Introduction to Progent's Security and Compliance Consulting Services
Progent's industry certified computer security and compliance experts offer a wide range of support services intended to assist businesses of all sizes to identify and correct security weaknesses, defend against assaults, recover from the problems caused by a breach of protection, and comply with regulatory requirements for guarding data and reporting incidents. Progent offers a selection of service models:

  • As-needed online and on-site assistance invoiced to the nearest minute
  • Continual fully managed services billed at an affordable flat monthly fee
  • Value-priced service packages for a one-time security and compliance evaluation
As-needed Security Consulting Services
After you register for Progent's services (registration is free), you can receive on-demand remote or on-premises assistance from one of Progent security and compliance expert. This traditional support model is essentially reactive and optimized for quickly resolving IT problems that are disrupting your productivity or that are beyond the scope of your in-house support personnel. Common examples are debugging a firewall or VPN connection, implementing a critical security patch for a Cisco switch or router, setting up secure access to cloud-based resources, or recovering from a ransomware attack. These services are billed to the nearest minute, which avoids the frustrating case of receiving big bills for fast fixes.

Delivery alternatives for Progent's as-needed support services include:

  • Online Security Support
    The majority security-related issues can be resolved online through a mix of phone-based help and a remote Internet connection between Progent's Technical Response Center (TRC) and a client's network. Progent's TRC group can provide remote security support by offering efficient access to consultants with the background and resources to fix some of the most difficult issues quickly, keeping your service expenses affordable and reducing lost productivity.
  • On-premises Security Support Services
    For cases where onsite support is required, Progent can dispatch a technical professional to major metropolitan areas throughout the U.S. Progent can also send a security specialist with high-level certifications and advanced skills to any site in the U.S.
Progent's security consultants are certified to support environments powered by Microsoft Windows, Linux, Macintosh, Solaris, and major derivatives of UNIX. Progent's broad array of consulting services encompasses firewall technology, email and messaging systems, secure network architecture, and data recovery. Progent's support team has been awarded the world's top security accreditations including CISA and ISSAP. Progent also offers immediate access to remote Cisco CCIE network consultants who can deliver world-class assistance with complex network configuration problems.

Progent's Low-Cost Managed Services for Information Assurance
Progent offers a portfolio of affordable, set-price monthly services intended to provide small and mid-size businesses with enterprise-class support and cutting-edge technology for all facets of information assurance. Managed services offered by Progent include:

  • ProSight Email Guard: Spam Filtering, Data Leakage Protection and Email Encryption
    ProSight Email Guard is Progent's email security platform that incorporates the services and infrastructure of leading information security vendors to deliver centralized management and comprehensive protection for all your inbound and outbound email. The powerful architecture of Progent's Email Guard integrates cloud-based filtering with an on-premises gateway device to offer complete defense against spam, viruses, Dos Attacks, DHAs, and other email-based malware. Email Guard's Cloud Protection Layer serves as a preliminary barricade and keeps most unwanted email from making it to your network firewall. This reduces your vulnerability to inbound attacks and conserves network bandwidth and storage space. Email Guard's on-premises gateway device adds a deeper layer of analysis for incoming email. For outbound email, the on-premises security gateway offers anti-virus and anti-spam filtering, protection against data leaks, and email encryption. The local gateway can also help Microsoft Exchange Server to monitor and protect internal email that stays within your security perimeter. Learn more about Progent's ProSight Email Guard spam filtering, virus blocking, email content filtering and data loss protection.

  • ProSight Active Security Monitoring: Next Generation Endpoint Protection and Ransomware Defense
    ProSight Active Security Monitoring is an endpoint protection solution that incorporates cutting edge behavior machine learning technology to defend endpoints as well as servers and VMs against modern malware attacks like ransomware and email phishing, which easily evade traditional signature-matching AV products. ProSight ASM safeguards local and cloud-based resources and offers a single platform to address the complete malware attack progression including protection, detection, containment, cleanup, and forensics. Key features include one-click rollback using Windows Volume Shadow Copy Service (VSS) and real-time network-wide immunization against newly discovered threats. Read more about Progent's ProSight Active Security Monitoring endpoint protection and ransomware defense.

