Overview of Progent's Security Consulting Services
Progent's industry certified computer security professionals can provide a broad range of support services intended to assist companies of any size to detect and correct security weaknesses, defend against attacks, and recover from any damage resulting from a breakdown of protection. Progent can provide online and in person service and also offers highly affordable set-price security assessment packages to supplement Progent's standard time-based billing.

Service delivery alternatives available from Progent are:

  • On-line Security Services
    Most security problems can be addressed remotely by a combination of phone-based support and remote Internet connections between Progent's Help Desk and the client's computer system. Progent's Technical Response service team includes network security engineers with the background and the tools to solve some of the most challenging problems promptly, keeping your support costs affordable and minimizing lost productivity. Progent provides standard remote security assistance on a per-minute basis with no minimum times and without extra fees for sign-up or after hours support. Progent's billing model eliminates scenarios where simple fixes turn into big bills. Progent also offers a number of set-price remote security and compliance assessment packages that represent exceptional value by leveraging Progent's sophisticated network monitoring technology as well as Progent's consulting experience to produce a professional and thorough picture of your information system security profile.

  • Onsite Security Services
    For circumstances in which in-person support is needed, Progent can send a field technician to major cities across the United States in about 24-hours to work in concert with one of Progent's online certified security consultants. This model is a cost effective solution for delivering both high-level consulting and hands-on technical support to resolve security problems like disaster recovery. Progent's security engineers are also available to help with jobs that require world-class security professionals to be on site, and Progent's most advanced security assessment bundles for large businesses feature the services of a team of certified security experts on site.

  • Emergency Security Services
    To get immediate help with critical computer security problems, your company can access professional support remotely by contacting Progent's the certified security engineers at Progent's Emergency Call Center. Progent's urgent remote security service staff is ready to offer efficient and low-cost assistance with security crises that are impacting the viability of your network. Progent's security engineers are qualified to provide help for environments powered by Microsoft Windows, Linux, Macintosh, Sun, and popular derivatives of UNIX. Progent's wide range of services encompasses firewall technology, email systems, secure system design, and information restoration. Progent's technical support staff has been awarded the world's most advanced security certifications including GIAC and ISSAP. Progent also can provide immediate access to online Cisco-certified CCIE network infrastructure engineers who can provide advanced support with tough network integration issues.

We've Been Hacked: What Can We Do Now?
Microsoft Exchange Server 2016 ConsultingIf your company is currently faced with a network security crisis and you have no detailed response procedure, refer to Progent's Remote Computer Help to find out how to receive fast assistance. Progent offers remote help from skilled network technicians and can refer problems to certified security specialists if required. Your business does not need to be a current Progent customer to receive emergency support for a security problem, but you can sign up as a Progent customer ahead of time at no cost and your status as a current customer could save precious time in a crisis.

In most cases, small companies have no recovery procedure in the event of a successful attack. This is unfortunate, since the damage from a serious security assault can be more catastrophic for a small company than for a big corporation. Progent's security engineers can assist your you to design an efficient recovery plan that minimizes the network downtime resulting from a security penetration. The formal incident response model outlined by GIAC (Global Information Assurance Certification) is Progent's suggested procedure for responding to a serious security penetration.

Areas of Progent's Security Expertise
Coordinating data security plus preparation for recovering vital data and systems following an attack requires a continual effort involving a variety of tools and procedures. Progent's certified engineers can help your organization at any level in your efforts to safeguard your IT network, ranging from security assessments to designing a comprehensive security plan. Key technologies covered by Progent's security consultants include Planning and Implementation, Information Recovery and Security Forensics, and Managed Filtering of E-mail-Borne Spam and Viruses.

