Overview of Progent's Security Consulting Services
Progent's certified network security professionals offer a wide selection of support services intended to assist businesses of any size to identify and correct security vulnerabilities, defend against assaults, recover from the issues caused by a breakdown of protection, and comply with regulatory requirements for reporting security incidents. Progent delivers remote and on premises service and also has developed economical set-price security assessment packages to complement Progent's regular time-based billing.

Service delivery alternatives offered by Progent are:

  • On-line Security Services
    Typical security problems can be handled remotely via a combination of telephone assistance and secure data connections between Progent's Technical Response Center (TRC) and the client's network. Progent's TRC service team includes security engineers who have the background and tools to solve some of the most challenging issues promptly, keeping your support expenses affordable and minimizing lost productivity. Progent provides security support on a by-the-minute model without minimum charges for online consulting support. Progent's pricing policy avoids scenarios where quick fixes turn into major expenses. Progent also has available a variety of fixed-price online security and compliance evaluation bundles that provide extraordinary value by utilizing Progent's advanced security scanning technology and Progent's engineering experience to deliver a professional and actionable picture of your network security profile.

  • On-premises Security Support Services
    In cases in which on-site support is required, Progent can send a service professional to larger cities throughout the United States Progent's certified security consultants are also available for projects that call for high-level security specialists to be on premises anywhere in the United States, and Progent's most advanced security assessment bundles for large businesses include the participation of a team of qualified security experts on site.

  • Urgent Security Support Services
    For urgent help with network security issues, your business can have access to a seasoned online support expert by contacting Progent's team of security engineers at Progent's TRC. Progent's urgent remote security service consultants are available to offer fast and affordable help with security problems that are impacting the productivity of your information system. Progent's security engineers are qualified to provide help for environments powered by Microsoft Windows, Linux, Mac OS X, Solaris, and major versions of UNIX. Progent's wide selection of services encompasses firewall expertise, email security, protected network design, and data recovery. Progent's support staff has been awarded the industry's most advanced security certifications including Certified Information Systems Auditor and CISSP. Progent also can provide immediate access to online Cisco CCIE network engineers who can provide world-class assistance with complex network configuration problems.

Our System Has Been Hacked: What Should We Do?
Network Security ConsultantsIf you are currently experiencing a network security emergency and you do not have a formal recovery procedure, go to Progent's Remote Network Support to learn how to receive immediate help. Progent offers online assistance from experienced network technicians and can escalate problems to certified security experts if required. Your organization does not need to be a registered Progent client to receive emergency help for a security breach, but you can register as a Progent client in advance for free and your status as a current client could save precious time during an emergency.

Usually, smaller companies have not documented a recovery plan in case of a damaging attack. This is risky, because the damage from a successful security attack can be more devastating for a small company than for a big enterprise. Progent's security engineers can assist your company to create an efficient recovery and incident reporting procedure that minimizes the network downtime following an attack. The formal post-attack handling procedure promoted by GIAC (Global Information Assurance Certification) is Progent's recommended method for responding to a major security incident.

Practice Areas of Progent's Security Support Services
Managing computer protection as well as planning for restoring vital information and systems following a security breach demands a continual effort involving a variety of tools and procedures. Progent's certified experts can support your organization at all levels in your efforts to safeguard your IT network and stay in compliance, Progent's services range from security audits to designing a complete security strategy. Key areas supported by Progent's experts include Planning and Prevention, Information Recovery and Security Failure Analysis, plus Outsourced Filtering of Email-Based Threats.

