Overview of Progent's Security Consulting Services
Progent's industry certified network security experts offer a broad range of professional services intended to help organizations of all sizes to detect and correct security vulnerabilities, block attacks, recover from the damage caused by a breakdown of security, and comply with government mandates for reporting incidents. Progent can provide remote and in person service and also has developed economical fixed-cost security evaluation packages to complement Progent's standard by-the-minute pricing.

Service delivery alternatives offered by Progent include:

  • On-line Security Support Services
    Typical security issues can be resolved remotely by a mix of telephone support and secure data access between Progent's Technical Response Center and the client's network. Progent's Technical Response service team includes network security engineers with the knowledge and experience and tools to solve some of the most challenging problems promptly, making your support costs reasonable and minimizing downtime. Progent offers security support on a per-minute model without minimum billing for remote support. Progent's billing policy avoids scenarios where quick fixes entail major expenses. Progent also has available a variety of set-price online security and compliance assessment packages that provide exceptional value by leveraging Progent's advanced security scanning software plus Progent's engineering experience to deliver an objective and thorough picture of your network vulnerability.

  • On-premises Security Services
    In circumstances where on-site support is needed, Progent can dispatch a service professional to major cities across the U.S. Progent's security engineers are in addition available for projects that require world-class security experts to be on site anywhere in the U.S., and Progent's most advanced security assessment bundles for enterprises feature the participation of a team of certified security engineers at your location.

  • Urgent Security Services
    For immediate assistance with computer security problems, your business can get in touch with a world-class online troubleshooting expert from Progent's team of security engineers available at Progent's TRC. Progent's emergency remote security service consultants are ready to provide fast and affordable assistance with security emergencies that threaten the productivity of your network. Progent's accredited security consultants are certified to support environments based on Microsoft, Linux, Mac, Solaris, and popular versions of UNIX. Progent's broad array of services encompasses firewall configuration, email and messaging systems, secure system architecture, and data recovery. Progent's technical support team has earned the industry's most advanced security accreditations including Certified Information Security Manager (CISM) and Certified Information Systems Security Professional. Progent also offers immediate access to online Cisco-certified CCIE network infrastructure consultants who can deliver world-class support with tough network configuration problems.

Our Network Has Been Hacked: What Are We Supposed to Do?
Network Security ConsultantsIf your company is now fighting a security emergency and you have no formal response plan, go to Progent's Online Technical Help to learn how to get immediate help. Progent provides remote assistance from experienced engineers and can escalate trouble tickets to high-level security experts if necessary. Your organization does not need to be a registered Progent customer to receive emergency support for a security breach, but you can sign up as a Progent client in advance at no cost and your standing as a current customer can save valuable time in case of an emergency.

Typically, smaller organizations have not documented a recovery plan in case of a damaging penetration. This is risky, since the cost of a successful security attack can be even more devastating for a small business than for a large corporation. Progent's security engineers can assist your company to design a sensible recovery and incident reporting procedure that minimizes the IT system downtime following a security breach. The step-by-step post-attack response procedure promoted by GIAC (Global Information Assurance Certification) is Progent's preferred method for handling a serious security attack.

Areas of Progent's Security Consulting Expertise
Coordinating network protection as well as staying ready for recovering critical information and functions after a security breach requires an on-going program involving a variety of technologies and processes. Progent's security consultants can help your organization at whatever level in your efforts to protect your information system and remain in compliance, Services range from security audits to creating a comprehensive security program. Key technologies supported by Progent's experts include Security Planning and Implementation, Information Restoration and Security Forensics, plus Managed Protection from Email-Based Spam and Viruses.

