth penetration testing check how effectively your existing security procedures and platforms stand up to authorized but unannounced intrusion attempts launched by Progent's experienced security specialists utilizing cutting-edge hacking techniques. Find out about Progent's stealth penetration testing (PEN Test) services.
We've Been Hacked: What Do We Do Now?
Network Security ConsultantsIf you are now faced with a network security crisis and you do not have a detailed response procedure, visit Progent's Online Network Support to see how to receive fast help. Progent provides online help from skilled engineers and can refer problems to high-level security specialists if required. Your company does not have to be a current Progent client to get urgent support for a security breakdown, but you can sign up as a Progent customer ahead of time for free and your standing as a registered customer could save valuable time during an emergency.

Usually, smaller businesses have no recovery procedure in the event of a damaging penetration. This is risky, since the damage from a successful security attack can be even more devastating for a small company than for a large enterprise. Progent's security consultants can assist your business to create a practical recovery and incident reporting procedure that reduces the network downtime following a security breach. The formal incident response model promoted by GIAC is Progent's preferred procedure for reacting to a serious security penetration.

High-value Security Services Offered by Progent
Progent's veteran consultants offer expertise in vital facets of IT compliance including:

  • Security Vulnerability Audits and Compliance Testing
    Progent offers expertise with information risk auditing software such as MS Baseline Security Analyzer and LANguard from GFI for conducting a set of comprehensive system scans to identify potential security holes. Progent has extensive experience with these utilities and can assist your company to analyze audit reports and react appropriately. Progent's security engineers also offer web software validation and can conduct thorough assessments of enterprise-wide security to validate your company's compliance with major global security specifications including HIPAA, NIST, and ISO 17799. Also, Progent can evaluate the effectiveness of your wireless security including fixed wireless equipment plus portable devices. Read more information concerning Progent's Vulnerability Evaluation and Security Compliance Assessment.
  • Designing, Building, and Testing Protected Networks
    Every business should have a carefully thought out security plan that includes both proactive and reactive activity. The proactive plan is a set of precautions that works to reduce vulnerabilities. The post-attack plan specifies procedures to help IT staff to evaluate the losses resulting from an attack, remediate the damage, document the event, and revive network functions as quickly as feasible. Progent can advise you how to design security into your business operations, configure auditing utilities, define and build a secure computer infrastructure, and recommend processes and policies that will enhance the safety of your network. Progent's security professionals are ready to help you to configure a firewall, design protected remote connectivity to email and data, and install an effective virtual private network (VPN). If you are looking for an affordable way for outsourcing your security management, Progent's 24x7 Network Support Options feature automated online server tracking and immediate response to emergencies.
  • Data Restoration and Security Forensics
    Progent offers skill in recovering systems and servers that have been compromised, are in question, or have failed as a result of a security attack. Progent can help assess the losses resulting from the attack, return your company to normal business operations, and recover data compromised as a result of the breach. Progent's security engineers can also oversee a comprehensive failure evaluation by examining activity logs and using other advanced assessment tools. Progent's experience with security issues reduces your business disruption and allows Progent to suggest effective ways to prevent or mitigate future assaults.
  • Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Series Firewalls, and PIX 500 Firewalls Integration and Troubleshooting
    Cisco Certified CCIE Network Security ExpertsThe latest generation of Cisco ASA 5500-X Series Next-Generation Firewalls with Firepower Services offer significantly more value than Cisco's earlier firewalls and have superseded the ASA 5500 and PIX security appliances for new installations. Following Cisco's purchase of Sourcefire, the whole line of ASA 5500-X firewalls can be provisioned to support Firepower Services, based on Sourcefire's Snort technology, which is the world's most popular intrusion protection system (IPS). Firepower services bring powerful new features such as advanced malware protection (AMP), URL filtering, real-time threat analytics, and security automation. Progent's Cisco-certified CCIE network consultants can assist you to maintain your existing PIX or Cisco ASA 5500 firewalls or upgrade efficiently to ASA 5500-X firewalls with Firepower Services. Progent's consultants offer remote and onsite help with ASA 5500-X firewalls with Firepower Services and can help you to design, deploy, optimize, administer and troubleshoot firewall solutions built around Cisco ASA 5500-X firewalls with Firepower Services. Read additional details about ASA 5500-X Firewalls with Firepower configuration and debugging support.
  • Other Firewall and VPN Consulting Services
    In addition to supporting a wide range of protection technologies from Microsoft and Cisco, Progent offers small companies expert support for products from other important firewall and Virtual Private Network (VPN) suppliers such as:
  • SIEM Solutions
    Security information and event management (SIEM) applications and services are intended to make sense the massive amounts of information collected in security event logs created by a wide range of sources such as network appliances, servers, and applications and monitoring tools. SIEM software analyzes the security event records from these various sources and produces summary reports of security events as required by government regulations and industry compliance guidelines. Progent's GIAC-certified information assurance consultants and Cisco CCIE certified network consultants can assist organizations to plan, deploy and manage a SIEM solution that enables them to see the progress of security incidents and comply with event reporting regulations. (See Progent's Security information and Event Management solutions.)
Progent's Security Accreditations
Progent's security professionals have been awarded some of the most prestigious certifications available in the industry. All of these accreditations require exhaustive examinations and proven work experience to guarantee that candidates have acquired expertise with a significant body of security information and techniques and can offer advanced solutions to computer networks of any size.
  • Certified Information Security Manager (CISM) Security Support Expertise
    Certified Information Security Manager (CISM) identifies the core competencies and worldwide benchmarks of service that IT security managers are required to master. It provides executive management the confidence that consultants who have earned their CISM have the background and skill to provide efficient security administration and engineering support. Progent can offer a CISM support professional to assist your enterprise in vital security disciplines including data security governance, vulnerability management, information protection process control, and incident handling support. Find out the details about Progent's Certified Information Security Manager (CISM) Security Support Assistance.

