Overview of Progent's Security and Compliance Consulting Services
Progent's certified computer security consultants can provide a broad selection of services designed to help companies of any size to detect and eliminate security weaknesses, block malicious attacks, recover from any damage caused by a breakdown of security, and meet government requirements for guarding data and reporting security incidents. Progent can provide a choice of service delivery models:

  • As-needed online and on-premises support billed by the minute
  • On-going managed services invoiced at an affordable flat monthly fee
  • Set-price service packages for a single security assessment
As-needed Security and Compliance Consulting Services
After you sign up for Progent's services (registration is free), you can get on-demand online or onsite assistance from one of Progent security and compliance consultant. This classic service model is essentially reactive and geared toward rapidly resolving IT issues that are impacting your network or that have stymied your in-house support personnel. Typical scenarios are replacing a firewall or VPN connection, implementing a critical security update for a Cisco switch, designing compliant access to a public cloud, or recovering from a ransomware assault. These services are invoiced to the nearest minute, which eliminates the annoying situation of receiving big bills for quick fixes.

Delivery alternatives for Progent's on-demand support include:

  • Remote Security Support
    The majority security issues can be handled remotely via a combination of phone-based help and a remote Internet connection between Progent's Technical Response Center (TRC) and a client's computer. Progent's TRC group can deliver online security help by offering easy access to consultants with the experience and resources to fix some of the most difficult issues quickly, making your support costs low and reducing downtime.
  • Onsite Security Services
    For cases where on-premises support is necessary, Progent can send a technical professional to major metropolitan areas across the U.S. Progent can also dispatch a security specialist with high-level certifications and world-class skills to any site in the U.S.
Progent's accredited consultants are certified to provide help for environments based on Microsoft Windows, Linux, Mac, Solaris, and major derivatives of UNIX. Progent's broad array of consulting services encompasses firewall configuration, e-mail systems, protected network architecture, and information restoration. Progent's support staff has earned the industry's top security credentials including GIAC (Global Information Assurance Certification) and Certified Information Systems Security Professional. Progent also offers immediate access to remote Cisco CCIE network infrastructure consultants who can deliver world-class support with tough network technology problems.

ProSight Low-Cost Managed Services for Information Assurance
Progent's low-cost ProSight portfolio of network monitoring and management services is intended to provide small and mid-size businesses with enterprise-class support and cutting-edge technology for all aspects of information assurance. ProSight managed services offered by Progent include:

  • ProSight Active Security Monitoring (ASM): Endpoint Protection and Ransomware Recovery
    ProSight Active Security Monitoring is an endpoint protection (EPP) solution that utilizes cutting edge behavior-based machine learning tools to guard endpoints as well as servers and VMs against new malware assaults such as ransomware and file-less exploits, which routinely get by legacy signature-based anti-virus tools. ProSight Active Security Monitoring protects on-premises and cloud-based resources and provides a single platform to automate the complete threat lifecycle including blocking, identification, mitigation, cleanup, and forensics. Top features include single-click rollback with Windows VSS and automatic network-wide immunization against newly discovered attacks. Find out more about Progent's ProSight Active Security Monitoring (ASM) endpoint protection and ransomware recovery.

  • ProSight Enhanced Security Protection: Unified Physical and Virtual Endpoint Security
    ProSight Enhanced Security Protection managed services offer affordable in-depth security for physical and virtual servers, workstations, mobile devices, and Exchange Server. ProSight ESP utilizes contextual security and modern behavior analysis for continuously monitoring and responding to cyber threats from all vectors. ProSight ESP offers two-way firewall protection, intrusion alerts, device control, and web filtering via cutting-edge tools incorporated within one agent managed from a unified control. Progent's data protection and virtualization consultants can assist you to plan and configure a ProSight ESP deployment that meets your organization's unique needs and that allows you achieve and demonstrate compliance with government and industry data protection regulations. Progent will assist you define and implement security policies that ProSight ESP will enforce, and Progent will monitor your network and respond to alerts that require immediate attention. Progent's consultants can also help your company to set up and verify a backup and restore system such as ProSight Data Protection Services so you can recover rapidly from a potentially disastrous security attack like ransomware. Read more about Progent's ProSight Enhanced Security Protection (ESP) unified physical and virtual endpoint protection and Exchange filtering.

