Computer Security and Compliance
Network Security Solutions for
Organizations of Any Size
Overview of Progent's Security and Compliance Support Services
Progent's certified network security and compliance professionals offer a broad selection of support services intended to assist businesses of all sizes to detect and eliminate security weaknesses, block attacks, remediate the damage caused by a breach of security, and comply with government requirements for guarding data and reporting incidents. Progent can provide a choice of service delivery models:
As-needed Security and Compliance Consulting Services
- On-demand online and on-site support invoiced to the nearest minute
- On-going fully managed services billed at an affordable flat monthly rate
- Value-priced service bundles for a one-time security evaluation
After you register for Progent's services (signing up is free), you can get as-needed online or onsite assistance from one of Progent security expert. This traditional support model is essentially reactive and geared toward quickly taking care of IT issues that are disrupting your network or that have stumped your own support personnel. Typical scenarios include debugging a firewall appliance or VPN connection, implementing a critical security patch for a Cisco switch, designing compliant access to cloud-based resources, or recovering from a ransomware assault. These security services are billed by the minute, which avoids the frustrating case of receiving big bills for fast fixes.
Delivery options for Progent's on-demand support services include:
Progent's accredited security consultants are certified to provide help for environments based on Microsoft, Linux, Mac, Solaris, and major derivatives of UNIX. Progent's broad array of consulting services addresses firewall technology, email systems, secure system design, and data restoration. Progent's technical support team has earned the industry's top security credentials including Certified Information Security Manager (CISM) and Information System Security Architecture Professional. Progent also offers immediate access to online Cisco CCIE network consultants who can provide advanced support with complex network configuration issues.
- Online Security Support Services
Most security issues can be resolved remotely via a combination of phone-based support and a remote connection between Progent's Technical Response Center (TRC) and a customer's network. Progent's Technical Response Center can provide remote security help by offering efficient access to consultants with the background and resources to resolve many of the most challenging problems quickly, making your service costs low and minimizing downtime.
- Onsite Security Support Services
For cases where onsite assistance is necessary, Progent can send a technical professional to major cities throughout the U.S. Progent can also send a security specialist with top certifications and world-class skills to any site in the U.S.
ProSight Flat-rate Managed Services for Information Assurance
Progent's low-cost ProSight family of network monitoring and management services is intended to provide small and mid-size businesses with enterprise-class support and state-of-the-art technology for all aspects of information assurance. ProSight managed services offered by Progent include:
ProSight Network Audits
- ProSight Email Guard: Spam Filtering, Data Leakage Protection and Content Filtering
ProSight Email Guard is Progent's email filtering and encryption solution that incorporates the services and infrastructure of leading information security vendors to provide web-based management and comprehensive security for your inbound and outbound email. The powerful architecture of Progent's Email Guard managed service integrates a Cloud Protection Layer with a local gateway appliance to provide complete protection against spam, viruses, Dos Attacks, Directory Harvest Attacks, and other email-borne malware. Email Guard's Cloud Protection Layer acts as a preliminary barricade and blocks the vast majority of threats from making it to your security perimeter. This decreases your vulnerability to external threats and saves system bandwidth and storage space. Email Guard's onsite security gateway appliance adds a further level of analysis for inbound email. For outbound email, the local security gateway provides AV and anti-spam filtering, DLP, and email encryption. The local gateway can also assist Exchange Server to monitor and protect internal email that stays inside your corporate firewall. Learn more about Progent's ProSight Email Guard spam filtering, virus blocking, email content filtering and data loss prevention.
- ProSight Active Security Monitoring (ASM): Next Generation Endpoint Protection and Ransomware Defense
Progent's ProSight Active Security Monitoring is an endpoint protection service that utilizes next generation behavior machine learning tools to guard endpoints and physical and virtual servers against new malware attacks such as ransomware and file-less exploits, which routinely get by legacy signature-matching anti-virus products. ProSight Active Security Monitoring safeguards on-premises and cloud-based resources and provides a unified platform to automate the complete malware attack lifecycle including blocking, identification, mitigation, remediation, and post-attack forensics. Key capabilities include one-click rollback with Windows Volume Shadow Copy Service (VSS) and real-time network-wide immunization against newly discovered attacks. Read more about Progent's ProSight Active Security Monitoring (ASM) next-generation endpoint protection and ransomware recovery.
