Overview of Progent's Security and Compliance Support Services
Progent's industry certified network security and compliance professionals can provide a broad range of support services designed to assist companies of any size to detect and correct security weaknesses, defend against attacks, recover from any problems resulting from a breakdown of protection, and comply with government requirements for guarding data and reporting security incidents. Progent can provide a choice of service models:

  • On-demand remote and on-site support invoiced to the nearest minute
  • On-going fully managed services billed at an affordable fixed monthly rate
  • Set-price service bundles for a single security and compliance evaluation
As-needed Security Support Services
Once you register for Progent's services (signing up is free), you can receive as-needed remote or on-premises support from a Progent security and compliance consultant. This classic support model is essentially reactive and optimized for rapidly taking care of technical issues that are affecting your productivity or that are beyond the scope of your own support personnel. Typical scenarios are configuring a firewall appliance or VPN tunnel, implementing a vital security update for a Cisco switch or router, designing secure access to a public cloud, or restoring data after a ransomware assault. These services are invoiced to the nearest minute, which avoids the annoying situation of getting big invoices for fast repairs.

Delivery alternatives for Progent's as-needed support services include:

  • Online Security Services
    The majority security-related issues can be handled remotely through a mix of phone help and an connection between Progent's Technical Response Center (TRC) and a customer's computer. Progent's TRC group can provide remote security help by offering efficient access to consultants who have the background and resources to fix many of the most challenging problems quickly, making your service costs low and reducing downtime.
  • On-premises Security Support
    For instances where onsite assistance is necessary, Progent can dispatch a technical expert to major metropolitan areas across the United States. Progent can also send a security specialist with top certifications and world-class skills to any location in the U.S.
Progent's accredited consultants are qualified to support environments based on Windows, Linux, Mac, Sun, and major versions of UNIX. Progent's broad selection of services addresses firewall configuration, email security, secure system design, and information restoration. Progent's support staff has earned the world's most advanced security certifications including Certified Information Security Manager (CISM) and ISSAP. Progent also offers fast access to remote Cisco-certified CCIE network engineers who can deliver advanced support with tough network configuration issues.

ProSight Low-Cost Managed Services for Information Assurance
Progent's value-priced ProSight portfolio of network monitoring and management services is intended to provide small and mid-size organizations with enterprise-class support and state-of-the-art technology for all aspects of information assurance. ProSight managed services offered by Progent include:

  • ProSight Active Security Monitoring (ASM): Next Generation Endpoint Protection and Ransomware Defense
    Progent's ProSight Active Security Monitoring is an endpoint protection (EPP) service that utilizes next generation behavior-based machine learning technology to defend endpoint devices as well as servers and VMs against modern malware assaults such as ransomware and email phishing, which routinely get by legacy signature-based AV products. ProSight ASM protects local and cloud-based resources and offers a single platform to address the entire malware attack lifecycle including protection, infiltration detection, containment, remediation, and post-attack forensics. Top capabilities include one-click rollback using Windows Volume Shadow Copy Service and real-time network-wide immunization against newly discovered threats. Find out more about Progent's ProSight Active Security Monitoring endpoint protection and ransomware recovery.

  • ProSight Enhanced Security Protection: Unified Physical and Virtual Endpoint Protection
    ProSight Enhanced Security Protection (ESP) services offer ultra-affordable multi-layer protection for physical servers and virtual machines, workstations, smartphones, and Microsoft Exchange. ProSight ESP uses adaptive security and advanced heuristics for round-the-clock monitoring and responding to security threats from all attack vectors. ProSight ESP offers firewall protection, penetration alarms, device control, and web filtering via cutting-edge technologies packaged within one agent accessible from a unified control. Progent's data protection and virtualization consultants can help your business to design and implement a ProSight ESP deployment that meets your company's specific needs and that helps you prove compliance with government and industry information security regulations. Progent will assist you specify and implement policies that ProSight ESP will enforce, and Progent will monitor your IT environment and react to alerts that call for urgent attention. Progent can also assist your company to set up and test a backup and disaster recovery system like ProSight Data Protection Services so you can recover rapidly from a potentially disastrous cyber attack such as ransomware. Find out more about Progent's ProSight Enhanced Security Protection (ESP) unified physical and virtual endpoint security and Microsoft Exchange email filtering.

