Overview of Progent's Security Support Services
Progent's certified network security and compliance consultants offer a wide range of services designed to assist organizations of any size to detect and eliminate security vulnerabilities, defend against assaults, remediate the damage resulting from a breach of protection, and comply with government requirements for protecting data and reporting security incidents. Progent can provide a selection of service delivery modes:

  • On-demand online and on-site assistance billed to the nearest minute
  • Continual fully managed services billed at a low flat monthly rate
  • Set-price service bundles for a one-time security assessment
As-needed Security and Compliance Consulting Services
Once you sign up for Progent's services (registration is free), you can receive as-needed online or onsite support from one of Progent security and compliance consultant. This classic support model is essentially reactive and optimized for rapidly taking care of IT problems that are impacting your productivity or that are beyond the scope of your own support staff. Common scenarios include debugging a firewall appliance or VPN connection, implementing a critical security update for a Cisco switch or router, setting up compliant access to a public cloud, or restoring data after a ransomware attack. These security services are billed by the minute, which avoids the frustrating situation of receiving big invoices for fast repairs.

Delivery alternatives for Progent's as-needed support services include:

  • Remote Security Support Services
    Most security issues can be resolved remotely through a mix of phone support and an Internet connection between Progent's Technical Response Center (TRC) and a customer's computer. Progent's TRC group can provide online security help by offering efficient access to consultants with the background and technical resources to resolve many of the most challenging problems quickly, keeping your support costs low and reducing lost productivity.
  • On-premises Security Services
    For instances where on-premises assistance is necessary, Progent can send a technical expert to major metropolitan areas across the U.S. Progent can also send a security consultant with top certifications and world-class skills to any location in the country.
Progent's accredited consultants are certified to support systems based on Microsoft, Linux, Apple Mac, Solaris, and popular derivatives of UNIX. Progent's broad range of services encompasses firewall configuration, e-mail security, secure network architecture, and information restoration. Progent's technical support staff has earned the industry's most advanced security accreditations including GIAC (Global Information Assurance Certification) and Information System Security Architecture Professional. Progent also offers fast access to remote Cisco CCIE network consultants who can provide world-class support with tough network technology issues.

ProSight Low-Cost Managed Services for Information Assurance
Progent's low-cost ProSight series of network monitoring and management services is intended to provide small and mid-size businesses with enterprise-class support and state-of-the-art technology for all aspects of information assurance. Managed services available from Progent include:

  • ProSight Active Security Monitoring (ASM): Endpoint Protection and Ransomware Recovery
    Progent's ProSight Active Security Monitoring is an endpoint protection (EPP) service that utilizes cutting edge behavior analysis tools to guard endpoints as well as physical and virtual servers against new malware assaults such as ransomware and file-less exploits, which easily get by traditional signature-based anti-virus tools. ProSight ASM protects on-premises and cloud resources and provides a single platform to address the complete malware attack progression including blocking, detection, mitigation, cleanup, and forensics. Key features include one-click rollback with Windows Volume Shadow Copy Service and automatic system-wide immunization against newly discovered threats. Learn more about Progent's ProSight Active Security Monitoring next-generation endpoint protection and ransomware recovery.

  • ProSight Enhanced Security Protection: Unified Endpoint Protection
    ProSight Enhanced Security Protection (ESP) managed services deliver economical multi-layer security for physical and virtual servers, workstations, mobile devices, and Microsoft Exchange. ProSight ESP uses adaptive security and advanced machine learning for round-the-clock monitoring and reacting to cyber assaults from all vectors. ProSight ESP provides firewall protection, penetration alarms, endpoint control, and web filtering via cutting-edge tools incorporated within a single agent managed from a single control. Progent's data protection and virtualization consultants can assist your business to design and implement a ProSight ESP environment that meets your organization's unique requirements and that allows you prove compliance with legal and industry data security regulations. Progent will assist you define and configure security policies that ProSight ESP will enforce, and Progent will monitor your IT environment and react to alarms that require immediate action. Progent can also assist your company to install and verify a backup and restore system such as ProSight Data Protection Services (DPS) so you can get back in business rapidly from a potentially disastrous cyber attack like ransomware. Learn more about Progent's ProSight Enhanced Security Protection unified physical and virtual endpoint protection and Microsoft Exchange email filtering.

