Introduction to Progent's Security Consulting Services
Progent's industry certified network security professionals offer a broad selection of professional services intended to assist businesses of all sizes to identify and correct security vulnerabilities, defend against attacks, remediate any issues caused by a breach of security, and comply with government requirements for reporting incidents. Progent delivers online and in person support and also offers highly affordable fixed-cost security assessment packages to supplement Progent's regular by-the-minute pricing.

Support services delivery options offered by Progent include:

  • Remote Security Support Services
    Typical security issues can be resolved online via a combination of phone-based assistance and secure data access between Progent's Technical Response Center and the client's computer system. Progent's TRC service team includes security professionals with the background and tools to solve some of the most intractable problems quickly, making your service expenses reasonable and reducing downtime. Progent provides security help on a per-minute basis with no minimum charges for online support. Progent's billing structure avoids scenarios where quick solutions turn into major expenses. Progent also has available a number of fixed-price remote security and compliance evaluation packages that represent exceptional value by utilizing Progent's advanced network scanning software plus Progent's consulting expertise to produce an objective and thorough picture of your network vulnerability.

  • Onsite Security Services
    For cases where in-person support is needed, Progent can send a service professional to major cities throughout the U.S. Progent's security consultants are also available to help with jobs that require world-class security experts to be on site anywhere in the U.S., and Progent's most comprehensive security assessment packages for large businesses include the services of several certified security engineers on site.

  • Urgent Security Services
    To get urgent help with computer security issues, your company can get in touch with a seasoned online troubleshooting expert from Progent's roster of certified security professionals available at Progent's Technical Response Center. Progent's urgent online security support consultants are ready to offer fast and affordable assistance with security emergencies that threaten the productivity of your information system. Progent's accredited security consultants are certified to support systems based on Windows, Linux, Apple Mac, Solaris, and major derivatives of UNIX. Progent's wide array of services encompasses firewall technology, e-mail security, protected network architecture, and information recovery. Progent's technical support staff has earned the world's top security certifications including Certified Information Systems Auditor and ISSAP. Progent also can provide immediate access to remote Cisco CCIE network engineers who can provide advanced support with complex network technology problems.

Our System Has Been Hacked: What Should We Do Now?
Network Security ConsultantsIf you are now experiencing a network security crisis and you do not have a detailed response plan, refer to Progent's Online Network Support to see how to get immediate help. Progent provides online assistance from skilled network technicians and can refer trouble tickets to certified security experts if necessary. Your organization does not have to be a current Progent customer to get emergency help for a security breach, but you can sign up as a Progent client in advance for free and your status as a registered customer can save valuable time in case of a crisis.

Usually, smaller companies do not have a recovery plan in the event of a successful attack. This is risky, since the damage from a serious security assault can be more catastrophic for a small company than for a large corporation. Progent's security engineers can assist your you to create a practical response and incident reporting procedure that minimizes the network disruption resulting from a security breach. The formal incident handling model outlined by GIAC (Global Information Assurance Certification) is Progent's suggested procedure for handling a serious security penetration.

Areas of Progent's Security Expertise
Coordinating computer protection and planning for restoring critical data and systems after an attack demands an on-going effort involving an array of tools and procedures. Progent's security experts can support your business at all levels in your efforts to guard your IT system and remain in compliance, Services range from security evaluation to creating a comprehensive security plan. Important technologies covered by Progent's experts include Security Planning and Implementation, Data Restoration and Security Failure Analysis, plus Outsourced Protection from E-mail-Borne Spam and Viruses.

