Data Security and Compliance
For IT Networks:
Security and Compliance Consulting and Support
Overview of Progent's Security Support Services
Progent's certified computer security experts offer a wide range of professional services intended to help organizations of all sizes to identify and eliminate security vulnerabilities, defend against assaults, recover from the issues resulting from a breach of protection, and meet government requirements for reporting security incidents. Progent delivers online and in person support and also has developed economical fixed-cost security evaluation bundles to supplement Progent's standard time-based billing.
Support services delivery alternatives available from Progent include:
- On-line Security Support Services
Most security problems can be resolved remotely via a combination of telephone assistance and remote Internet connections between Progent's Technical Response Center (TRC) and a customer's computer system. Progent's TRC support team includes security engineers who have the knowledge and experience and technical resources to fix even the most intractable problems quickly, making your support expenses reasonable and minimizing downtime. Progent provides security support services on a per-minute model without minimum billing for online support. Progent's billing structure avoids situations where quick fixes result in major bills. Progent also has available a number of fixed-price online security and compliance evaluation packages that provide exceptional value by utilizing Progent's sophisticated security monitoring software and Progent's engineering experience to produce a professional and thorough analysis of your information system vulnerability.
- On-premises Security Services
In cases where on-site support is required, Progent can send a field service professional to major cities throughout the United States Progent's security consultants are also available to help with projects that require high-level security specialists to be on premises anywhere in the United States, and Progent's most comprehensive security evaluation packages for enterprises feature the services of a team of qualified security experts on site.
- Urgent Security Support Services
For urgent help with critical computer security issues, your business can get in touch with a seasoned online support specialist by contacting Progent's team of certified security professionals at Progent's Technical Response Center. Progent's emergency remote security service consultants are available to offer efficient and low-cost assistance with security crises that are impacting the productivity of your IT network. Progent's accredited security consultants are qualified to support systems based on Microsoft, Linux, Apple, Sun Solaris, and major versions of UNIX. Progent's broad array of consulting services encompasses firewall configuration, email security, protected network design, and data restoration. Progent's technical support staff has earned the industry's most advanced security accreditations including CISA and ISSAP. Progent also offers immediate access to remote Cisco CCIE network infrastructure consultants who can deliver world-class support with complex network technology problems.
Our Network Has Been Hacked: What Should We Do Now?
If your company is now experiencing a security crisis and you do not have a formal response procedure, go to Progent's Remote Network Support to learn how to get immediate help. Progent offers remote help from skilled network technicians and can refer problems to high-level security experts if required. Your business does not have to be a current Progent client to get urgent help for a security breakdown, but you can sign up as a Progent customer ahead of time at no cost and your standing as a current customer can save precious time when there is a crisis.
Usually, smaller companies have not documented a recovery procedure in the event of a successful security breach. This is risky, because the cost of a successful security assault can be more devastating for a small company than for a big enterprise. Progent's security engineers can help your you to design a sensible recovery and incident reporting plan that minimizes the IT system disruption following a security breach. The step-by-step incident handling procedure outlined by Global Information Assurance Certification is Progent's recommended procedure for reacting to a major security incident.
Areas of Progent's Security Expertise
Managing network security and preparedness for recovering vital data and functions following a security breach requires a continual program that entails a variety of tools and processes. Progent's security engineers can assist your business at whatever level in your efforts to protect your IT network and remain in compliance, Progent's services range from security assessments to creating a comprehensive security program. Important technologies covered by Progent's experts include Security Planning and Implementation, Data Restoration and Security Failure Analysis, plus Managed Filtering of Email-Based Threats.
Advanced Security Expertise Offered by Progent
- Planning, Implementing, and Testing Secure Networks
Every organization should have a carefully thought out security strategy that incorporates both proactive and reactive activity. The proactive plan is a collection of steps that works to minimize vulnerabilities. The reactive strategy defines procedures to help IT personnel to inventory the losses caused by an attack, remediate the damage, document the event, and revive business activity as soon as feasible. Progent can advise you how to design protection into your business operations, set up scanning utilities, create and build a secure network architecture, and propose procedures and policies that will enhance the protection of your network. Progent's security professionals are available to assist you to set up a firewall, design protected offsite access to email and data, and install an effective virtual private network. If you are looking for an economical option for jobbing out your security management, Progent's 24x7 Monitoring Options feature non-stop online system tracking and quick resolution of problems.
- System Restoration and Failure Analysis
Progent provides expertise in restoring networks and servers that have been compromised, are quarantined, or have ceased to function as a result of a security breakdown. Progent can help assess the losses resulting from the breach, restore normal business operations, and recover information compromised owing to the attack. Progent's certified specialists can also oversee a thorough failure analysis by going over event logs and using a variety of proven forensics tools. Progent's background with security issues reduces your downtime and permits Progent to recommend efficient strategies to avoid or contain new attacks.