  • ProSight Data Protection Services: Managed Backup
    ProSight Data Protection Services provide small and medium-sized businesses a low cost and fully managed service for reliable backup/disaster recovery (BDR). Available at a low monthly rate, ProSight DPS automates and monitors your backup processes and allows rapid restoration of critical files, applications and virtual machines that have become unavailable or corrupted due to component failures, software bugs, disasters, human error, or malware attacks such as ransomware. ProSight DPS can help you back up, recover and restore files, folders, apps, system images, plus Hyper-V and VMware images. Important data can be backed up on the cloud, to an on-promises storage device, or mirrored to both. Progent's cloud backup specialists can deliver world-class expertise to set up ProSight Data Protection Services to to comply with regulatory requirements such as HIPPA, FINRA, and PCI and, whenever necessary, can help you to recover your critical data. Read more about ProSight Data Protection Services Managed Backup and Recovery.

  • ProSight Email Guard: Inbound and Outbound Spam Filtering, Data Leakage Protection and Content Filtering
    ProSight Email Guard is Progent's email filtering and encryption solution that uses the services and infrastructure of top data security companies to deliver centralized control and world-class protection for your inbound and outbound email. The hybrid structure of Email Guard managed service combines a Cloud Protection Layer with an on-premises security gateway device to offer advanced protection against spam, viruses, Denial of Service (DoS) Attacks, Directory Harvest Attacks (DHAs), and other email-based threats. Email Guard's cloud filter acts as a preliminary barricade and keeps most unwanted email from making it to your network firewall. This reduces your vulnerability to external attacks and conserves network bandwidth and storage space. Email Guard's on-premises security gateway appliance adds a deeper level of inspection for incoming email. For outbound email, the onsite gateway offers AV and anti-spam filtering, policy-based Data Loss Prevention, and encryption. The on-premises security gateway can also help Exchange Server to monitor and protect internal email that originates and ends inside your security perimeter. Learn more about Progent's ProSight Email Guard spam filtering, virus blocking, email content filtering and data loss protection.

  • ProSight WAN Watch: Infrastructure Management
    ProSight WAN Watch is an infrastructure monitoring and management service that makes it simple and inexpensive for small and mid-sized organizations to map out, monitor, enhance and troubleshoot their networking appliances such as switches, firewalls, and load balancers as well as servers, printers, client computers and other devices. Using state-of-the-art Remote Monitoring and Management technology, WAN Watch makes sure that network diagrams are kept current, copies and displays the configuration information of almost all devices on your network, tracks performance, and generates notices when potential issues are discovered. By automating complex management and troubleshooting activities, ProSight WAN Watch can knock hours off ordinary chores such as network mapping, expanding your network, finding devices that require critical updates, or resolving performance problems. Find out more about ProSight WAN Watch infrastructure management consulting.

  • ProSight LAN Watch: Server and Desktop Monitoring and Management
    ProSight LAN Watch is Progentís server and desktop remote monitoring managed service that incorporates state-of-the-art remote monitoring and management (RMM) technology to help keep your IT system operating efficiently by checking the state of vital computers that drive your information system. When ProSight LAN Watch detects an issue, an alarm is transmitted immediately to your specified IT staff and your assigned Progent consultant so that all potential issues can be addressed before they have a chance to disrupt productivity Find out more details about ProSight LAN Watch server and desktop remote monitoring consulting.

  • ProSight Virtual Hosting: Hosted Virtual Machines at Progent's Tier III Data Center
    With Progent's ProSight Virtual Hosting service, a small or mid-size organization can have its key servers and apps hosted in a protected fault tolerant data center on a fast virtual machine host configured and maintained by Progent's network support professionals. With the ProSight Virtual Hosting service model, the customer owns the data, the operating system software, and the apps. Because the environment is virtualized, it can be ported immediately to a different hardware solution without a lengthy and difficult reinstallation process. With ProSight Virtual Hosting, your business is not locked into a single hosting service. Learn more details about ProSight Virtual Hosting services.