  • ProSight Data Protection Services: Managed Backup
    ProSight Data Protection Services from Progent provide small and mid-sized businesses a low cost and fully managed service for reliable backup/disaster recovery (BDR). Available at a low monthly rate, ProSight DPS automates and monitors your backup activities and allows fast recovery of critical data, apps and virtual machines that have become lost or damaged due to hardware failures, software glitches, natural disasters, human error, or malicious attacks like ransomware. ProSight DPS can help you back up, retrieve and restore files, folders, apps, system images, plus Hyper-V and VMware virtual machine images. Critical data can be backed up on the cloud, to a local device, or mirrored to both. Progent's cloud backup consultants can deliver world-class support to set up ProSight DPS to to comply with regulatory requirements like HIPPA, FIRPA, PCI and Safe Harbor and, when needed, can assist you to restore your critical data. Find out more about ProSight DPS managed cloud backup.

  • ProSight WAN Watch: Network Infrastructure Remote Monitoring and Management
    Progentís ProSight WAN Watch is an infrastructure monitoring and management service that makes it easy and inexpensive for smaller organizations to map out, monitor, reconfigure and troubleshoot their connectivity hardware like routers, firewalls, and load balancers as well as servers, client computers and other devices. Using cutting-edge Remote Monitoring and Management (RMM) technology, ProSight WAN Watch makes sure that network maps are kept updated, copies and manages the configuration information of virtually all devices connected to your network, monitors performance, and generates alerts when issues are discovered. By automating complex network management activities, ProSight WAN Watch can cut hours off ordinary tasks such as making network diagrams, reconfiguring your network, finding appliances that need important updates, or isolating performance issues. Learn more about ProSight WAN Watch infrastructure management services.

  • ProSight Systems Watch: Server and Desktop Remote Monitoring and Management
    ProSight Systems Watch is Progentís server and desktop monitoring subscription service that incorporates advanced remote monitoring and management techniques to help keep your network running at peak levels by checking the health of vital computers that power your information system. When ProSight Systems Watch detects a problem, an alert is sent immediately to your specified IT staff and your Progent consultant so any looming problems can be resolved before they can impact your network Find out more details about ProSight Systems Watch server and desktop automated remote monitoring and management consulting.
Set-price Security Evaluation and Validation Packages
Progent has put together a variety of fixed-price security and compliance assessment packages that provide high value by utilizing Progent's advanced system monitoring software as well as Progent's technical experience to create an unbiased and comprehensive assessment of your network security profile.
  • Security Inventory Service Packages for Small Businesses
    Progent offers two value-priced security inventory scanning service packages designed to allow small businesses to obtain an objective security assessment from a certified security engineer. With Progent's External Security Inventory Scan, a consultant manages a comprehensive examination of your IT system from outside your corporate firewall to identify potential risks in the security posture you expose to the outside. With Progent's Internal Security Inventory Scan, a security consultant executes a network scan from an authorized machine within your corporate firewall to evaluate your exposure to inside threats. The two security inventory services are configured and run from a secured external site. The project is managed by a consultant who has been awarded advanced security certifications and who creates a report that details and evaluates the data captured by the scan and suggests practical improvements where required.
  • Security Vulnerability Assessment Bundles for Large Businesses
    Progent offers three levels of set-price security evaluation service bundles intended for large organizations who want to meet security standards required by state or industry regulators. Progent's security evaluation service packages offer larger organizations a chance to obtain an objective look at the strength of their security profile. For every security evaluation package, Progent consultants with top security credentials analyze and report on captured data and provide recommendations for cost-effective remediation. All the network security assessment bundles include an added-cost option for on-premises engineers anywhere in the United States.
  • Stealth Penetration Testing
    Stealth penetration testing, often referred to as PEN testing, is an accepted technique for helping organizations to determine how vulnerable their IT systems are to modern threats. Progent's stealth penetration testing services check how effectively your existing security policies and platforms resist authorized but unannounced intrusion attempts managed by Progent's veteran security specialists utilizing cutting-edge hacking methods. Read about Progent's stealth penetration testing services.
We've Been Hacked: What Can We Do?
Network Security ConsultantsIf your business is currently fighting a network security emergency and you have not prepared a formal recovery plan, visit Progent's Online Technical Help to find out how to receive fast help. Progent provides online technical support from experienced network technicians and can refer trouble tickets to certified security specialists if required. Your organization does not need to be a current Progent customer to receive emergency support for a security breach, but you can sign up as a Progent customer ahead of time for free and your standing as a registered client could save precious time when there is a crisis.