  • ProSight DPS: Managed Backup and Recovery
    ProSight Data Protection Services from Progent offer small and mid-sized organizations an affordable end-to-end solution for secure backup/disaster recovery (BDR). Available at a fixed monthly rate, ProSight Data Protection Services automates your backup processes and allows rapid restoration of vital data, apps and VMs that have become unavailable or corrupted due to hardware breakdowns, software bugs, natural disasters, human mistakes, or malicious attacks like ransomware. ProSight Data Protection Services can help you back up, retrieve and restore files, folders, applications, system images, as well as Microsoft Hyper-V and VMware virtual machine images. Critical data can be backed up on the cloud, to a local device, or to both. Progent's BDR consultants can provide world-class support to configure ProSight Data Protection Services to to comply with government and industry regulatory standards such as HIPPA, FIRPA, PCI and Safe Harbor and, when necessary, can help you to restore your business-critical information. Read more about ProSight DPS Managed Cloud Backup and Recovery.

  • ProSight Email Guard: Spam Filtering, Data Leakage Protection and Email Encryption
    ProSight Email Guard is Progent's email filtering and encryption platform that incorporates the technology of leading data security companies to deliver centralized management and comprehensive security for all your inbound and outbound email. The powerful structure of Email Guard combines a Cloud Protection Layer with a local security gateway device to provide advanced defense against spam, viruses, Dos Attacks, Directory Harvest Attacks (DHAs), and other email-based malware. Email Guard's cloud filter serves as a preliminary barricade and keeps most threats from making it to your security perimeter. This decreases your vulnerability to external threats and saves system bandwidth and storage. Email Guard's onsite security gateway appliance provides a deeper level of inspection for inbound email. For outbound email, the onsite security gateway offers AV and anti-spam filtering, protection against data leaks, and email encryption. The onsite security gateway can also assist Exchange Server to monitor and protect internal email that stays inside your corporate firewall. Learn more about Progent's ProSight Email Guard spam filtering, virus defense, email content filtering and data leakage protection.

  • ProSight WAN Watch: Infrastructure Remote Monitoring and Management
    ProSight WAN Watch is a network infrastructure management service that makes it easy and inexpensive for small and mid-sized organizations to diagram, track, enhance and troubleshoot their networking appliances such as routers and switches, firewalls, and wireless controllers plus servers, endpoints and other devices. Using cutting-edge Remote Monitoring and Management (RMM) technology, ProSight WAN Watch makes sure that infrastructure topology diagrams are always updated, captures and displays the configuration information of virtually all devices on your network, tracks performance, and generates notices when problems are discovered. By automating tedious management processes, WAN Watch can cut hours off common chores such as making network diagrams, expanding your network, finding appliances that need important updates, or resolving performance problems. Find out more details about ProSight WAN Watch network infrastructure monitoring and management consulting.

  • ProSight LAN Watch: Server and Desktop Remote Monitoring
    ProSight LAN Watch is Progentís server and desktop remote monitoring managed service that incorporates state-of-the-art remote monitoring and management (RMM) technology to help keep your network operating efficiently by checking the health of critical assets that drive your information system. When ProSight LAN Watch uncovers a problem, an alarm is transmitted automatically to your designated IT personnel and your assigned Progent consultant so all potential issues can be addressed before they have a chance to disrupt your network Learn more details about ProSight LAN Watch server and desktop monitoring services.

  • ProSight Virtual Hosting: Hosted Virtual Machines at Progent's Tier III Data Center
    With ProSight Virtual Hosting service, a small or mid-size organization can have its key servers and applications hosted in a protected Tier III data center on a high-performance virtual host configured and managed by Progent's IT support experts. With the ProSight Virtual Hosting service model, the customer retains ownership of the data, the operating system software, and the apps. Since the system is virtualized, it can be moved immediately to a different hardware environment without requiring a time-consuming and technically risky reinstallation procedure. With ProSight Virtual Hosting, you are not locked into one hosting provider. Find out more about ProSight Virtual Hosting services.