  • ProSight IT Asset Management: Network Documentation Management
    ProSight IT Asset Management service is an IT infrastructure documentation management service that makes it easy to capture, update, find and safeguard information related to your network infrastructure, procedures, business apps, and services. You can quickly locate passwords or serial numbers and be alerted about upcoming expirations of SSLs ,domains or warranties. By updating and managing your IT infrastructure documentation, you can save as much as 50% of time wasted searching for critical information about your network. ProSight IT Asset Management features a common location for storing and collaborating on all documents related to managing your business network such as standard operating procedures (SOPs) and How-To's. ProSight IT Asset Management also supports a high level of automation for gathering and relating IT information. Whether youíre planning improvements, doing regular maintenance, or reacting to an emergency, ProSight IT Asset Management delivers the data you need the instant you need it. Learn more details about ProSight IT Asset Management service.
ProSight Network Audits
Progent's ProSight Network Audits are a quick and low-cost alternative for small and mid-size businesses to get an unbiased assessment of the overall health of their network. Based on a selection of the leading remote monitoring and management platforms in the industry, and supervised by Progent's certified group of information technology experts, ProSight Network Audits show you how well the deployment of your essential network assets conform to leading practices. The Basic and Advanced versions of ProSight Network Audit services are available at a low, one-time cost and provide immediate ROI such as a more manageable Active Directory (AD) environment. Both also include one year of state-of-the-art remote network monitoring and management (RMM). Advantages can include easier network management, better compliance with government and industry security regulations, higher utilization of network assets, faster problem resolution, more reliable backup and restore, and less downtime. See more information about Progent's ProSight Network Audits IT infrastructure assessment.

The ProSight Ransomware Preparedness Report Service
Progent's ProSight Ransomware Preparedness Report service is an affordable service built around a brief phone discussion with a Progent information assurance expert. The fact-finding interview is intended to help assess your organization's preparedness either to block or recover quickly after a ransomware incident. Progent will consult with you personally to collect information concerning your current antivirus tools and backup/recovery platform, and Progent will then produce a custom Basic Security and Best Practices Report describing how you can follow best practices to create a cost-effective AV and backup environment that meets your business needs. For additional information, see The ProSight Ransomware Preparedness Report Service.

Fixed-price Security Evaluation and Validation Bundles
Progent has put together a selection of set-price security and compliance assessment bundles that provide exceptional value by utilizing Progent's enterprise-class system monitoring software plus Progent's consulting experience to create an objective and thorough assessment of your IT environment security posture.

  • Security Assessment Service Packages for Small Organizations
    Progent offers two ultra-affordable security inventory packages designed to enable small organizations to get an objective security evaluation from an accredited security engineer. With Progent's External Security Inventory Scan, a consultant administers an extensive assessment of your IT system from outside your firewalled perimeter to identify possible risks in the security profile you present to the outside. With Progent's Internal Security Inventory Scan, a security consultant runs a system scan using an authorized machine inside your company firewall to assess your vulnerability to internal threats. The two security inventory scans are set up and executed from a secured external site. The project is administered by an engineer who has earned high-level security certifications and who produces a document that details and evaluates the data collected by the security scan and recommend various enhancements where appropriate.
  • Security Vulnerability Evaluation Packages for Large Organizations
    Progent has developed three levels of fixed-price security assessment service bundles designed for large organizations who want to meet compliance standards required by government or industry agencies. Progent's security evaluation service packages offer enterprises an opportunity to get an objective look at the strength of their security posture. For every security assessment package, Progent consultants with top security credentials study and report on captured data and provide recommendations for cost-effective improvements. Each of the network security audit bundles include an extra-cost option for onsite consultants anywhere in the United States.
  • Stealth Penetration Testing Services
    Stealth penetration testing, often referred to as PEN testing, is an accepted tool for allowing businesses to determine how vulnerable their network systems are to modern attacks. Progent's stealth penetration testing check how well your corporate security procedures and platforms stand up to authorized but unannounced intrusion attempts launched by Progent's veteran security specialists using cutting-edge hacking methods. Find out about Progent's stealth penetration testing services.
Our Network Has Been Hacked: What Should We Do Now?
Network Security ConsultantsIf your company is currently faced with a security crisis and you do not have a detailed recovery plan, visit Progent's Online Technical Support to see how to receive fast assistance. Progent offers online help from skilled engineers and can refer trouble tickets to certified security specialists if required. Your organization does not need to be a registered Progent customer to receive emergency support for a security breach, but you can register as a Progent client ahead of time at no cost and your standing as a current client can save precious time when there is an emergency.