  • CISSP Security Consulting Expertise
    Progent's CISSP consultants are security engineers who have been awarded CISSP accreditation as a result of demonstrated experience, rigorous study, and formal examination. CISSP qualification indicates expertise in an international standard for IT security. ANSI has given the CISSP status accreditation in the field of information security under ISO/IEC 17024. Fields of expertise included under CISSP include security management practices, security architecture and models, access control systems, applications development security, business processes security, physical security, cryptography, communications, Internet security, and business continuity planning. Get the details concerning Progent's Certified Information Systems Security Professionals (CISSP) Consulting Services.

  • Information Systems Security Architecture Professionals (ISSAP) Consulting Support
    Progent's ISSAP qualified security consultants are experts who have been awarded ISSAP status after thorough testing and significant hands-on work with network security architecture. ISSAP consultants have acquired in-depth knowledge of access management mechanisms and techniques, telecommunications and network infrastructure protection, cryptography, requirements analysis, business continuity and disaster recovery planning (DRP), and physical security. Progent's ISSAP-certified security consultants can assist your business with all phases of secure network architecture. Learn additional details about Progent's ISSAP Certified Secure Network Architecture Consulting Services.

  • Certified Information Systems Auditor Professional Services
    The Certified Information Systems Auditor credential is a globally recognized achievement that indicates expertise in information system security auditing. Certified by the American National Standards Institute, the CISA accreditation has consultants pass an exhaustive examination given by the ISACA international professional association. Progent can provide the services of a CISA-certified security consultant trained to assist businesses in the areas of IS audit services, information technology enforcement, systems and architecture planned useful life, information technology service delivery, protecting information resources, and disaster recovery preparedness. Learn additional details concerning Progent's Certified Information Systems Auditor (CISA) Professional Expertise.

  • Global Information Assurance Certification Professional Services
    GIAC (Global Information Assurance Certification) was founded in 1999 to certify the skill of network security experts. GIAC's mission is to ensure that a certified security consultant has the knowledge necessary to provide services in vital areas of system, information, and software security. GIAC accreditations are acknowledged by companies and institutions throughout the world including and the U.S. NSA. Progent offers the expertise of certified security engineers for any of the security services addressed under GIAC accreditation programs including assessing perimeters, security incident handling, intrusion detection, and web-based application security. Learn more details about Progent's Global Information Assurance Certification Consulting Expertise.
Contact Progent for Network Security Help
If you're trying to find security consulting expertise, telephone Progent at 800-993-9400 or see Contact Progent.
















© 2002- 2018 Progent Corporation. All rights reserved.