  • ProSight IT Asset Management: Network Documentation Management
    ProSight IT Asset Management service is an IT infrastructure documentation management service that allows you to create, update, retrieve and protect information related to your network infrastructure, processes, applications, and services. You can instantly locate passwords or IP addresses and be warned automatically about impending expirations of SSLs or warranties. By updating and organizing your IT documentation, you can eliminate as much as half of time thrown away searching for vital information about your network. ProSight IT Asset Management features a centralized repository for holding and sharing all documents required for managing your network infrastructure like standard operating procedures (SOPs) and How-To's. ProSight IT Asset Management also supports a high level of automation for collecting and relating IT information. Whether youíre making improvements, performing regular maintenance, or responding to a crisis, ProSight IT Asset Management delivers the data you require as soon as you need it. Learn more details about ProSight IT Asset Management service.
ProSight Network Audits
Progent's ProSight Network Audits offer a fast and low-cost alternative for small and medium-size organizations to obtain an objective assessment of the overall health of their IT system. Powered by some of the top remote monitoring and management platforms in the industry, and supervised by Progent's certified group of information technology experts, ProSight Network Audits show you how well the deployment of your core network assets adhere to industry leading practices. Both the Basic and Advanced options for ProSight Network Audit services are available at a budget-friendly, one-time cost and deliver immediate benefits such as a more manageable Active Directory (AD) environment. Both versions also come with one year of advanced remote network monitoring and management (RMM). Benefits can include easier network management, improved compliance with information security standards, higher utilization of network resources, quicker troubleshooting, more dependable backup and restore, and higher availability. Learn more information about ProSight Network Audits network infrastructure review.

The ProSight Ransomware Preparedness Report
Progent's ProSight Ransomware Preparedness Report service is an affordable service based on a brief interview with a Progent information assurance expert. The interview is intended to help evaluate your company's preparedness either to stop or recover rapidly from a ransomware incident. Progent will consult with you personally to gather information about your current security profile and backup system, and Progent will then deliver a written Basic Security and Best Practices Report detailing how you can apply best practices to create a cost-effective AV and backup/recovery system that aligns with your business requirements. For additional information, visit The ProSight Ransomware Preparedness Report Service.

Fixed-price Security Assessment and Validation Bundles
Progent offers a portfolio of flat-rate security evaluation bundles that provide exceptional value by deploying Progent's enterprise-class network monitoring and analysis software as well as Progent's consulting skills to create an unbiased and comprehensive assessment of your IT environment security posture.

  • Security Assessment Service Packages for Small Businesses
    Progent offers two value-priced security inventory service packages designed to enable small organizations to obtain a professional security assessment from an accredited security engineer. With Progent's External Security Inventory Scan, a consultant manages an extensive examination of your IT system from beyond your firewalled perimeter to identify potential risks in the security posture you expose to the outside world. With Progent's Internal Security Inventory Scan, a security expert runs a network scan using an authorized machine within your corporate firewall to evaluate your vulnerability to internal assaults. The two security inventory scanning services are set up and run from a secured offsite location. The scan is managed by a consultant who has earned advanced security certifications and who produces a report that details and interprets the data captured by the scan and recommend practical improvements where required.
  • Security Vulnerability Evaluation Bundles for Enterprises
    Progent offers three levels of set-price security assessment service packages designed for large organizations who need to meet compliance standards required by state or industry agencies. Progent's security assessment service packages offer enterprises an opportunity to obtain an objective look at the viability of their security posture. For each security evaluation bundle, Progent consultants with top security credentials study and report on captured data and offer recommendations for cost-effective remediation. Each of the network security assessment packages include an added-cost option for on-premises consultants anywhere in the U.S.
  • Stealth Penetration Testing
    Stealth penetration testing, often known as PEN testing, is an accepted tool for allowing organizations to find out how vulnerable their IT environments are to modern threats. Progent's stealth penetration testing services check how effectively your existing security procedures and technologies stand up to authorized but unannounced intrusion attempts launched by Progent's certified security specialists utilizing cutting-edge hacking techniques. Find out about Progent's stealth penetration testing services.
Our Network Has Been Hacked: What Are We Supposed to Do Now?
Network Security ConsultantsIf your company is currently faced with a security crisis and you have no detailed recovery procedure, visit Progent's Remote Computer Support to find out how to receive immediate help. Progent provides remote help from experienced network technicians and can refer trouble tickets to high-level security experts if necessary. Your company does not have to be a current Progent client to receive urgent support for a security problem, but you can sign up as a Progent customer ahead of time for free and your status as a current customer could save valuable time in case of a crisis.