Typically, smaller organizations have no response procedure in the event of a damaging penetration. This is risky, since the damage from a serious security attack can be more devastating for a small business than for a big enterprise. Progent's security specialists can assist your business to design a sensible recovery and event reporting procedure that minimizes the IT system disruption resulting from an attack. The formal post-attack handling procedure outlined by Global Information Assurance Certification is Progent's preferred procedure for responding to a major security attack.

Advanced Security Services Available from Progent
Progent's security consultants offer advanced support in vital facets of IT compliance such as:

  • Security Vulnerability Audits and Security Compliance Testing
    Progent provides experience with security evaluation utilities such as Microsoft Baseline Security Analyzer and LANguard for performing a set of automatic network scans to identify possible security gaps. Progent has broad experience with these and similar tools and can assist your company to analyze audit reports and react efficiently. Progent's security consultants also offer web application validation and can perform expert evaluation of enterprise-wide security to verify your company's compliance with important industry security standards such as FISMA, PCI, and ISO 17799. In addition, Progent can assess the effectiveness of your wireless protection including fixed wireless equipment as well as portable handsets. Learn additional details concerning Progent's Vulnerability Evaluation and Compliance Testing.
  • Designing, Building, and Testing Secure Networks
    Any business should have a carefully thought out security strategy that includes both proactive and reactive activity. The pre-attack strategy is a collection of steps that helps to minimize vulnerabilities. The reactive plan defines procedures to help security personnel to inventory the damage resulting from an attack, repair the damage, document the experience, and restore network activity as soon as feasible. Progent can advise you how to design security into your company operations, install scanning utilities, create and execute a safe IT architecture, and recommend procedures and policies to maximize the safety of your information system. Progent's security professionals are available to assist you to configure a firewall, deploy secure remote access to e-mail and data, and install an efficient virtual private network. If you are interested in an affordable way for outsourcing your network security administration, Progent's 24x7 Monitoring Packages feature non-stop remote server monitoring and immediate resolution of emergencies.
  • System Restoration and Security Forensics
    Progent provides expertise in recovering systems and devices that have been hacked, are quarantined, or have ceased to function because of a security breakdown. Progent can help assess the losses resulting from the breach, return your company to normal business operations, and retrieve data lost owing to the assault. Progent's certified engineers can also oversee a comprehensive forensic analysis by examining event logs and utilizing other advanced forensics tools. Progent's background with security problems reduces your off-air time and permits Progent to recommend effective measures to prevent or contain new assaults.
  • Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Firewalls, and PIX Security Appliances Configuration and Troubleshooting
    Cisco Certified CCIE Security SpecialistsThe new Cisco ASA 5500-X Family of firewalls with Firepower Services deliver significantly more bang for the buck than Cisco's earlier PIX and ASA 5500 firewalls and have superseded the ASA 5500 and PIX 500 firewalls for new deployments. Since Cisco's purchase of Sourcefire, the entire line of Cisco ASA 5500-X firewalls can be provisioned to enable Firepower Services, based on Sourcefire's Snort product, which is the market's most popular network intrusion protection system. Firepower services provide powerful new capabilities including advanced malware protection (AMP), URL filtering, dynamic threat analytics, and security automation. Progent's Cisco-certified CCIE network experts can assist your company to maintain your legacy PIX or ASA 5500 security appliances or upgrade to ASA 5500-X firewalls with Firepower Services. Progent's consultants offer online and on-premises help with ASA 5500-X firewalls with Firepower Services and can help your business to plan, deploy, optimize, administer and debug firewall environments built around Cisco ASA 5500-X firewalls with Firepower Services. Find out more information about Cisco ASA 5500-X Firewalls with Firepower configuration and debugging support.
  • Additional Firewall and Virtual Private Network Technologies
    In addition to supporting a wide array of security solutions available from Microsoft and Cisco, Progent can provide small companies top-level consulting for products from other popular firewall and VPN suppliers including:
  • SIEM Security Information and Event Management Solutions
    Security information and event management (SIEM) software and services are designed to digest the massive amounts of information represented by security event records created by multiple sources including network infrastructure appliances, operating systems, and application software and tools. SIEM software organizes the security logs from these diverse sources and produces consolidated reports of security incidents as mandated by government regulations and industry compliance guidelines. Progent's GIAC-certified network security experts and Cisco-certified network infrastructure experts can assist businesses to plan, deploy and operate a SIEM solution that enables them to understand the progress of attacks and comply with security incident reporting regulations. (See Progent's Security information and Event Management solutions.)
Progent's Security Certifications
Progent's security engineers have earned some of the most prestigious certifications offered in the industry. All of these accreditations demand extensive testing and proven field experience to ensure that recipients have mastered a significant amount of security knowledge and techniques and can provide high-level security solutions to information networks of any size.
  • Certified Information Security Manager (CISM) Security Support Services
    Certified Information Security Manager defines the fundamental skills and worldwide benchmarks of performance that information security managers are expected to achieve. It provides executive management the confidence that those who have been awarded their CISM have the background and knowledge to provide efficient security management and engineering services. Progent can offer a CISM-certified support professional to help your organization in key security areas such as information protection governance, risk assessment, data protection process management, and crisis handling support. Get more details about Progent's CISM Security Support Expertise.

