Overview of Progent's Security Consulting Services
Progent's industry certified computer security consultants can provide a wide range of professional services intended to help organizations of any size to detect and correct security vulnerabilities, block attacks, recover from the damage caused by a breach of security, and comply with regulatory requirements for reporting security incidents. Progent can provide online and on-site support and also offers highly affordable fixed-cost security assessment bundles to supplement Progent's regular by-the-minute pricing.

Service delivery alternatives available from Progent are:

  • Remote Security Services
    The majority of security problems can be resolved remotely via a mix of telephone support and remote Internet connections between Progent's Technical Response Center (TRC) and the client's network. Progent's Technical Response support team includes security professionals with the experience and technical resources to fix even the most challenging problems promptly, making your support costs affordable and reducing lost productivity. Progent provides security support services on a by-the-minute basis with no minimum charges for online consulting support. Progent's billing model eliminates situations where simple solutions result in big expenses. Progent also offers a number of fixed-price remote security and compliance assessment packages that provide extraordinary value by leveraging Progent's advanced system scanning software plus Progent's engineering expertise to produce an objective and thorough analysis of your information system vulnerability.

  • Onsite Security Options
    In circumstances where on-site support is required, Progent can dispatch a service technician to larger cities across the United States Progent's security engineers are in addition available to help with jobs that require world-class security experts to be on site anywhere in the U.S., and Progent's most comprehensive security evaluation bundles for large businesses include the participation of several qualified security engineers at your location.

  • Urgent Security Support Services
    For fast help with computer security problems, your company can have access to a seasoned online troubleshooting specialist from Progent's roster of certified security professionals at Progent's TRC. Progent's urgent online security support staff is available to provide fast and low-cost help with security emergencies that threaten the productivity of your network. Progent's security engineers are qualified to provide help for environments based on Microsoft, Linux, Macintosh, Solaris, and popular versions of UNIX. Progent's wide array of consulting services encompasses firewall expertise, email security, protected network architecture, and information recovery. Progent's technical support team has been awarded the world's top security accreditations including CISM and Information System Security Architecture Professional. Progent also can provide fast access to online Cisco CCIE network consultants who can provide advanced support with tough network integration problems.

Our Network Has Been Hacked: What Should We Do Now?
Network Security ConsultantsIf your business is now experiencing a network security crisis and you have not prepared a detailed recovery plan, refer to Progent's Online Technical Support to see how to get immediate assistance. Progent provides online technical support from skilled engineers and can escalate trouble tickets to certified security experts if necessary. Your company does not have to be a current Progent customer to receive urgent support for a security problem, but you can sign up as a Progent client in advance for free and your standing as a current customer can save precious time in an emergency.

Typically, smaller organizations do not have a recovery plan in case of a damaging security breach. This is risky, because the damage from a serious security assault can be more devastating for a small business than for a large corporation. Progent's security specialists can help your company to design an effective response and incident reporting procedure that reduces the IT system disruption resulting from a security breach. The step-by-step post-attack response model promoted by GIAC is Progent's suggested method for reacting to a serious security penetration.

Areas of Progent's Security Services
Coordinating data protection and staying ready for restoring critical information and systems after an attack requires an on-going program that entails a variety of technologies and processes. Progent's certified security professionals can support your business at any level in your efforts to guard your IT system and stay in compliance, Services range from security assessments to creating a complete security strategy. Some areas covered by Progent's experts include Security Planning and Prevention, Information Restoration and Security Failure Analysis, plus Managed Protection from E-mail-Borne Threats.