- ProSight DPS: Managed Cloud Backup
ProSight Data Protection Services offer small and medium-sized businesses a low cost end-to-end solution for secure backup/disaster recovery (BDR). Available at a fixed monthly rate, ProSight Data Protection Services automates and monitors your backup activities and enables fast restoration of vital data, applications and VMs that have become unavailable or damaged due to hardware breakdowns, software glitches, natural disasters, human mistakes, or malware attacks like ransomware. ProSight Data Protection Services can help you back up, retrieve and restore files, folders, applications, system images, plus Hyper-V and VMware images. Critical data can be protected on the cloud, to a local storage device, or to both. Progent's backup and recovery specialists can provide world-class expertise to configure ProSight DPS to to comply with regulatory requirements like HIPPA, FINRA, and PCI and, when necessary, can assist you to recover your critical information. Find out more about ProSight DPS Managed Backup and Recovery.
- ProSight WAN Watch: Network Infrastructure Management
ProSight WAN Watch is an infrastructure management service that makes it simple and inexpensive for smaller organizations to map out, track, optimize and debug their networking appliances such as routers and switches, firewalls, and access points as well as servers, client computers and other networked devices. Using cutting-edge Remote Monitoring and Management (RMM) technology, ProSight WAN Watch makes sure that infrastructure topology maps are always current, copies and displays the configuration information of almost all devices connected to your network, tracks performance, and sends alerts when problems are discovered. By automating complex management and troubleshooting activities, WAN Watch can cut hours off common chores like making network diagrams, expanding your network, finding appliances that need critical updates, or identifying the cause of performance bottlenecks. Find out more details about ProSight WAN Watch network infrastructure management consulting.
- ProSight LAN Watch: Server and Desktop Remote Monitoring
ProSight LAN Watch is Progentís server and desktop monitoring managed service that uses state-of-the-art remote monitoring and management techniques to help keep your IT system running at peak levels by checking the state of vital computers that power your information system. When ProSight LAN Watch uncovers an issue, an alert is sent immediately to your designated IT personnel and your Progent engineering consultant so any looming problems can be addressed before they have a chance to disrupt productivity Find out more details about ProSight LAN Watch server and desktop monitoring services.
- ProSight Virtual Hosting: Hosted Virtual Machines at Progent's World-class Data Center
With Progent's ProSight Virtual Hosting service, a small business can have its key servers and applications hosted in a secure Tier III data center on a high-performance virtual machine host configured and managed by Progent's IT support professionals. With the ProSight Virtual Hosting model, the customer owns the data, the operating system platforms, and the apps. Since the environment is virtualized, it can be moved easily to a different hardware solution without a time-consuming and difficult reinstallation procedure. With ProSight Virtual Hosting, you are not locked into a single hosting provider. Find out more details about ProSight Virtual Hosting services.
- ProSight IT Asset Management: Network Documentation Management
ProSight IT Asset Management service is a cloud-based IT documentation management service that makes it easy to create, maintain, retrieve and safeguard information about your IT infrastructure, processes, applications, and services. You can quickly locate passwords or IP addresses and be warned automatically about upcoming expirations of SSLs ,domains or warranties. By cleaning up and managing your IT documentation, you can eliminate as much as half of time wasted looking for critical information about your network. ProSight IT Asset Management includes a centralized location for storing and collaborating on all documents required for managing your network infrastructure such as standard operating procedures (SOPs) and self-service instructions. ProSight IT Asset Management also offers advanced automation for gathering and associating IT data. Whether youíre planning improvements, performing regular maintenance, or reacting to a crisis, ProSight IT Asset Management delivers the information you require as soon as you need it. Find out more details about Progent's ProSight IT Asset Management service.
Progent's ProSight Network Audits are a fast and low-cost way for small and mid-size organizations to get an unbiased assessment of the health of their IT system. Powered by a selection of the leading remote monitoring and management platforms available, and overseen by Progent's certified group of IT professionals, ProSight Network Audits show you how closely the configuration of your core infrastructure assets conform to leading practices. The Basic and Advanced versions of ProSight Network Audit services are offered at a budget-friendly, one-time cost and deliver immediate benefits like a cleaner Active Directory (AD) environment. Both also come with one year of cutting-edge remote network monitoring and management (RMM). Benefits can include lower-cost management, better compliance with data security regulations, higher utilization of network resources, quicker problem resolution, more dependable backup and recovery, and higher availability. See more about ProSight Network Audits network infrastructure assessment.
Fixed-price Security Assessment and Verification Packages
Progent offers a selection of fixed-price security and compliance assessment bundles that provide high value by utilizing Progent's enterprise-class network monitoring software as well as Progent's consulting experience to create an objective and comprehensive evaluation of your IT environment security posture.
We've Been Hacked: What Are We Supposed to Do Now?