  • ProSight DPS: Managed Backup and Recovery
    ProSight Data Protection Services offer small and medium-sized businesses a low cost and fully managed service for secure backup/disaster recovery. For a low monthly price, ProSight Data Protection Services automates your backup processes and enables fast recovery of critical data, apps and VMs that have become unavailable or damaged due to component failures, software glitches, disasters, human error, or malware attacks such as ransomware. ProSight DPS can help you protect, retrieve and restore files, folders, applications, system images, plus Microsoft Hyper-V and VMware images. Critical data can be backed up on the cloud, to a local device, or to both. Progent's cloud backup consultants can deliver advanced expertise to configure ProSight DPS to to comply with government and industry regulatory requirements such as HIPPA, FINRA, and PCI and, when needed, can help you to recover your business-critical data. Read more about ProSight Data Protection Services Managed Cloud Backup.

  • ProSight Email Guard: Inbound and Outbound Spam Filtering, Data Leakage Protection and Email Encryption
    ProSight Email Guard is Progent's email filtering and encryption solution that incorporates the technology of top data security companies to deliver centralized management and world-class security for your email traffic. The hybrid architecture of Progent's Email Guard managed service integrates a Cloud Protection Layer with a local security gateway appliance to provide advanced protection against spam, viruses, Denial of Service (DoS) Attacks, Directory Harvest Attacks, and other email-based malware. The Cloud Protection Layer acts as a preliminary barricade and blocks most threats from making it to your network firewall. This reduces your exposure to external threats and conserves system bandwidth and storage. Email Guard's onsite security gateway appliance adds a further layer of inspection for incoming email. For outgoing email, the onsite gateway offers anti-virus and anti-spam protection, DLP, and email encryption. The local security gateway can also help Microsoft Exchange Server to track and protect internal email that originates and ends within your security perimeter. Find out more about Progent's ProSight Email Guard spam filtering, virus blocking, content filtering and data leakage protection.

  • ProSight WAN Watch: Network Infrastructure Remote Monitoring and Management
    Progentís ProSight WAN Watch is a network infrastructure management service that makes it simple and affordable for smaller organizations to map out, track, reconfigure and troubleshoot their connectivity appliances such as switches, firewalls, and wireless controllers plus servers, client computers and other devices. Using state-of-the-art RMM technology, WAN Watch makes sure that network maps are always current, captures and manages the configuration information of virtually all devices connected to your network, tracks performance, and generates alerts when issues are discovered. By automating time-consuming management and troubleshooting activities, ProSight WAN Watch can knock hours off common tasks such as network mapping, expanding your network, finding devices that require important updates, or isolating performance problems. Find out more details about ProSight WAN Watch network infrastructure monitoring and management services.

  • ProSight LAN Watch: Server and Desktop Monitoring
    ProSight LAN Watch is Progentís server and desktop monitoring managed service that incorporates state-of-the-art remote monitoring and management techniques to keep your network running efficiently by tracking the state of vital computers that power your business network. When ProSight LAN Watch detects an issue, an alert is sent immediately to your designated IT staff and your Progent consultant so that all looming problems can be addressed before they have a chance to impact your network Learn more details about ProSight LAN Watch server and desktop monitoring services.

  • ProSight Virtual Hosting: Hosted Virtual Machines at Progent's Tier III Data Center
    With Progent's ProSight Virtual Hosting service, a small business can have its key servers and apps hosted in a secure Tier III data center on a high-performance virtual machine host configured and maintained by Progent's IT support experts. With the ProSight Virtual Hosting service model, the client retains ownership of the data, the operating system platforms, and the apps. Since the system is virtualized, it can be ported easily to an alternate hardware solution without requiring a time-consuming and difficult configuration procedure. With ProSight Virtual Hosting, your business is not locked into a single hosting provider. Learn more details about ProSight Virtual Hosting services.