Usually, smaller organizations have not documented a response plan in the event of a successful penetration. This is not good, since the damage from a successful security assault can be more catastrophic for a small business than for a big corporation. Progent's security specialists can assist your you to create an efficient response and incident reporting procedure that reduces the network downtime resulting from a security breach. The formal incident response model outlined by GIAC (Global Information Assurance Certification) is Progent's recommended method for responding to a major security penetration.

High-value Security Services Available from Progent
Progent's certified security engineers can provide world-class consulting in key facets of IT compliance such as:

  • Information Risk Evaluation and Compliance Testing
    Progent provides expertise with security auditing utilities such as MS Baseline Security Analyzer or LANguard from GFI for conducting a variety of automatic network tests to uncover possible security holes. Progent has extensive experience with these tools and can help your company to analyze audit results and respond efficiently. Progent's security consultants also offer web software validation and can conduct expert evaluation of corporate-wide security to validate your organization's compliance with key worldwide security specifications such as FISMA, NIST, and ISO. Also, Progent can assess the strength of your wireless security including fixed wireless equipment plus mobile devices. Read more details about Progent's Security Vulnerability Audits and Security Compliance Assessment.
  • Designing, Implementing, and Testing Secure Environments
    Every organization ought to develop a thoroughly considered security strategy that includes both proactive and reactive activity. The proactive strategy is a collection of steps that helps to reduce vulnerabilities. The reactive plan defines activities to help IT staff to evaluate the damage caused by an attack, remediate the damage, record the event, and revive business functions as quickly as feasible. Progent can show you how to build security into your business operations, set up scanning software, create and implement a secure IT infrastructure, and recommend procedures and policies that will maximize the protection of your information system. Progent's security professionals are ready to assist you to set up a firewall, design secure offsite access to email and data, and install an effective VPN. If your company is interested in an economical way for jobbing out your network security management, Progent's Round-the-clock Monitoring Options include continual remote system tracking and immediate response to problems.
  • Data Recovery and Failure Analysis
    Progent provides skill in recovering networks and servers that have been compromised, are quarantined, or have ceased to function because of a security breach. Progent can show you how to determine the losses caused by the attack, return your company to ordinary functions, and retrieve information compromised owing to the assault. Progent's security engineers can also oversee a comprehensive forensic evaluation by going over event logs and using a variety of advanced forensics techniques. Progent's experience with security consulting minimizes your downtime and allows Progent to recommend effective ways to prevent or contain future attacks.
  • Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Series Firewalls, and PIX 500 Security Appliances Integration and Troubleshooting
    Cisco Certified CCIE Security EngineersThe current Cisco ASA 5500-X Series Next-Generation Firewalls with Firepower Services offer substantially more performance than Cisco's earlier PIX and ASA 5500 firewalls and have superseded the ASA 5500 and PIX 500 firewalls for all new deployments. After Cisco's acquisition of Sourcefire, the entire line of Cisco ASA 5500-X firewalls can be provisioned to enable Firepower Services, based on Sourcefire's Snort technology, which is the market's most popular intrusion protection system (IPS). Firepower services provide enhanced features such as advanced malware protection (AMP), URL filtering, dynamic threat analytics, and automation. Progent's Cisco-certified CCIE network experts can assist your company to manage your existing PIX or ASA 5500 firewalls or upgrade to Cisco ASA 5500-X firewalls with Firepower Services. Progent's consultants can provide online and on-premises support for ASA 5500-X firewalls with Firepower Services and can help your organization to design, configure, optimize, administer and troubleshoot firewall environments based on Cisco ASA 5500-X firewalls with Firepower Services. Find out additional information about ASA Firewalls with Firepower Services integration and troubleshooting support.
  • Other Firewall and VPN Solutions
    As well as being expert in a broad range of network security technologies available from Microsoft and Cisco, Progent offers small and mid-size organizations expert consulting for technologies from other major firewall and Virtual Private Network suppliers such as:
  • SIEM Security Information and Event Management Solutions
    Security information and event management (SIEM) software and services are designed to interpret the enormous amounts of data collected in security event records generated by multiple sources including network infrastructure appliances, servers, and application software and monitoring tools. SIEM applications organizes the security logs from these diverse sources and creates consolidated reports of security incidents as required by government regulations and industry compliance guidelines. Progent's GIAC-certified information assurance experts and Cisco CCIE certified network infrastructure experts can help organizations to plan, install and operate a SIEM solution that helps them to see the progress of attacks and comply with event reporting requirements. (See Progent's SIEM solutions.)
Progent's Security Credentials
Progent's security consultants have earned some of the most prestigious certifications offered in the security industry. All of these certifications demand exhaustive examinations and demonstrated work background to guarantee that candidates have acquired expertise with a significant body of security knowledge and methodologies and can provide high-level consulting to computer networks of any size.
  • Certified Information Security Manager (CISM) Security Consulting Expertise
    Certified Information Security Manager defines the core skills and worldwide standards of service that information security managers are expected to master. CISM provides executive management the assurance that those who have earned their accreditation possess the experience and knowledge to offer efficient security administration and engineering support. Progent can provide a CISM-certified consultant to help your enterprise in key security areas including data protection governance, vulnerability management, information security process control, and crisis response management. Get additional details concerning Progent's Certified Information Security Manager Security Consulting Assistance.