- Security Inventory Service Bundles for Small Businesses
Progent offers two value-priced security inventory service packages intended to allow small businesses to obtain a professional security assessment from an accredited security engineer. With Progent's External Security Inventory Scan, a consultant manages a comprehensive examination of your IT system from outside your corporate firewall to identify potential gaps in the security posture you expose to the public. With Progent's Internal Security Inventory Scan, a certified security expert runs a system scan from an authorized computer inside your corporate firewall to assess your exposure to inside attacks. The two security inventory services are configured and executed from a secured external site. The scan is managed by an engineer who has been awarded advanced security certifications and who produces a report that describes and evaluates the information collected by the security scan and suggests practical enhancements where appropriate.
- Security Vulnerability Assessment Bundles for Large Businesses
Progent offers three levels of set-price security assessment service bundles intended for enterprises who want to meet compliance standards required by government or industry agencies. Progent's security evaluation service bundles offer larger businesses a chance to get a professional look at the viability of their security posture. For each security evaluation bundle, Progent consultants with advanced security credentials study and report on captured data and offer suggestions for efficient remediation. All the network security audit bundles include an added-cost option for onsite engineers at any location in the United States.
- Stealth Penetration Testing Services
Stealth penetration testing, often referred to as PEN testing, is a critical tool for allowing businesses to find out how open their IT systems are to modern attacks. Progent's stealth penetration testing services test how effectively your existing security policies and platforms stand up to authorized but unannounced penetration attempts launched by Progent's veteran security specialists using cutting-edge hacking techniques. Read about Progent's stealth penetration testing services.
If you are now experiencing a network security crisis and you have not prepared a formal recovery plan, refer to Progent's Online Technical Help to see how to get immediate assistance. Progent offers online help from skilled network technicians and can escalate trouble tickets to certified security specialists if required. Your company does not have to be a registered Progent client to receive urgent support for a security problem, but you can sign up as a Progent customer in advance at no cost and your status as a registered client could save precious time in a crisis.
Usually, smaller organizations have not documented a response procedure in the event of a damaging security breach. This is not good, since the cost of a successful security assault can be even more devastating for a small company than for a big enterprise. Progent's security specialists can assist your business to design an efficient response and event reporting plan that minimizes the IT system disruption following a security breach. The formal incident response procedure outlined by Global Information Assurance Certification is Progent's recommended method for reacting to a serious security incident.
Advanced Security Expertise Offered by Progent
Progent's certified consultants can provide expertise in key facets of network security such as:
Progent's Security Certifications
- Information Risk Evaluation and Security Compliance Testing
Progent offers experience with information risk auditing software such as MS Baseline Security Analyzer or LANguard for conducting a set of automatic system tests to reveal potential security problems. Progent has broad skills with scanning tools and can help your company to analyze assessment results and react efficiently. Progent's certified security consultants also provide web software testing and can perform thorough assessments of corporate-wide security to determine your organization's compliance with important global security specifications including HIPAA, PCI, and ISO. Also, Progent can evaluate the effectiveness of your wireless protection including fixed wireless appliances as well as portable handsets. Get additional information concerning Progent's Information Risk Audits and Security Compliance Assessment.
- Planning, Implementing, and Validating Secure Environments
Every organization should have a thoroughly considered security strategy that incorporates both preventive and reactive steps. The proactive plan is a set of precautions that helps to reduce vulnerabilities. The reactive strategy defines activities to assist IT personnel to evaluate the damage caused by an attack, remediate the damage, record the event, and revive business functions as soon as possible. Progent can show you how to build protection into your company processes, set up scanning software, create and implement a safe computer infrastructure, and propose processes and policies that will optimize the safety of your information system. Progent's security experts are available to help you to configure a firewall, design secure offsite access to email and files, and install an effective VPN. If you are interested in an affordable way for outsourcing your network security administration, Progent's Round-the-clock Monitoring Options include automated online server monitoring and immediate resolution of emergencies.
- System Recovery and Failure Analysis
Progent provides expertise in recovering networks and servers that have been compromised, are quarantined, or have failed because of a security penetration. Progent can help determine the damage resulting from the assault, restore normal functions, and recover information lost as a result of the assault. Progent's security specialists can also oversee a comprehensive failure analysis by going over activity logs and utilizing other advanced assessment techniques. Progent's background with security consulting minimizes your off-air time and allows Progent to propose efficient strategies to prevent or contain future attacks.
- Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Series Firewalls, and PIX 500 Security Appliances Configuration and Debugging
The new ASA 5500-X Family Next-Generation Firewalls with Firepower Services offer significantly more performance than Cisco's legacy firewalls and have superseded the ASA 5500 and PIX security appliances for all new deployments. Since Cisco's acquisition of Sourcefire, the whole line of Cisco ASA 5500-X firewalls can be configured to enable Firepower Services, built on Sourcefire's Snort product, which is the market's most deployed network intrusion protection system. Firepower services bring powerful new capabilities including advanced malware protection (AMP), URL filtering, dynamic threat analytics, and security automation. Progent's Cisco-certified CCIE network consultants can assist your company to manage your existing PIX or Cisco ASA 5500 security appliances and migrate to Cisco ASA 5500-X firewalls with Firepower Services. Progent's consultants can provide remote and onsite help with ASA 5500-X firewalls with Firepower Services and can assist your company to design, deploy, tune, manage and troubleshoot firewall environments based around Cisco ASA 5500-X firewalls with Firepower Services. Learn additional information about ASA Firewalls with Firepower integration and debugging support.
- Additional Firewall and Virtual Private Network Consulting Services
In addition to being expert in a wide range of protection solutions from Microsoft and Cisco, Progent can provide small companies top-level consulting for technologies from other popular firewall and Virtual Private Network suppliers including:
- SIEM Security Information and Event Management Integration and Support
Security information and event management (SIEM) software and services are designed to digest the enormous amounts of data represented by security incident records created by multiple sources such as network infrastructure appliances, servers, and application software and tools. SIEM applications analyzes the security event records from these various sources and creates summary reports of security incidents as mandated by government regulations and business compliance guidelines. Progent's GIAC-certified network security experts and Cisco-certified network infrastructure consultants can help businesses to plan, deploy and manage a SIEM system that enables them to see the behavior of attacks and comply with security incident reporting regulations. (See Progent's SIEM solutions.)
Progent's security specialists have been awarded the most prestigious accreditations offered in the security industry. These accreditations demand exhaustive examinations and proven field background to ensure that recipients have acquired expertise with a significant body of security knowledge and techniques and can offer high-level consulting to computer environments of any complexity.
Depend on Progent for Network Security Consulting Services
- Certified Information Security Manager Security Consulting Services
Certified Information Security Manager (CISM) defines the fundamental skills and worldwide standards of service that information technology security professionals are required to achieve. CISM offers executive management the confidence that those who have earned their certification possess the background and skill to offer effective security administration and consulting support. Progent can offer a CISM-certified expert to help your enterprise in vital security areas including data protection governance, risk assessment, information protection process control, and incident handling management. Get more information concerning Progent's Certified Information Security Manager (CISM) Security Support Assistance.
- Certified Information Systems Security Professionals (CISSP) Security Consulting Services
Progent's CISSP consultants are security specialists who have earned CISSP certification as a result of verified experience, extensive study, and exhaustive examination. CISSP Certification recognizes expertise in an international standard for information security. American National Standards Institute has given the CISSP status accreditation in the area of IT security under ISO/IEC 17024. Areas of knowledge covered under CISSP include security administration procedures, security design and test systems, connection permission systems, applications development security, operations security, hardware security, cryptography, telecommunications, Internet security, and disaster recovery planning. Find out the details about Progent's Certified Information Systems Security Professionals (CISSP) Support Assistance.
- Information Systems Security Architecture Professionals (ISSAP) Engineering Support
Progent's ISSAP certified security consultants are experts who have been awarded ISSAP status following thorough testing and significant hands-on work with information security architecture. ISSAP consultants have comprehensive knowledge of access control systems and techniques, phone system and network security, cryptography, requirements analysis, business continuity planning (BCP) and disaster recovery planning (DRP), and physical security integration. Progent's ISSAP-certified security specialists can help your company with all aspects of secure network architecture. Find out additional details concerning Progent's ISSAP Certified Protected Network Infrastructure Engineering Services.
- CISA Professional Services
The CISA accreditation is a recognized qualification that indicates expertise in IS security audit and control. Certified by ANSI, the CISA credential has candidates pass an exhaustive test administered by the ISACA international professional association. Progent offers the expertise of a CISA-certified security consultant able to help businesses in the fields of IS audit services, IT governance, network assets and infrastructure lifecycle, information technology service delivery, protecting information assets, and disaster recovery preparedness. Learn the details concerning Progent's Certified Information Systems Auditor Consulting Services.
- GIAC Professional Services
GIAC (Global Information Assurance Certification) was founded in 1999 to validate the skill of computer security professionals. GIAC's goal is to ensure that a certified security consultant possesses the skills necessary to provide support in key categories of network, information, and program security. GIAC accreditations are recognized by companies and government organizations all over the world including and the U.S. NSA. Progent can provide the help of certified consultants for all of the security services addressed within GIAC certification programs including auditing networks, security incident handling, intrusion detection, and web services security. Learn more details concerning Progent's GIAC Support Expertise.
If you need network security consulting expertise, phone Progent at 800-993-9400 or refer to Contact Progent.
Progent Corporation. All rights reserved.