  • Designing, Building, and Validating Secure Networks
    Every organization ought to develop a thoroughly considered security plan that includes both proactive and responsive elements. The proactive strategy is a collection of precautions that helps to reduce security holes. The post-attack plan defines activities to assist security personnel to assess the damage resulting from an attack, repair the damage, record the event, and restore business activity as soon as feasible. Progent can show you how to design protection into your company operations, set up auditing software, create and execute a secure computer infrastructure, and recommend procedures and policies to enhance the safety of your information system. Progent's security experts are available to help you to set up a firewall, deploy secure offsite connectivity to email and data, and install an efficient VPN. If you are interested in an affordable option for outsourcing your network security management, Progent's 24x7 Network Support Services include non-stop remote server monitoring and fast resolution of problems.
  • Data Recovery and Security Forensics
    Progent has skill in recovering networks and devices that have been hacked, are quarantined, or have failed as a result of a security penetration. Progent can show you how to assess the damage caused by the assault, restore normal business operations, and retrieve information lost owing to the attack. Progent's certified engineers can also oversee a comprehensive forensic analysis by going over activity logs and using a variety of advanced forensics techniques. Progent's background with security consulting minimizes your business disruption and allows Progent to propose effective strategies to avoid or mitigate future assaults.
  • Email Security with Spam Filtering, Virus Protection, Content Filtering, and Data Loss Prevention
    Email Guard is Progent's email security platform that incorporates the technology of top data security vendors to deliver web-based management and comprehensive security for your inbound and outbound email. The powerful structure of Email Guard integrates a Cloud Protection Layer with a local gateway device to provide advanced defense against spam, viruses, Denial of Service (DoS) Attacks, DHAs, and other email-based threats. Email Guard's cloud filter acts as a first line of defense and keeps most threats from making it to your network firewall. This decreases your vulnerability to external threats and conserves system bandwidth and storage. Email Guard's on-premises security gateway device adds a further layer of analysis for incoming email. For outgoing email, the on-premises security gateway provides anti-virus and anti-spam protection, protection against data leaks, and email encryption. The onsite security gateway can also help Exchange Server to monitor and safeguard internal email traffic that originates and ends inside your corporate firewall. Learn more about Progent's Email Guard Spam Filtering, Virus Blocking, Email Content Filtering and Data Leakage Protection.
High-value Security Services Offered by Progent
Progent's certified engineers can provide expertise in key facets of network protection including:
  • Security Vulnerability Audits and Compliance Assessment
    Progent offers experience with information risk auditing tools like Microsoft Baseline Security Analyzer and LANguard for conducting a set of comprehensive network tests to identify potential security gaps. Progent has extensive skills with these utilities and can help your company to analyze audit results and respond appropriately. Progent's security consultants also can perform web application testing and can conduct expert assessments of corporate-wide security to determine your company's compliance with major industry security standards including FISMA, PCI, and ISO. Also, Progent can evaluate the strength of your wireless security covering fixed wireless equipment plus mobile devices. Find out more details concerning Progent's Vulnerability Audits and Security Compliance Testing.
  • Security Inventory Packages for Small Companies
    Progent offers two low-cost security inventory service bundles intended to allow small businesses to get an independent network security evaluation from an accredited security consultant. With Progent's External Network Security Inventory Checkup, a security engineer administers an extensive test of your IT infrastructure from outside your company firewall to determine possible risks in the security profile you expose to the outside world. With Progent's Internal Security Inventory Scan, a security expert runs a network scan from a secure computer inside your firewall to evaluate vulnerabilities to internal threats. The two security inventory services are set up and executed from a secured external location. The process is implemented by an engineer who has earned top security credentials who produces a document that details and interprets the data captured by the security scan and suggests cost-effective improvements where appropriate.
  • Security Assessment Packages for Enterprises
    Progent's qualified security engineers can deliver a range of fixed-cost security assessment service bundles created for enterprises who have to meet security levels demanded by state agencies or by vendors. Progent's network security audit bundles offer larger organizations a chance to get an independent look at the strength of their security profile. For each security evaluation package, Progent engineers with high-level security credentials evaluate and summarize collected data and provide suggestions for effective improvements. The different network security audit bundles include an extra-cost option for on-premises security engineers anywhere in the U.S.
  • Migrating from Microsoft Internet Security and Acceleration (ISA) Server 2006 and Forefront Threat Management Gateway
    Microsoft Internet Security and Acceleration (ISA) Server and its replacement Microsoft Forefront TMG are software solutions that contain an application-layer firewall that can protect systems from outside and internal attacks. Both of these platforms provide in-depth examination of Internet protocols to detect exploits that can get by traditional firewalls. Microsoft Internet Security and Acceleration Server was replaced by Forefront TMG, which is built on ISA Server 2006's architecture while providing a number of enhanced features. Forefront TMG has in turn been discontinued by Microsoft, and the security features offered by the platform are now commonly handled by purpose-built hardware devices from companies that include Cisco, Check Point, SonicWALL and WatchGuard. (See ASA Firewall with Firepower Services configuration and management.) Progent provides advanced Forefront Threat Management Gateway support and Microsoft ISA Server 2006 expertise to help you manage and troubleshoot your legacy firewall environment, and Progent can help you to migrate smoothly to a modern security solution by providing system design, integration, tuning, IT staff training and troubleshooting.
  • Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Firewalls, and PIX Security Appliances Configuration and Debugging
    Cisco Certified CCIE Network Security EngineersThe current Cisco ASA 5500-X Series Next-Generation Firewalls with Firepower Services offer significantly more value than Cisco's legacy PIX and ASA 5500 firewalls and have replaced the ASA 5500 and PIX firewalls for new deployments. Following Cisco's purchase of Sourcefire, the entire line of Cisco ASA 5500-X firewalls can be provisioned to support Firepower Services, based on Sourcefire's Snort product, which is the market's most deployed intrusion protection system (IPS). Firepower services provide powerful new capabilities such as advanced malware protection (AMP), URL filtering, real-time threat analytics, and security automation. Progent's Cisco-qualified CCIE network experts can assist you to maintain your existing PIX or ASA 5500 firewalls or migrate to Cisco ASA 5500-X firewalls with Firepower Services. Progent's consultants can provide online and onsite support for ASA 5500-X firewalls with Firepower Services and can assist your business to design, integrate, optimize, administer and troubleshoot firewall solutions built on Cisco ASA 5500-X firewalls with Firepower Services. See more information about Cisco ASA 5500-X Firewalls with Firepower Services integration and troubleshooting services.
  • Additional Firewall and Virtual Private Network (VPN) Technologies
    In addition to supporting a broad range of network security technologies available from Microsoft and Cisco, Progent offers small and mid-size organizations expert support for products from other important firewall and Virtual Private Network (VPN) vendors such as:
  • SIEM Solutions
    Security information and event management (SIEM) software and services are designed to digest the enormous amounts of information collected in security incident logs generated by a wide range of sources including network infrastructure appliances, operating systems, and application software and tools. SIEM applications organizes the security logs from these diverse sources and produces summary reports of security incidents as mandated by government regulations and business compliance guidelines. Progent's GIAC-certified information assurance consultants and Cisco CCIE certified network experts can assist businesses to plan, deploy and manage a SIEM solution that helps them to see the progress of attacks and comply with event reporting regulations. (Visit Progent's Security information and Event Management solutions.)
Progent's Security Accreditations
Progent's security consultants have earned the most prestigious certifications offered in the industry. All of these certifications demand extensive examinations and demonstrated work experience to guarantee that candidates have mastered a significant body of security information and techniques and can offer advanced consulting to computer networks of any complexity.
  • Certified Information Security Manager Security Consulting Expertise
    Certified Information Security Manager defines the core skills and international standards of performance that IT security professionals are expected to master. CISM provides executive management the confidence that consultants who have earned their CISM have the background and skill to offer effective security management and engineering services. Progent can provide a CISM-certified support professional to assist your organization in critical security areas including data security governance, risk management, information protection process control, and crisis response support. Find out the details concerning Progent's Certified Information Security Manager Security Support Assistance.
  • CISSP Security Consulting Expertise
    Progent's Certified Information Systems Security Professionals (CISSPs) are security engineers who have been awarded CISSP certification as a result of demonstrated experience, rigorous study, and exhaustive testing. CISSP Certification recognizes expertise in a worldwide standard for information security. ANSI has granted the CISSP credential accreditation in the area of IT security under ISO/IEC 17024. Areas of expertise covered within CISSP include security administration practices, security design and test systems, access permission methodology, applications development security, operations security, physical security, encryption, telecommunications, Internet security, and disaster recovery planning. Get the details about Progent's CISSP Consulting Services.
  • Information Systems Security Architecture Professionals (ISSAP) Engineering Support
    Progent's ISSAP qualified security consultants are consultants who have been awarded ISSAP accreditation following rigorous testing and extensive hands-on work with information security architecture. ISSAP consultants have comprehensive understanding of access management systems and techniques, phone system and network security, cryptography, needs evaluation, business continuity and disaster recovery, and physical security integration. Progent's ISSAP-certified security consultants can assist your business with all phases of secure network architecture. Learn additional information about Progent's ISSAP Accredited Secure IT Infrastructure Engineering Services.
  • Certified Information Systems Auditor Consulting Expertise
    The Certified Information Systems Auditor credential is a recognized qualification that signifies mastery in network security audit and control. Certified by the American National Standards Institute (ANSI), the CISA credential requires that candidates undergo an extensive test given by the ISACA professional group. Progent can provide the expertise of a CISA-qualified security audit professional trained to help companies in the fields of information systems audit services, IT administration, systems and architecture lifecycle, IT service delivery, safeguarding data resources, and business continuity preparedness. Find out more details concerning Progent's Certified Information Systems Auditor (CISA) Professional Assistance.
  • Global Information Assurance Certification Support Services
    GIAC (Global Information Assurance Certification) was founded in 1999 to certify the knowledge of computer security experts. GIAC's goal is to verify that an accredited professional possesses the skills appropriate to deliver services in critical categories of system, data, and application software security. GIAC accreditations are acknowledged by companies and institutions around the world including and the U.S. National Security Agency. Progent offers the support of GIAC certified security engineers for any of the security capabilities covered within GIAC accreditation topics including assessing IT infrastructure, incident handling, intrusion detection, and web-based services security. Learn more information about Progent's Global Information Assurance Certification Professional Services.
Contact Progent for Network Security Help
If you're trying to find network security engineering help, telephone Progent at 800-993-9400 or visit Contact Progent.

© 2002- 2017 Progent Corporation. All rights reserved.