  • ProSight IT Asset Management: Network Infrastructure Documentation Management
    ProSight IT Asset Management service is an IT infrastructure documentation management service that allows you to capture, maintain, find and protect data related to your network infrastructure, processes, applications, and services. You can quickly locate passwords or IP addresses and be warned automatically about upcoming expirations of SSL certificates or warranties. By cleaning up and managing your IT documentation, you can eliminate as much as 50% of time thrown away looking for critical information about your IT network. ProSight IT Asset Management features a centralized repository for storing and sharing all documents required for managing your network infrastructure like standard operating procedures (SOPs) and self-service instructions. ProSight IT Asset Management also offers a high level of automation for gathering and associating IT information. Whether youíre planning improvements, performing maintenance, or responding to a crisis, ProSight IT Asset Management delivers the data you require the instant you need it. Learn more about Progent's ProSight IT Asset Management service.
ProSight Network Audits
Progent's ProSight Network Audits are a fast and low-cost way for small and mid-size organizations to obtain an unbiased assessment of the health of their IT system. Based on some of the top remote monitoring and management (RMM) platforms in the industry, and overseen by Progent's certified team of information technology professionals, ProSight Network Audits show you how closely the configuration of your core network assets adhere to best practices. Both the Basic and Advanced versions of ProSight Network Audit services are available at a budget-friendly, one-time cost and deliver immediate ROI such as a cleaner Active Directory system. Both versions also come with one year of cutting-edge remote network monitoring and management. Benefits can include easier management, better compliance with government and industry security standards, higher utilization of IT resources, faster problem resolution, more reliable backup and recovery, and increased uptime. See more information about Progent's ProSight Network Audits IT infrastructure review.

Progent's ProSight Ransomware Preparedness Report
The ProSight Ransomware Preparedness Report is an affordable service built around a phone interview with a Progent information assurance expert. The fact-finding interview is intended to evaluate your company's ability to stop or recover rapidly after a ransomware incident. Progent will consult with you directly to collect information concerning your current antivirus tools and backup/recovery platform, and Progent will then produce a written Basic Security and Best Practices Report detailing how you can apply industry best practices to deploy a cost-effective AV and backup/recovery environment that meets your company's needs. For details, refer to Progent's ProSight Ransomware Preparedness Report Service.

Set-price Security Assessment and Validation Packages
Progent offers a variety of set-price security and compliance assessment packages that deliver high value by utilizing Progent's advanced system monitoring and analysis software as well as Progent's consulting skills to create an unbiased and comprehensive assessment of your IT environment security posture.

  • Security Inventory Service Bundles for Small Businesses
    Progent offers two ultra-affordable security inventory packages intended to allow small businesses to get a professional security evaluation from a certified security consultant. With Progent's External Security Inventory Scan, an engineer manages a comprehensive examination of your IT system from beyond your corporate firewall to determine potential risks in the security posture you present to the public. With Progent's Internal Security Inventory Scan, a security expert runs a system scan using an authorized computer within your corporate firewall to assess your vulnerability to internal assaults. The two security inventory scanning services are configured and executed from a secured offsite location. The scan is administered by an engineer who has earned high-level security certifications and who creates a document that describes and interprets the data collected by the security scan and suggests various improvements where appropriate.
  • Security Vulnerability Assessment Bundles for Large Businesses
    Progent offers three levels of set-price security evaluation service packages intended for large organizations who need to meet security standards required by government or industry agencies. Progent's security evaluation service bundles offer enterprises a chance to get a professional look at the strength of their security profile. For each security evaluation bundle, Progent consultants with top security credentials study and report on captured data and offer recommendations for cost-effective remediation. Each of the network security assessment packages include an extra-cost option for onsite engineers anywhere in the United States.
  • Stealth Penetration Testing Services
    Stealth penetration testing, often called PEN testing, is an accepted technique for allowing businesses to find out how open their IT environments are to modern threats. Progent's stealth penetration testing check how effectively your corporate security procedures and platforms stand up to authorized but unannounced penetration attempts launched by Progent's certified security specialists utilizing cutting-edge hacking methods. Find out about Progent's stealth penetration testing (PEN Test) services.
We've Been Hacked: What Can We Do?
Network Security ConsultantsIf your business is currently experiencing a security emergency and you have no formal response plan, go to Progent's Online Computer Help to find out how to get fast help. Progent provides remote help from experienced network technicians and can refer problems to certified security experts if required. Your company does not need to be a current Progent customer to receive urgent support for a security problem, but you can register as a Progent customer in advance at no cost and your standing as a current client could save precious time in case of an emergency.