  • Designing, Building, and Validating Protected Networks
    Every organization ought to have a thoroughly considered security plan that incorporates both preventive and responsive elements. The proactive plan is a set of precautions that works to minimize security holes. The post-attack plan specifies procedures to help IT staff to evaluate the losses caused by a breach, remediate the damage, document the experience, and restore business activity as soon as possible. Progent can advise you how to incorporate security into your business operations, configure auditing software, define and implement a secure computer architecture, and recommend procedures and policies that will optimize the safety of your computing environment. Progent's security experts are ready to help you to configure a firewall, design protected offsite connectivity to e-mail and data, and install an effective virtual private network. If you are looking for an economical way for outsourcing your security administration, Progent's 24x7 Monitoring Services feature continual remote server tracking and fast resolution of emergencies.
  • System Restoration and Security Forensics
    Progent has skill in recovering networks and devices that have been hacked, are suspect, or have ceased to function as a result of a security attack. Progent can help assess the damage caused by the breach, return your company to ordinary functions, and retrieve data lost owing to the attack. Progent's security specialists can also manage a comprehensive forensic evaluation by examining activity logs and utilizing other proven assessment tools. Progent's background with security issues reduces your business disruption and allows Progent to recommend efficient ways to prevent or mitigate future assaults.
  • Email Security with Spam Filtering, Virus Defense, Content Filtering, and Data Leakage Protection
    Email Guard is Progent's email filtering and encryption solution that incorporates the technology of top information security vendors to deliver web-based control and comprehensive protection for all your email traffic. The hybrid architecture of Email Guard integrates a Cloud Protection Layer with a local gateway appliance to provide complete defense against spam, viruses, Denial of Service (DoS) Attacks, DHAs, and other email-based threats. Email Guard's cloud filter acts as a first line of defense and keeps most unwanted email from making it to your security perimeter. This decreases your exposure to external attacks and saves system bandwidth and storage. Email Guard's onsite gateway device adds a deeper layer of inspection for incoming email. For outbound email, the local gateway provides AV and anti-spam filtering, protection against data leaks, and email encryption. The on-premises security gateway can also help Exchange Server to monitor and protect internal email that originates and ends within your corporate firewall. Find out more about Progent's Email Guard Spam Filtering, Virus Blocking, Content Filtering and Data Leakage Protection.
High-value Security Services Offered by Progent
Progent's security engineers offer advanced support in key areas of IT security including:
  • Information Risk Evaluation and Compliance Assessment
    Progent provides experience with information risk auditing utilities like MS Baseline Security Analyzer or LANguard for performing a set of automatic system scans to uncover possible security problems. Progent has broad experience with these utilities and can help you to analyze assessment reports and react efficiently. Progent's certified security engineers also provide web software testing and can perform thorough assessments of enterprise-wide security to confirm your company's compliance with major worldwide security standards including HIPAA, NIST, and ISO 17799. In addition, Progent can evaluate the effectiveness of your wireless protection covering stationary wireless equipment plus portable devices. Get additional information about Progent's Security Vulnerability Audits and Security Compliance Testing.
  • Security Inventory Service Bundles for Small Companies
    Progent offers two low-cost security inventory and evaluation packages designed to allow small companies to get an independent security assessment from a qualified security engineer. With Progent's External Network Security Inventory Scan, an engineer administers an extensive test of your IT infrastructure from beyond your firewall to uncover possible risks in the security profile you expose to the outside world. With Progent's Internal Security Inventory Checkup, a security engineer runs a network scan from a secure computer inside your firewall to uncover vulnerabilities to inside threats. Both security inventory packages are set up and run from a secured remote site. The project is implemented by a consultant with high-level security credentials who generates a document that summarizes and analyzes the information collected by the scan and proposes practical remediation where call for.
  • Security Assessment Packages for Large Companies
    Progent's qualified security consultants can provide a selection of set-price network security evaluation bundles created for corporations who have to meet security levels required by state agencies or by vendors. Progent's security evaluation bundles offer larger organizations a chance to receive an impartial look at the strength of their protection profile. For each security assessment bundle, Progent consultants with high-level security accreditations analyze and summarize collected information and make suggestions for efficient remediation. The different security assessment bundles feature an added-cost alternative for onsite engineers United States.
  • Migrating from Microsoft ISA Server 2006 and Microsoft Forefront TMG
    Microsoft ISA Server 2006 and its replacement Microsoft Forefront TMG are software platforms that include an application-layer firewall that can defend networks from outside and internal threats. Both of these products perform deep inspection of network protocols to detect attacks that can elude legacy firewalls. Microsoft Internet Security and Acceleration Server was superseded by Forefront Threat Management Gateway, which is based on ISA Server's technology while providing a number of improved capabilities. Forefront TMG has been retired by Microsoft, and the gateway security functions offered by the product are now typically taken over by dedicated physical appliances from vendors that include Cisco, Check Point, SonicWALL and WatchGuard. (See ASA 5500-X Firewall with Firepower Services integration and support.) Progent offers online Forefront TMG support services and ISA Server 2006 consulting services to help you manage and troubleshoot your older firewalls, and Progent can help your organization to migrate efficiently to a more current security solution by providing planning, configuration, optimization, training and debugging.
  • Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Series Firewalls, and PIX 500 Security Appliances Integration and Debugging