  • Certified Information Systems Security Professionals (CISSP) Security Support Expertise
    Progent's CISSP experts are security engineers who have been awarded CISSP accreditation as a result of demonstrated experience, rigorous study, and formal examination. CISSP Certification indicates mastery of an international standard for IT security. American National Standards Institute has given the CISSP credential official recognition in the field of information security under ISO/IEC 17024. Areas of knowledge covered within CISSP include security administration practices, security design and models, access permission methodology, applications development security, operations security, hardware security, cryptography, telecommunications, network security, and disaster recovery planning. Learn additional information concerning Progent's Certified Information Systems Security Professionals (CISSP) Consulting Services.

  • CISSP-ISSAP} Security Architecture Consulting Support Services
    Progent's CISSP-ISSAP certified cybersecurity architecture consultants have been awarded ISSAP certification following rigorous testing and substantial experience. field experience with information security design. ISSAP consultants possess comprehensive understanding of access management systems and methodologies, phone system and network protection, cryptography, needs evaluation, business continuity and disaster recovery planning (DRP), and physical security. Progent's CISSP-ISSAP-qualified security experts can help your company with all phases of architecture security. Find out more information concerning Progent's ISSAP Accredited Secure IT Infrastructure Consulting Services.

  • Certified Information Systems Auditor Consulting Services
    The Certified Information Systems Auditor credential is a globally recognized qualification that represents mastery in network security auditing. Accredited by ANSI, the CISA accreditation has consultants pass an exhaustive test administered by the ISACA international professional group. Progent can provide the expertise of a CISA-certified security professional able to assist businesses in the fields of information systems audit services, information technology administration, systems and architecture planned useful life, IT service delivery, safeguarding information assets, and business continuity preparedness. Get additional details concerning Progent's Certified Information Systems Auditor Consulting Services.

  • CRISC IT Risk Management Experts
    The CRISC certification program was initiated by ISACA in 2010 to validate a consultant's skills to plan, implement, and maintain IS controls to reduce risk. Progent can provide the services of a CRISC-certified engineer to help your company to create and carry out a workplace continuity plan based on industry best practices identified by CRISC and crafted to align with your organization's risk tolerance, business goals, and budgetary guidelines. Progent's risk mitigation expertise is a good fit the support available from Progent's CISA-certified consultants for objectively evaluating your IT management design and with the expertise of Progent's CISM consultants for defining company-wide security policies. Learn more details concerning Progent's CRISC-certified IT Risk Management Services.

  • GIAC (Global Information Assurance Certification) Consulting Expertise
    GIAC (Global Information Assurance Certification) was established in 1999 to certify the skill of information technology security engineers. GIAC's goal is to verify that an accredited professional has the knowledge necessary to provide support in important areas of network, information, and application program security. GIAC accreditations are recognized by companies and government organizations around the world including and the U.S. National Security Agency (NSA). Progent offers the support of certified consultants for any of the security disciplines covered within GIAC accreditation programs such as auditing IT infrastructure, incident response, intrusion detection, and web application security. Get more information about Progent's GIAC Support Services.
Contact Progent for Network Security Help
If you need security consulting, phone Progent at 800-993-9400 or see Contact Progent.
















© 2002- 2019 Progent Corporation. All rights reserved.