Typically, smaller businesses do not have a response procedure in the event of a damaging security breach. This is not good, because the cost of a serious security attack can be even more catastrophic for a small business than for a big enterprise. Progent's security engineers can help your you to create an effective recovery and incident reporting procedure that minimizes the network disruption following a security breach. The formal post-attack response model promoted by Global Information Assurance Certification is Progent's preferred procedure for handling a serious security penetration.

High-value Security Services Available from Progent
Progent's certified security consultants can provide world-class consulting in key facets of network compliance including:

  • Security Vulnerability Audits and Security Compliance Testing
    Progent offers expertise with security auditing software like MS Baseline Security Analyzer or LANguard from GFI for conducting a variety of automatic network scans to uncover possible security problems. Progent has broad experience with these tools and can assist your company to understand audit results and react appropriately. Progent's certified security engineers also can perform web application testing and can perform expert evaluation of enterprise-wide security to verify your organization's compliance with major worldwide security standards including FISMA, NIST, and ISO 17799. Also, Progent can evaluate the effectiveness of your wireless security covering stationary wireless appliances as well as mobile devices. Learn the details concerning Progent's Information Risk Audits and Security Compliance Assessment.
  • Designing, Building, and Validating Protected Networks
    Every organization should have a thoroughly thought out security strategy that includes both proactive and reactive elements. The pre-attack strategy is a set of steps that helps to minimize vulnerabilities. The post-attack strategy specifies activities to help IT personnel to evaluate the losses resulting from a breach, repair the damage, document the event, and restore network functions as quickly as feasible. Progent can show you how to incorporate security into your company processes, set up scanning utilities, define and execute a safe network infrastructure, and recommend processes and policies that will enhance the protection of your computing environment. Progent's security experts are ready to help you to set up a firewall, design secure remote connectivity to email and data, and configure an efficient VPN. If you are looking for an economical option for outsourcing your security administration, Progent's Round-the-clock Network Support Options include continual online system tracking and fast response to emergencies.
  • System Recovery and Security Forensics
    Progent provides expertise in recovering systems and computers that have been compromised, are suspect, or have failed because of a security breakdown. Progent can show you how to determine the losses caused by the breach, restore ordinary business operations, and recover data compromised as a result of the attack. Progent's security specialists can also perform a thorough failure analysis by going over event logs and utilizing other proven forensics techniques. Progent's background with security issues minimizes your downtime and allows Progent to suggest efficient ways to avoid or contain future attacks.
  • Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Firewalls, and PIX Firewalls Configuration and Troubleshooting
    Cisco CCIE Security SpecialistsThe current Cisco ASA 5500-X Series of firewalls with Firepower Services provide significantly more bang for the buck than Cisco's legacy PIX and ASA 5500 firewalls and have superseded the ASA 5500 and PIX firewalls for new deployments. Since Cisco's acquisition of Sourcefire, the entire family of Cisco ASA 5500-X devices can be configured to enable Firepower Services, built on Sourcefire's Snort technology, which is the market's most deployed intrusion protection system. Firepower services bring powerful new features including advanced malware protection (AMP), URL filtering, dynamic threat analytics, and automation. Progent's Cisco-certified CCIE network consultants can help your company to manage your legacy PIX or Cisco ASA 5500 firewalls and upgrade to ASA 5500-X firewalls with Firepower Services. Progent's consultants offer remote and on-premises help with ASA 5500-X firewalls with Firepower Services and can help your business to plan, configure, optimize, administer and debug firewall environments based around Cisco ASA 5500-X firewalls with Firepower Services. See additional details about Cisco ASA Firewalls with Firepower integration and troubleshooting services.
  • Additional Firewall and Virtual Private Network (VPN) Technologies
    As well as supporting a wide array of protection solutions available from Microsoft and Cisco, Progent can provide small and mid-size companies top-level engineering services for solutions from other major firewall and VPN suppliers such as:
  • SIEM Solutions
    Security information and event management (SIEM) software and services are intended to make sense the enormous quantity of information collected in security event logs created by a wide range of sources such as network appliances, operating systems, and application software and tools. SIEM applications organizes the security logs from these various sources and creates consolidated reports of security incidents as mandated by state regulations and business compliance standards. Progent's GIAC-certified computer security experts and Cisco-certified network infrastructure experts can help businesses to plan, install and manage a SIEM solution that enables them to see the progress of attacks and comply with event reporting requirements. (Visit Progent's Security information and Event Management (SIEM) solutions.)
Progent's Security Credentials
Progent's security consultants have earned the most respected accreditations offered in the security industry. These certifications require exhaustive examinations and demonstrated work experience to guarantee that recipients have acquired expertise with a substantial body of security information and methodologies and can offer advanced solutions to computer environments of any complexity.
  • Certified Information Security Manager (CISM) Security Support Expertise
    Certified Information Security Manager identifies the core skills and worldwide benchmarks of service that information technology security professionals are expected to achieve. CISM offers executive management the assurance that consultants who have been awarded their CISM have the experience and skill to provide efficient security management and consulting support. Progent can offer a CISM support professional to assist your organization in vital security disciplines including data security governance, risk assessment, data protection program management, and incident handling management. Learn more details about Progent's Certified Information Security Manager Security Support Services.