  • CISSP Security Consulting Expertise
    Progent's CISSP consultants are security engineers who have been awarded CISSP status as a result of verified experience, extensive study, and formal testing. CISSP qualification indicates expertise in an international standard for information security. ANSI has granted the CISSP credential accreditation in the field of information security under ISO/IEC 17024. Fields of knowledge covered within CISSP include security administration procedures, security architecture and models, connection permission methodology, software development security, business processes security, physical security, cryptography, communications, network security, and disaster recovery planning. Get more information concerning Progent's CISSP Support Expertise.

  • Information Systems Security Architecture Professionals (ISSAP) Consulting Support
    Progent's ISSAP certified security consultants are experts who have been awarded ISSAP accreditation following thorough testing and substantial hands-on work with information security design. ISSAP security experts have comprehensive knowledge of access management mechanisms and methodologies, phone system and network infrastructure protection, cryptography, needs evaluation, BCP and DRP, and physical security. Progent's ISSAP-certified security specialists can help your company with all phases of secure network architecture. Read more information about Progent's ISSAP Certified Protected Network Infrastructure Consulting Assistance.

  • Certified Information Systems Auditor Consulting Expertise
    The CISA accreditation is a globally recognized qualification that indicates expertise in information system security auditing. Accredited by the American National Standards Institute (ANSI), the CISA accreditation has candidates pass a comprehensive test given by the ISACA professional group. Progent can provide the services of a CISA-qualified security professional able to help companies in the areas of information systems audit services, IT enforcement, systems and architecture lifecycle, IT support, protecting information assets, and business continuity preparedness. Get additional details about Progent's Certified Information Systems Auditor Professional Expertise.

  • Global Information Assurance Certification Support Services
    GIAC (Global Information Assurance Certification) was established in 1999 to validate the skill of network security experts. GIAC's mission is to ensure that a certified security consultant possesses the knowledge needed to deliver support in critical areas of network, information, and program security. GIAC accreditations are recognized by companies and institutions all over the world including and the United States National Security Agency (NSA). Progent offers the support of certified security engineers for all of the network security capabilities addressed under GIAC certification topics such as assessing IT infrastructure, security incident response, traffic analysis, and web-based application security. Learn more details concerning Progent's GIAC Support Expertise.
Contact Progent for Network Security Consulting Services
If you're trying to find security engineering help, telephone Progent at 800-993-9400 or go to Contact Progent.

© 2002- 2018 Progent Corporation. All rights reserved.