  • Designing, Building, and Testing Secure Environments
    Every business ought to have a carefully thought out security plan that incorporates both proactive and reactive elements. The pre-attack strategy is a collection of precautions that helps to reduce vulnerabilities. The post-attack strategy specifies activities to assist IT staff to assess the losses caused by a breach, repair the damage, document the event, and restore business functions as quickly as possible. Progent can advise you how to design security into your company operations, install auditing utilities, define and implement a secure network infrastructure, and propose processes and policies to optimize the protection of your network. Progent's security experts are available to assist you to configure a firewall, deploy protected offsite connectivity to e-mail and data, and install an effective virtual private network (VPN). If you are looking for an economical option for outsourcing your security administration, Progent's Round-the-clock Monitoring Services feature continual online network monitoring and quick response to emergencies.
  • System Recovery and Security Forensics
    Progent offers expertise in recovering systems and computers that have been compromised, are suspect, or have failed following a security attack. Progent can help determine the damage caused by the breach, return your company to normal functions, and retrieve data compromised owing to the attack. Progent's certified specialists can also perform a comprehensive forensic evaluation by going over activity logs and utilizing a variety of advanced forensics techniques. Progent's background with security problems reduces your downtime and allows Progent to propose effective ways to avoid or mitigate new assaults.
  • Email Security with Spam Filtering, Virus Defense, Content Filtering, and Data Leakage Prevention
    Email Guard is Progent's email filtering and encryption platform that uses the services and infrastructure of top information security vendors to deliver web-based management and world-class security for your inbound and outbound email. The powerful structure of Email Guard managed service combines cloud-based filtering with an on-premises security gateway device to offer advanced protection against spam, viruses, Denial of Service Attacks, Directory Harvest Attacks (DHAs), and other email-borne threats. Email Guard's Cloud Protection Layer acts as a first line of defense and blocks the vast majority of unwanted email from making it to your security perimeter. This reduces your vulnerability to inbound attacks and saves network bandwidth and storage. Email Guard's on-premises gateway device provides a further level of inspection for incoming email. For outbound email, the onsite security gateway provides anti-virus and anti-spam filtering, DLP, and email encryption. The local gateway can also help Exchange Server to monitor and safeguard internal email that originates and ends inside your corporate firewall. Learn more about Progent's Email Guard Spam Filtering, Virus Defense, Email Content Filtering and Data Loss Prevention.
Advanced Security Services Offered by Progent
Progent's veteran consultants offer specialized help in key areas of network protection including:
  • Information Risk Audits and Compliance Assessment
    Progent offers expertise with security auditing utilities like MS Baseline Security Analyzer and LANguard from GFI for conducting a variety of automatic system scans to reveal possible security gaps. Progent has broad skills with these tools and can assist your company to analyze audit results and respond appropriately. Progent's certified security consultants also provide web application validation and can conduct expert assessments of enterprise-wide security to determine your company's compliance with key global security specifications such as HIPAA, NIST, and ISO 17799. Also, Progent can assess the effectiveness of your wireless protection covering stationary wireless appliances plus mobile handsets. Find out the details about Progent's Security Vulnerability Audits and Security Compliance Testing.
  • Security Inventory Bundles for Small Companies
    Progent offers two ultra-affordable security inventory scanning packages intended to allow small businesses to get a professional security evaluation from a qualified security consultant. With Progent's External Security Inventory Scan, a security expert runs an extensive test of your IT infrastructure from beyond your company firewall to uncover potential risks in the security posture you expose to the public. With Progent's Internal Security Inventory Scan, a security engineer runs a system scan from a secure computer within your company firewall to uncover the risk to internal assaults. The two security inventory services are set up and executed from a secured remote site. The process is managed by a consultant who has earned top security accreditations who produces a document that summarizes and analyzes the data captured by the scan and suggests cost-effective improvements where call for.
  • Security Assessment Bundles for Enterprises
    Progent's certified security engineers can provide a selection of fixed-cost security assessment service packages designed for institutions who have to meet security standards demanded by government regulators or by customers. Progent's network security audit service packages offer larger businesses a chance to get an independent look at the quality of their protection environment. For every security assessment package, Progent engineers with top security credentials analyze and report on scanned data and provide recommendations for effective improvements. The various security evaluation bundles feature an extra-cost alternative for onsite engineers anywhere in the U.S.
  • Migrating from ISA Server 2006 and Forefront TMG
    ISA Server 2006 and the newer Forefront TMG 2010 are software platforms that include an application-layer firewall able to defend systems from outside and inside threats. Both of these products perform deep examination of network protocols to detect threats that can get by early-generation firewalls. ISA Server 2006 was replaced by Microsoft Forefront TMG, which is built on ISA Server's technology while providing a number of improved capabilities. Forefront TMG has in turn been retired by Microsoft, and the security features offered by the product are now typically handled by purpose-built hardware appliances from companies that include Cisco, Barracuda, SonicWALL and WatchGuard. (See ASA Firewall with Firepower Services integration and management.) Progent offers advanced Forefront TMG 2010 support and ISA Server 2006 consulting services to help you manage and troubleshoot your older firewalls, and Progent can help you to upgrade smoothly to a modern security solution by providing system design, integration, optimization, training and debugging.
  • Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Series Firewalls, and PIX Firewalls Configuration and Debugging