Usually, smaller companies have no recovery plan in the event of a damaging penetration. This is not good, since the damage from a successful security attack can be more devastating for a small company than for a large enterprise. Progent's security specialists can help your you to design a sensible recovery and incident reporting plan that minimizes the network disruption following an attack. The step-by-step incident handling procedure promoted by GIAC is Progent's preferred procedure for responding to a major security penetration.

Advanced Security Services Available from Progent
Progent's security consultants can provide world-class consulting in key facets of network security such as:

  • Vulnerability Audits and Security Compliance Testing
    Progent offers experience with information risk auditing utilities like Microsoft Baseline Security Analyzer and LANguard from GFI for conducting a set of comprehensive network scans to identify possible security problems. Progent has broad experience with monitoring utilities and can assist your company to understand assessment reports and respond efficiently. Progent's security engineers also provide web application testing and can conduct expert evaluation of corporate-wide security to verify your company's compliance with important industry security standards such as FISMA, NIST, and ISO. In addition, Progent can evaluate the strength of your wireless security including stationary wireless equipment plus mobile handsets. Find out additional information concerning Progent's Vulnerability Evaluation and Compliance Assessment.
  • Designing, Building, and Validating Secure Networks
    Any organization should have a carefully thought out security strategy that incorporates both preventive and responsive elements. The pre-attack plan is a set of steps that helps to reduce security holes. The reactive strategy specifies activities to help IT staff to assess the losses caused by an attack, repair the damage, document the event, and revive network activity as soon as possible. Progent can show you how to incorporate security into your company processes, set up scanning software, create and implement a safe computer infrastructure, and recommend processes and policies to optimize the safety of your information system. Progent's security experts are available to assist you to configure a firewall, design protected online and mobile connectivity to email and files, and configure an effective VPN. If you are interested in an affordable option for outsourcing your security administration, Progent's Round-the-clock Monitoring Options feature non-stop remote system tracking and fast response to problems.
  • System Restoration and Security Forensics
    Progent has skill in recovering networks and servers that have been hacked, are in question, or have failed following a security penetration. Progent can show you how to determine the losses resulting from the assault, restore normal business operations, and retrieve data lost as a result of the assault. Progent's security specialists can also oversee a comprehensive failure analysis by going over activity logs and utilizing a variety of advanced forensics techniques. Progent's background with security issues minimizes your downtime and allows Progent to recommend efficient measures to prevent or mitigate new assaults.
  • Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Firewalls, and PIX Security Appliances Configuration and Debugging
    Cisco Certified CCIE Network Security ExpertsThe new ASA 5500-X Series Next-Generation Firewalls with Firepower Services offer significantly more performance than Cisco's legacy PIX and ASA 5500 firewalls and have superseded the ASA 5500 and PIX security appliances for all new installations. After Cisco's acquisition of Sourcefire, the whole family of ASA 5500-X firewalls can be configured to enable Firepower Services, built on Sourcefire's Snort technology, which is the market's most deployed intrusion protection system. Firepower services bring enhanced features such as advanced malware protection (AMP), URL filtering, dynamic threat analytics, and security automation. Progent's Cisco-certified CCIE network consultants can assist you to maintain your current PIX or ASA 5500 firewalls or migrate efficiently to Cisco ASA 5500-X firewalls with Firepower Services. Progent's consultants offer online and on-premises help with ASA 5500-X firewalls with Firepower Services and can help your organization to plan, integrate, tune, manage and troubleshoot firewall environments built around Cisco ASA 5500-X firewalls with Firepower Services. See more details about Cisco ASA 5500-X Firewalls with Firepower Services configuration and troubleshooting services.
  • Other Firewall and Virtual Private Network (VPN) Solutions
    In addition to being expert in a broad range of protection solutions available from Microsoft and Cisco, Progent offers small businesses top-level engineering services for products from other major firewall and Virtual Private Network vendors including:
  • SIEM Security Information and Event Management Integration and Support
    Security information and event management (SIEM) software and services are intended to digest the massive quantity of information collected in security event records generated by a wide range of sources such as network appliances, servers, and applications and monitoring tools. SIEM applications organizes the security event records from these various sources and produces summary reports of security events as required by state regulations and business compliance guidelines. Progent's GIAC-certified network security consultants and Cisco CCIE certified network consultants can help organizations to plan, deploy and manage a SIEM solution that helps them to understand the behavior of attacks and comply with event reporting regulations. (Visit Progent's SIEM solutions.)
Progent's Security Certifications
Progent's security engineers have been awarded some of the most respected accreditations offered in the security industry. These certifications require extensive examinations and demonstrated work background to ensure that candidates have mastered a significant amount of security knowledge and techniques and can offer high-level security solutions to information networks of any size.
  • CISM Security Support Expertise
    Certified Information Security Manager defines the basic skills and worldwide standards of performance that IT security managers are expected to achieve. It offers business management the assurance that consultants who have earned their accreditation possess the experience and knowledge to offer effective security administration and consulting services. Progent can offer a CISM-certified support professional to help your organization in critical security disciplines including data security governance, vulnerability management, data protection process management, and crisis response support. Learn the details about Progent's Certified Information Security Manager Security Support Services.