  • Certified Information Systems Security Professionals (CISSP) Security Consulting Expertise
    Progent's CISSP consultants are security specialists who have been awarded CISSP status through verified experience, rigorous study, and exhaustive testing. CISSP qualification recognizes expertise in a worldwide standard for IT security. ANSI has given the CISSP status official recognition in the area of information security under ISO/IEC 17024. Areas of knowledge included within CISSP include security administration procedures, security design and models, connection control systems, applications development security, operations security, physical security, cryptography, communications, network security, and business continuity planning. Learn more details about Progent's Certified Information Systems Security Professionals (CISSP) Consulting Assistance.

  • Information Systems Security Architecture Professionals (ISSAP) Consulting Services
    Progent's ISSAP qualified security consultants are experts who have been awarded ISSAP status after thorough testing and substantial hands-on work with information security architecture. ISSAP security experts have acquired in-depth understanding of access management systems and methodologies, phone system and network protection, cryptography, requirements analysis, business continuity and disaster recovery planning (DRP), and physical security. Progent's ISSAP-qualified security experts can help your company with all phases of architecture security. Get more information concerning Progent's ISSAP Certified Protected Network Architecture Consulting Support.

  • Certified Information Systems Auditor Consulting Expertise
    The Certified Information Systems Auditor (CISA) credential is a recognized qualification that represents expertise in IS security auditing. Certified by the American National Standards Institute, the CISA credential has candidates undergo an exhaustive test administered by the ISACA professional association. Progent can provide the services of a CISA-certified security audit engineer able to assist companies in the fields of information systems audit process, information technology governance, network assets and architecture lifecycle, information technology support, protecting data resources, and business continuity planning. Find out the details concerning Progent's Certified Information Systems Auditor (CISA) Professional Expertise.

  • GIAC Support Services
    GIAC was established in 1999 to validate the knowledge of computer security engineers. GIAC's mission is to assure that an accredited professional has the knowledge appropriate to deliver support in critical areas of system, data, and application program security. GIAC accreditations are recognized by companies and government organizations throughout the world including and the U.S. NSA. Progent offers the support of certified security engineers for all of the network security capabilities addressed within GIAC certification programs such as auditing security systems, security incident handling, intrusion detection, and web services security. Learn more information concerning Progent's GIAC Support Services.
Depend on Progent for Network Security Support
If you're trying to find computer security engineering help, phone Progent at 800-993-9400 or go to Contact Progent.
















© 2002- 2018 Progent Corporation. All rights reserved.