    Cisco Certified CCIE Network Security ExpertsThe current ASA 5500-X Family Next-Generation Firewalls with Firepower Services provide significantly more performance than Cisco's previous firewalls and have replaced the ASA 5500 and PIX 500 firewalls for all new installations. Following Cisco's purchase of Sourcefire, the entire family of ASA 5500-X firewalls can be provisioned to enable Firepower Services, built on Sourcefire's Snort product, which is the market's most popular intrusion protection system (IPS). Firepower services bring powerful new capabilities including advanced malware protection (AMP), URL filtering, dynamic threat analytics, and automation. Progent's Cisco-certified CCIE network consultants can help your company to maintain your existing PIX or ASA 5500 security appliances and migrate to Cisco ASA 5500-X firewalls with Firepower Services. Progent's consultants offer online and on-premises help with ASA 5500-X firewalls with Firepower Services and can help you to design, configure, tune, administer and debug firewall environments based around Cisco ASA 5500-X firewalls with Firepower Services. Learn additional details about Cisco ASA Firewalls with Firepower configuration and troubleshooting services.
  • Other Firewall and VPN Consulting Services
    As well as supporting a wide range of protection solutions available from Microsoft and Cisco, Progent offers small and mid-size companies top-level support for products from other major firewall and VPN vendors such as:
  • SIEM Security Information and Event Management Solutions
    Security information and event management (SIEM) applications and services are intended to interpret the massive amounts of information represented by security incident logs generated by multiple sources including network infrastructure appliances, servers, and applications and monitoring tools. SIEM software analyzes the security event records from these diverse sources and creates consolidated reports of security incidents as mandated by government regulations and industry compliance guidelines. Progent's GIAC-certified computer security experts and Cisco-certified network infrastructure consultants can assist businesses to design, install and manage a SIEM system that helps them to see the behavior of security incidents and comply with event reporting requirements. (See Progent's Security information and Event Management (SIEM) solutions.)
Progent's Security Certifications
Progent's security engineers have been awarded some of the most prestigious accreditations available in the security industry. These accreditations require extensive testing and proven work background to guarantee that candidates have acquired expertise with a substantial body of security knowledge and techniques and can offer high-level solutions to information networks of any size.
  • Certified Information Security Manager Security Consulting Expertise
    CISM defines the fundamental competencies and worldwide standards of service that IT security managers are expected to master. It offers executive management the assurance that consultants who have earned their accreditation have the background and skill to offer efficient security management and engineering support. Progent can offer a CISM-certified expert to help your organization in vital security areas such as information security governance, vulnerability management, data security process control, and incident handling management. Get additional details about Progent's Certified Information Security Manager Security Support Services.
  • Certified Information Systems Security Professionals (CISSP) Security Consulting Expertise
    Progent's CISSP consultants are security engineers who have been awarded CISSP certification through demonstrated experience, rigorous study, and formal examination. CISSP Certification indicates mastery of a worldwide standard for IT security. American National Standards Institute has given the CISSP status official recognition in the field of information security under ISO/IEC 17024. Fields of expertise covered within CISSP include security management practices, security architecture and models, connection control systems, software development security, business processes security, hardware security, encryption, telecommunications, network security, and disaster recovery planning. Read additional details concerning Progent's Certified Information Systems Security Professionals (CISSP) Support Assistance.
  • Information Systems Security Architecture Professionals (ISSAP) Engineering Support
    Progent's ISSAP qualified security experts are consultants who have earned ISSAP accreditation as a result of thorough testing and substantial hands-on work with network security architecture. ISSAP consultants possess comprehensive knowledge of access control systems and techniques, telecommunications and network protection, cryptography, requirements analysis, BCP and disaster recovery, and physical security integration. Progent's ISSAP-certified security specialists can assist your business with all aspects of architecture security. Find out the details concerning Progent's ISSAP Accredited Protected IT Architecture Engineering Assistance.
  • Certified Information Systems Auditor Consulting Services
    The Certified Information Systems Auditor accreditation is a globally recognized qualification that indicates mastery in IS security audit and control. Certified by the American National Standards Institute (ANSI), the CISA accreditation requires that consultants pass an exhaustive examination administered by the ISACA international professional association. Progent offers the services of a CISA-certified security audit professional trained to assist companies in the fields of IS audit process, IT administration, systems and infrastructure planned useful life, information technology service delivery, safeguarding data resources, and disaster recovery planning. Learn the details concerning Progent's Certified Information Systems Auditor Support Assistance.
  • GIAC Professional Services
    Global Information Assurance Certification was established in 1999 to validate the skill of IT security experts. GIAC's goal is to assure that an accredited security consultant possesses the knowledge needed to provide services in key categories of network, information, and application security. GIAC certifications are acknowledged by companies and government organizations all over the world including and the U.S. National Security Agency (NSA). Progent can provide the support of certified consultants for any of the network security capabilities covered within GIAC accreditation topics including assessing perimeters, security incident handling, intrusion detection, and web services security. Find out additional details about Progent's Global Information Assurance Certification Professional Assistance.
Get in Touch with Progent for Network Security Expertise
If you need security support services, phone Progent at 800-993-9400 or see Contact Progent.
















© 2002- 2017 Progent Corporation. All rights reserved.