    Cisco Certified CCIE Security SpecialistsThe current Cisco ASA 5500-X Family Next-Generation Firewalls with Firepower Services provide significantly more bang for the buck than Cisco's legacy firewalls and have replaced the ASA 5500 and PIX 500 security appliances for all new deployments. Since Cisco's purchase of Sourcefire, the entire family of Cisco ASA 5500-X firewalls can be configured to support Firepower Services, based on Sourcefire's Snort product, which is the market's most deployed network intrusion protection system (IPS). Firepower services bring powerful new features including advanced malware protection (AMP), URL filtering, real-time threat analytics, and automation. Progent's Cisco-qualified CCIE network consultants can assist your company to maintain your existing PIX or Cisco ASA 5500 security appliances or migrate to ASA 5500-X firewalls with Firepower Services. Progent's consultants can provide remote and onsite support for ASA 5500-X firewalls with Firepower Services and can help your business to plan, integrate, tune, manage and debug firewall environments based on Cisco ASA 5500-X firewalls with Firepower Services. Read additional information about Cisco ASA Firewalls with Firepower configuration and troubleshooting services.
  • Additional Firewall and Virtual Private Network Consulting Services
    In addition to supporting a wide array of network security technologies available from Microsoft and Cisco, Progent offers small companies top-level consulting for technologies from other popular firewall and Virtual Private Network (VPN) suppliers including:
  • SIEM Security Information and Event Management Solutions
    Security information and event management (SIEM) software and services are designed to make sense the enormous amounts of information collected in security event records created by a wide range of sources such as network infrastructure appliances, operating systems, and applications and tools. SIEM applications analyzes the security logs from these various sources and produces summary reports of security events as mandated by government regulations and industry compliance standards. Progent's GIAC-certified information assurance experts and Cisco-certified network infrastructure experts can help businesses to plan, deploy and manage a SIEM solution that enables them to understand the progress of attacks and comply with event reporting requirements. (See Progent's Security information and Event Management solutions.)
Progent's Security Certifications
Progent's security engineers have earned some of the most respected accreditations available in the security industry. All of these accreditations require extensive testing and proven work experience to guarantee that candidates have mastered a substantial amount of security knowledge and techniques and can offer high-level consulting to information networks of any size.
  • CISM Security Consulting Services
    CISM identifies the basic competencies and worldwide benchmarks of service that information security managers are required to master. CISM offers executive management the assurance that consultants who have earned their accreditation possess the experience and knowledge to offer efficient security administration and consulting services. Progent can offer a CISM support professional to help your enterprise in critical security areas including data security governance, risk assessment, information security process control, and incident response management. Learn the details concerning Progent's Certified Information Security Manager (CISM) Security Support Services.
  • Certified Information Systems Security Professionals (CISSP) Security Support Expertise
    Progent's CISSP experts are security engineers who have earned CISSP certification as a result of demonstrated experience, rigorous study, and exhaustive testing. CISSP qualification recognizes expertise in an international standard for IT security. American National Standards Institute has given the CISSP status accreditation in the area of IT security under ISO/IEC 17024. Fields of expertise covered under CISSP include security management practices, security architecture and models, connection control systems, software development security, operations security, physical security, encryption, telecommunications, network security, and disaster recovery planning. Find out more details about Progent's Certified Information Systems Security Professionals (CISSP) Consulting Services.
  • Information Systems Security Architecture Professionals (ISSAP) Consulting Support
    Progent's ISSAP certified security consultants are consultants who have earned ISSAP certification after rigorous testing and substantial experience. field experience with network security design. ISSAP security experts possess in-depth knowledge of access control systems and methodologies, telecommunications and network protection, cryptography, needs evaluation, business continuity planning (BCP) and disaster recovery planning (DRP), and physical security integration. Progent's ISSAP-certified security consultants can help your business with all phases of secure network architecture. Read additional details concerning Progent's ISSAP Certified Protected IT Architecture Engineering Assistance.
  • Certified Information Systems Auditor Professional Services
    The CISA credential is an important qualification that indicates expertise in information system security audit and control. Certified by ANSI, the CISA credential has candidates undergo an extensive test given by the ISACA professional group. Progent can provide the expertise of a CISA-qualified security audit engineer trained to help businesses in the areas of information systems audit process, IT governance, systems and architecture planned useful life, information technology support, safeguarding data resources, and disaster recovery preparedness. Get additional details concerning Progent's CISA Professional Assistance.
  • Global Information Assurance Certification Professional Expertise
    Global Information Assurance Certification was established in 1999 to validate the skill of computer security experts. GIAC's goal is to make sure that a certified professional has the knowledge needed to deliver support in important categories of network, data, and application program security. GIAC certifications are recognized by businesses and institutions all over the world including and the U.S. National Security Agency. Progent can provide the help of certified professionals for any of the security disciplines addressed under GIAC certification programs such as assessing security systems, incident response, intrusion detection, and web-based application security. Find out the details concerning Progent's GIAC (Global Information Assurance Certification) Support Assistance.
Depend on Progent for Network Security Support
If you're trying to find security consulting expertise, telephone Progent at 800-993-9400 or go to Contact Progent.

© 2002- 2017 Progent Corporation. All rights reserved.