- Email Security with Spam Filtering, Virus Protection, Content Filtering, and Data Loss Protection
Email Guard is Progent's email filtering and encryption platform that uses the technology of top information security companies to deliver web-based management and comprehensive protection for your inbound and outbound email. The hybrid structure of Progent's Email Guard managed service combines cloud-based filtering with a local gateway device to provide complete defense against spam, viruses, Denial of Service Attacks, Directory Harvest Attacks, and other email-borne malware. The Cloud Protection Layer acts as a preliminary barricade and keeps the vast majority of threats from reaching your security perimeter. This decreases your exposure to external attacks and conserves network bandwidth and storage. Email Guard's onsite gateway appliance adds a deeper layer of inspection for incoming email. For outbound email, the on-premises gateway offers AV and anti-spam filtering, policy-based Data Loss Prevention, and encryption. The on-premises security gateway can also assist Microsoft Exchange Server to monitor and safeguard internal email traffic that stays inside your security perimeter. Learn more about Progent's Email Guard Spam Filtering, Virus Defense, Content Filtering and Data Loss Prevention.
Progent's seasoned consultants offer expertise in vital areas of IT compliance such as:
Progent's Security Certifications
- Information Risk Audits and Security Compliance Testing
Progent provides experience with information risk auditing software such as Microsoft Baseline Security Analyzer and LANguard from GFI for conducting a set of automatic network scans to uncover possible security problems. Progent has extensive experience with scanning tools and can help you to understand assessment reports and react appropriately. Progent's security engineers also offer web application validation and can conduct thorough evaluation of corporate-wide security to verify your organization's compliance with major global security standards such as FISMA, PCI, and ISO 17799. Also, Progent can assess the effectiveness of your wireless security covering stationary wireless appliances as well as portable devices. Learn the details concerning Progent's Vulnerability Audits and Compliance Testing.
- Security Inventory and Evaluation Packages for Small Companies
Progent offers two low-cost security inventory service packages designed to enable small businesses to get an impartial network security evaluation from an accredited security expert. With Progent's External Network Security Inventory Scan, a security expert administers an extensive examination of your network from beyond your firewalled perimeter to determine possible risks in the security posture you present to the public. With Progent's Internal Network Security Inventory Scan, a security expert runs a system scan from an authorized machine inside your company firewall to uncover vulnerabilities to inside attacks. The two security inventory services are configured and run from a secured remote location. The process is managed by a consultant with high-level security accreditations who generates a report that details and analyzes the data captured by the scan and proposes cost-effective remediation if call for.
- Security Vulnerability Evaluation Packages for Enterprises
Progent's certified security engineers can deliver a range of fixed-cost security audit packages designed for corporations who have to meet security standards demanded by state regulators or by vendors. Progent's network security evaluation bundles offer larger businesses a chance to receive an objective opinion about the quality of their security profile. For each security evaluation bundle, Progent consultants with high-level security accreditations analyze and summarize collected information and provide recommendations for effective remediation. The different network security evaluation packages feature an added-cost alternative for onsite security engineers United States.
- Upgrading from Microsoft ISA Server 2006 and Microsoft Forefront TMG 2010
Microsoft ISA Server and the newer Microsoft Forefront Threat Management Gateway are software solutions that contain an application-layer firewall able to defend systems from outside and internal threats. The two platforms provide in-depth inspection of Internet protocols to uncover attacks that can elude early-generation firewalls. ISA Server 2006 was replaced by Microsoft Forefront Threat Management Gateway, which is based on ISA Server's technology while delivering a number of enhanced capabilities. Forefront TMG 2010 has been discontinued by Microsoft, and the security functions provided by the product are now commonly handled by dedicated hardware devices from vendors that include Cisco, Check Point, Juniper and WatchGuard. (See Cisco ASA Firewall with Firepower Services integration and support.) Progent offers advanced Forefront Threat Management Gateway support and Microsoft ISA Server 2006 consulting services to help you manage and troubleshoot your legacy firewalls, and Progent can help your organization to upgrade smoothly to a more current firewall platform by providing planning, configuration, optimization, training and troubleshooting.
- Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Series Firewalls, and PIX Firewalls Configuration and Debugging
The new Cisco ASA 5500-X Family of firewalls with Firepower Services deliver significantly more performance than Cisco's previous PIX and ASA 5500 firewalls and have replaced the ASA 5500 and PIX security appliances for all new installations. After Cisco's purchase of Sourcefire, the whole family of ASA 5500-X devices can be configured to support Firepower Services, based on Sourcefire's Snort technology, which is the world's most deployed network intrusion protection system (IPS). Firepower services provide powerful new features such as advanced malware protection (AMP), URL filtering, dynamic threat analytics, and automation. Progent's Cisco-certified CCIE network experts can help you to maintain your legacy PIX or ASA 5500 firewalls or upgrade efficiently to ASA 5500-X firewalls with Firepower Services. Progent's consultants offer online and onsite help with ASA 5500-X firewalls with Firepower Services and can help your organization to plan, configure, optimize, manage and debug firewall solutions based on Cisco ASA 5500-X firewalls with Firepower Services. Find out additional information about ASA Firewalls with Firepower configuration and debugging support.
- Additional Firewall and Virtual Private Network (VPN) Solutions
In addition to supporting a wide range of security solutions from Microsoft and Cisco, Progent can provide small and mid-size companies top-level consulting for products from other popular firewall and Virtual Private Network (VPN) vendors such as:
- SIEM Security Information and Event Management Integration and Support
Security information and event management (SIEM) software and services are designed to digest the massive quantity of data represented by security incident logs generated by multiple sources including network appliances, servers, and application software and monitoring tools. SIEM applications analyzes the security event records from these various sources and creates summary reports of security incidents as required by state regulations and industry compliance guidelines. Progent's GIAC-certified computer security experts and Cisco-certified network experts can assist organizations to plan, install and manage a SIEM solution that enables them to see the progress of attacks and comply with security incident reporting regulations. (Visit Progent's SIEM solutions.)
Progent's security engineers have earned the most respected certifications offered in the industry. These accreditations demand exhaustive testing and proven field background to guarantee that recipients have mastered a significant amount of security information and methodologies and can provide advanced solutions to computer networks of any size.
Depend on Progent for Network Security Help
- CISM Security Consulting Services
Certified Information Security Manager (CISM) defines the fundamental skills and international standards of performance that information security professionals are required to master. CISM provides business management the confidence that consultants who have earned their CISM have the experience and skill to offer effective security management and consulting support. Progent can offer a CISM expert to assist your organization in vital security disciplines such as data security governance, risk management, data security program management, and incident response management. Get additional information concerning Progent's Certified Information Security Manager (CISM) Security Support Assistance.
- CISSP Security Consulting Services
Progent's CISSP experts are security engineers who have been awarded CISSP accreditation as a result of demonstrated experience, rigorous study, and exhaustive examination. CISSP qualification recognizes expertise in a worldwide standard for information security. ANSI has given the CISSP credential accreditation in the area of information security under ISO/IEC 17024. Fields of expertise included under CISSP include security administration practices, security design and test systems, access control systems, applications development security, business processes security, physical security, cryptography, telecommunications, Internet security, and disaster recovery planning. Find out more details concerning Progent's Certified Information Systems Security Professionals (CISSP) Consulting Assistance.
- Information Systems Security Architecture Professionals (ISSAP) Engineering Services
Progent's ISSAP qualified security experts are consultants who have earned ISSAP status following rigorous examination and substantial hands-on work with network security architecture. ISSAP consultants have in-depth understanding of access management systems and methodologies, telecommunications and network security, cryptography, needs evaluation, BCP and DRP, and physical security. Progent's ISSAP-qualified security experts can assist your business with all aspects of architecture security. Get additional information about Progent's ISSAP Certified Protected System Infrastructure Engineering Services.
- CISA Support Expertise
The Certified Information Systems Auditor credential is a prestigious qualification that represents expertise in network security auditing. Accredited by ANSI, the CISA credential requires that candidates pass an exhaustive examination administered by the ISACA international professional group. Progent offers the expertise of a CISA-certified security professional able to assist businesses in the areas of information systems audit process, information technology administration, systems and infrastructure planned useful life, information technology support, safeguarding data resources, and disaster recovery planning. Learn more details concerning Progent's Certified Information Systems Auditor Consulting Services.
- GIAC Support Services
GIAC (Global Information Assurance Certification) was established in 1999 to validate the knowledge of network security professionals. GIAC's mission is to verify that a certified security consultant has the skills needed to provide support in key areas of system, information, and application program security. GIAC certifications are recognized by companies and institutions all over the world including and the United States NSA. Progent can provide the expertise of GIAC certified consultants for any of the network security disciplines addressed within GIAC accreditation topics including assessing networks, security incident response, traffic analysis, and web-based application security. Learn more details concerning Progent's Global Information Assurance Certification Professional Assistance.
If you're looking for computer security consulting, call Progent at 800-993-9400 or go to Contact Progent.
Progent Corporation. All rights reserved.