  • Planning, Building, and Testing Protected Networks
    Every company should have a thoroughly thought out security strategy that incorporates both proactive and responsive elements. The proactive plan is a set of steps that helps to minimize vulnerabilities. The post-attack strategy defines activities to help security personnel to evaluate the damage caused by a breach, repair the damage, document the event, and revive network functions as soon as feasible. Progent can advise you how to incorporate protection into your business operations, configure scanning utilities, create and execute a safe network infrastructure, and recommend procedures and policies that will optimize the safety of your computing environment. Progent's security professionals are ready to help you to set up a firewall, design secure remote connectivity to e-mail and files, and install an effective virtual private network (VPN). If you are interested in an affordable option for jobbing out your network security administration, Progent's Round-the-clock Network Support Packages feature non-stop remote server tracking and quick resolution of emergencies.
  • System Restoration and Security Forensics
    Progent provides skill in restoring systems and servers that have been compromised, are suspect, or have failed because of a security breach. Progent can show you how to evaluate the losses resulting from the attack, restore normal business operations, and retrieve information compromised owing to the event. Progent's security specialists can also manage a thorough forensic evaluation by going over event logs and using other advanced assessment tools. Progent's experience with security issues minimizes your off-air time and allows Progent to recommend effective ways to prevent or mitigate future attacks.
  • Spam Protection and Email Encryption
    Email Guard is Progent's email filtering and encryption solution that uses the technology of leading data security vendors to provide web-based management and world-class security for your email traffic. The hybrid architecture of Progent's Email Guard managed service combines cloud-based filtering with a local gateway appliance to provide advanced defense against spam, viruses, Dos Attacks, DHAs, and other email-borne threats. Email Guard's Cloud Protection Layer acts as a preliminary barricade and blocks most threats from making it to your security perimeter. This reduces your vulnerability to external attacks and saves network bandwidth and storage. Email Guard's on-premises security gateway device provides a deeper level of analysis for incoming email. For outgoing email, the on-premises security gateway provides anti-virus and anti-spam protection, protection against data leaks, and encryption. The on-premises gateway can also help Exchange Server to track and safeguard internal email traffic that stays within your security perimeter.
High-value Security Services Available from Progent
Progent's security consultants offer world-class consulting in key areas of IT protection including:
  • Information Risk Audits and Compliance Assessment
    Progent offers expertise with information risk evaluation tools like Microsoft Baseline Security Analyzer and LANguard for performing a set of automatic system tests to uncover potential security gaps. Progent has broad skills with scanning tools and can help you to analyze assessment reports and react efficiently. Progent's security consultants also can perform web application testing and can conduct expert evaluation of corporate-wide security to confirm your organization's compliance with important worldwide security standards such as HIPAA, NIST, and ISO. Also, Progent can assess the strength of your wireless security including stationary wireless equipment as well as mobile handsets. Get more information about Progent's Information Risk Audits and Security Compliance Assessment.
  • Security Inventory Bundles for Small Businesses
    Progent offers two ultra-affordable security inventory and evaluation bundles designed to allow small companies to get an impartial security assessment from a certified security engineer. With Progent's External Network Security Inventory Checkup, a security engineer runs an extensive examination of your network from outside your firewall to uncover possible weaknesses in the security posture you expose to the outside world. With Progent's Internal Security Inventory Scan, a security engineer runs a network scan from a secure machine inside your firewall to uncover your exposure to internal attacks. The two security inventory services are set up and run from a secured external location. The process is implemented by an engineer with high-level security accreditations who produces a document that details and analyzes the information captured by the scan and suggests cost-effective remediation if call for.
  • Security Assessment Packages for Large Businesses
    Progent's qualified security engineers can provide a range of set-price network security audit service bundles designed for corporations who have to meet security levels demanded by government regulators or by vendors. Progent's network security assessment bundles give larger businesses a chance to get a professional opinion about the strength of their security profile. For every security assessment bundle, Progent engineers with high-level security credentials evaluate and summarize collected data and provide recommendations for efficient improvements. The different network security evaluation packages feature an extra-cost option for on-premises security engineers anywhere in the U.S.
  • Migrating from Microsoft Internet Security and Acceleration (ISA) Server and Forefront TMG
    Microsoft ISA Server and its replacement Microsoft Forefront TMG 2010 are software platforms that include an application-aware firewall that can defend networks from outside and internal attacks. Both platforms perform deep inspection of network protocols to uncover exploits that can get by early-generation firewalls. Microsoft ISA Server 2006 was superseded by Microsoft Forefront TMG 2010, which is built on ISA Server's architecture while delivering a number of improved capabilities. Forefront TMG has in turn been discontinued by Microsoft, and the security features offered by the product are now typically taken over by dedicated physical devices from companies that include Cisco, Barracuda, Juniper and WatchGuard. (See Cisco ASA 5500-X Firewall with Firepower Services configuration and support.) Progent provides advanced Microsoft Forefront TMG support services and ISA Server 2006 expertise to help you maintain and debug your older firewalls, and Progent can help your organization to migrate efficiently to a modern security solution by providing planning, integration, optimization, IT staff training and debugging.
  • Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Series Firewalls, and PIX 500 Security Appliances Integration and Troubleshooting
    Cisco Certified CCIE Security ExpertsThe current ASA 5500-X Series of firewalls with Firepower Services deliver substantially more performance than Cisco's legacy PIX and ASA 5500 firewalls and have superseded the ASA 5500 and PIX 500 firewalls for new installations. Following Cisco's purchase of Sourcefire, the entire family of ASA 5500-X firewalls can be provisioned to support Firepower Services, built on Sourcefire's Snort product, which is the world's most popular network intrusion protection system. Firepower services bring powerful new capabilities such as advanced malware protection (AMP), URL filtering, real-time threat analytics, and automation. Progent's Cisco-qualified CCIE network consultants can help you to manage your current PIX or ASA 5500 security appliances or upgrade efficiently to ASA 5500-X firewalls with Firepower Services. Progent's consultants offer remote and onsite support for ASA 5500-X firewalls with Firepower Services and can help your company to design, configure, tune, administer and troubleshoot firewall environments built on Cisco ASA 5500-X firewalls with Firepower Services. Find out more details about ASA Firewalls with Firepower Services integration and debugging services.
  • Additional Firewall and VPN Consulting Services
    As well as supporting a wide range of security solutions available from Microsoft and Cisco Systems, Progent can provide small and mid-size organizations expert support for security products from other popular firewall and Virtual Private Network vendors including:
  • Unannounced Intrusion Testing Consulting
    Unannounced penetration checking is a vital method for allowing businesses to understand how vulnerable their information systems are to serious threats by revealing how thoroughly corporate protection procedures and mechanisms hold up to planned but unpublicized intrusion attempts instigated by veteran security specialists utilizing the latest intrusion techniques. Find out the details about Progent's Stealth Penetration Assessment Services.
Progent's Security Certifications
Progent's security specialists have been awarded the most prestigious accreditations offered in the security industry. These accreditations demand extensive examinations and demonstrated work background to guarantee that candidates have acquired expertise with a significant body of security knowledge and techniques and can offer advanced security solutions to information environments of any size.
  • Certified Information Security Manager (CISM) Security Support Services
    Certified Information Security Manager defines the core skills and worldwide benchmarks of performance that IT security managers are expected to achieve. It offers business management the assurance that those who have been awarded their CISM have the background and knowledge to provide effective security administration and consulting services. Progent can provide a CISM support professional to help your organization in vital security areas including information protection governance, vulnerability management, information security process management, and incident response support. Read more information about Progent's CISM Security Consulting Assistance.
  • CISSP Security Consulting Expertise
    Progent's CISSP experts are security engineers who have earned CISSP accreditation through verified professional work, extensive study, and formal testing. CISSP Certification recognizes expertise in an international standard for IT security. ANSI has granted the CISSP status official recognition in the area of information security under ISO/IEC 17024. Fields of expertise covered under CISSP include security management procedures, security architecture and test systems, access permission systems, software development security, operations security, hardware security, encryption, telecommunications, network security, and business continuity planning. Learn more information about Progent's CISSP Consulting Assistance.
  • Information Systems Security Architecture Professionals (ISSAP) Engineering Services
    Progent's ISSAP qualified security consultants are experts who have been awarded ISSAP accreditation after thorough examination and significant experience. field experience with network security design. ISSAP security experts have acquired in-depth understanding of access control systems and techniques, telecommunications and network protection, cryptography, requirements analysis, BCP and disaster recovery planning (DRP), and physical security integration. Progent's ISSAP-certified security experts can help your business with all phases of architecture security. Get additional information concerning Progent's ISSAP Certified Protected IT Architecture Consulting Assistance.
  • Certified Information Systems Auditor (CISA) Professional Services
    The CISA credential is a globally recognized achievement that indicates expertise in network security audit and control. Certified by the American National Standards Institute, the CISA credential has candidates undergo a comprehensive examination given by the ISACA professional group. Progent offers the services of a CISA-certified security audit professional trained to assist businesses in the areas of IS audit services, IT administration, network assets and architecture lifecycle, IT support, protecting information assets, and business continuity preparedness. Get additional information concerning Progent's CISA Professional Services.
  • Global Information Assurance Certification Support Services
    GIAC (Global Information Assurance Certification) was established in 1999 to validate the knowledge of network security engineers. GIAC's goal is to ensure that an accredited security consultant has the skills appropriate to provide services in vital areas of network, data, and application security. GIAC accreditations are acknowledged by businesses and government organizations throughout the world including and the United States NSA. Progent can provide the help of certified consultants for all of the security capabilities covered within GIAC certification topics including assessing security systems, security incident response, intrusion detection, and web application security. Learn additional details concerning Progent's GIAC (Global Information Assurance Certification) Support Services.
Depend on Progent for Network Security Consulting Services
If you need security expertise, call Progent at 800-993-9400 or visit Contact Progent.

© 2002- 2017 Progent Corporation. All rights reserved.