  • Certified Information Systems Security Professionals (CISSP) Security Support Expertise
    Progent's CISSP experts are security specialists who have been awarded CISSP status through verified experience, rigorous study, and formal examination. CISSP qualification indicates mastery of an international standard for IT security. American National Standards Institute has granted the CISSP credential official recognition in the field of information security under ISO/IEC 17024. Areas of knowledge covered within CISSP include security administration practices, security architecture and test systems, access control methodology, software development security, operations security, hardware security, encryption, communications, Internet security, and business continuity planning. Find out additional information concerning Progent's CISSP Consulting Services.

  • ISSAP Engineering Support
    Progent's ISSAP qualified security consultants are experts who have earned ISSAP certification as a result of rigorous testing and substantial experience. field experience with information security architecture. ISSAP security experts have acquired comprehensive knowledge of access management systems and techniques, phone system and network protection, cryptography, needs evaluation, BCP and DRP, and physical security integration. Progent's ISSAP-certified security experts can assist your company with all aspects of secure network architecture. Read additional information concerning Progent's ISSAP Certified Protected Network Infrastructure Engineering Assistance.

  • Certified Information Systems Auditor Professional Expertise
    The Certified Information Systems Auditor accreditation is an important achievement that signifies mastery in IS security audit and control. Certified by ANSI, the CISA credential requires that candidates pass an extensive examination given by the ISACA international professional group. Progent offers the services of a CISA-qualified security audit consultant able to help companies in the areas of IS audit services, IT enforcement, systems and architecture planned useful life, information technology support, safeguarding data assets, and disaster recovery planning. Get additional information concerning Progent's Certified Information Systems Auditor Support Assistance.

  • Global Information Assurance Certification Professional Expertise
    Global Information Assurance Certification was founded in 1999 to validate the knowledge of network security professionals. GIAC's goal is to verify that a certified professional has the knowledge necessary to deliver support in vital categories of system, information, and software security. GIAC accreditations are recognized by businesses and government organizations all over the world including and the U.S. National Security Agency (NSA). Progent offers the expertise of GIAC certified professionals for any of the security capabilities covered within GIAC accreditation programs including auditing security systems, incident response, intrusion detection, and web services security. Read more information about Progent's GIAC Consulting Services.
Get in Touch with Progent for Computer Security Help
If you're looking for network security engineering help, call Progent at 800-993-9400 or see Contact Progent.
















© 2002- 2018 Progent Corporation. All rights reserved.