  • Planning, Building, and Testing Protected Environments
    Every organization ought to have a carefully thought out security plan that incorporates both preventive and reactive activity. The pre-attack strategy is a collection of steps that helps to reduce vulnerabilities. The post-attack plan defines procedures to assist IT staff to inventory the losses resulting from an attack, remediate the damage, document the event, and restore business activity as soon as feasible. Progent can show you how to incorporate security into your business processes, configure scanning software, create and build a safe computer architecture, and recommend procedures and policies to enhance the protection of your information system. Progent's security experts are ready to help you to set up a firewall, deploy safe online and mobile access to e-mail and files, and install an effective virtual private network (VPN). If your company is looking for an affordable option for outsourcing your security administration, Progent's Round-the-clock Monitoring Services include automated online network monitoring and immediate response to emergencies.
  • System Restoration and Failure Analysis
    Progent offers expertise in restoring systems and servers that have been compromised, are in question, or have failed following a security breach. Progent can show you how to determine the damage caused by the breach, return your company to normal business operations, and retrieve data lost as a result of the event. Progent's security engineers can also manage a comprehensive forensic analysis by examining activity logs and using other advanced forensics techniques. Progent's background with security problems reduces your off-air time and allows Progent to recommend effective ways to prevent or mitigate new attacks.
  • Email Security with Spam Filtering, Virus Defense, Content Filtering, and Data Leakage Prevention
    Email Guard is Progent's email filtering and encryption platform that uses the technology of leading information security companies to deliver centralized control and comprehensive protection for all your inbound and outbound email. The powerful architecture of Progent's Email Guard integrates a Cloud Protection Layer with a local security gateway appliance to offer advanced protection against spam, viruses, Denial of Service Attacks, Directory Harvest Attacks, and other email-borne malware. Email Guard's cloud filter serves as a preliminary barricade and keeps the vast majority of unwanted email from making it to your security perimeter. This reduces your exposure to external threats and saves network bandwidth and storage. Email Guard's on-premises security gateway device provides a further layer of analysis for inbound email. For outgoing email, the on-premises gateway offers anti-virus and anti-spam filtering, DLP, and email encryption. The onsite gateway can also help Exchange Server to monitor and safeguard internal email traffic that stays inside your security perimeter. Find out more about Progent's Email Guard Spam Filtering, Virus Defense, Content Filtering and Data Loss Prevention.
Advanced Security Expertise Available from Progent
Progent's security consultants offer advanced support in key areas of IT security including:
  • Vulnerability Audits and Compliance Testing
    Progent provides expertise with information risk auditing tools like MS Baseline Security Analyzer and LANguard for performing a variety of automatic system scans to identify possible security problems. Progent has broad experience with monitoring utilities and can help your company to analyze assessment reports and respond appropriately. Progent's security engineers also can perform web application testing and can perform expert assessments of corporate-wide security to confirm your company's compliance with major worldwide security specifications such as FISMA, NIST, and ISO 17799. Also, Progent can evaluate the strength of your wireless security covering fixed wireless appliances plus portable devices. Read more information concerning Progent's Vulnerability Audits and Compliance Assessment.
  • Security Inventory and Evaluation Bundles for Small Businesses
    Progent offers two low-cost security inventory and evaluation bundles intended to allow small companies to receive an impartial network security evaluation from a qualified security specialist. With Progent's External Security Inventory Checkup, a security engineer administers an extensive test of your network from beyond your company firewall to determine potential weaknesses in the security profile you expose to the public. With Progent's Internal Security Inventory Scan, a security engineer executes a network scan from a secure computer within your company firewall to uncover the risk to inside threats. Both security inventory services are configured and run from a secured external location. The project is managed by a consultant who has earned top security accreditations who produces a document that summarizes and interprets the information collected by the security scan and proposes cost-effective improvements if appropriate.
  • Security Vulnerability Evaluation Bundles for Large Businesses
    Progent's qualified security engineers can provide a selection of fixed-cost security evaluation packages created for institutions who have to comply with security levels required by state regulators or by customers. Progent's security assessment bundles give larger businesses an opportunity to receive an objective opinion about the strength of their security profile. For every security evaluation bundle, Progent consultants with top security accreditations analyze and report on collected information and provide suggestions for efficient remediation. The various security assessment packages feature an extra-cost option for on-premises engineers anywhere in the U.S.
  • Migrating from Microsoft Internet Security and Acceleration (ISA) Server 2006 and Microsoft Forefront Threat Management Gateway 2010
    Microsoft ISA Server 2006 and the newer Microsoft Forefront Threat Management Gateway are software platforms that contain an application-aware firewall able to protect networks from external and inside threats. The two platforms perform in-depth inspection of network protocols to detect threats that can elude traditional firewalls. Microsoft ISA Server 2006 was replaced by Forefront TMG, which is built on ISA Server 2006's architecture while delivering a variety of enhanced features. Forefront TMG 2010 has subsequently been retired by Microsoft, and the security features offered by the platform are now usually handled by dedicated physical appliances from companies such as Cisco, Check Point, Juniper and WatchGuard. (See ASA 5500-X Firewall with Firepower Services configuration and support.) Progent offers online Microsoft Forefront TMG support services and Microsoft ISA Server expertise to help you manage and troubleshoot your older firewall environment, and Progent can help you to migrate efficiently to a more current firewall solution by providing planning, configuration, tuning, training and debugging.
  • Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Firewalls, and PIX 500 Firewalls Configuration and Debugging
    Cisco Certified CCIE Security ConsultantsThe new Cisco ASA 5500-X Series of firewalls with Firepower Services deliver significantly more value than Cisco's previous PIX and ASA 5500 firewalls and have superseded the ASA 5500 and PIX 500 security appliances for all new installations. Since Cisco's purchase of Sourcefire, the entire line of Cisco ASA 5500-X firewalls can be configured to enable Firepower Services, built on Sourcefire's Snort product, which is the market's most deployed network intrusion protection system (IPS). Firepower services bring powerful new features such as advanced malware protection (AMP), URL filtering, dynamic threat analytics, and automation. Progent's Cisco-qualified CCIE network experts can help your company to maintain your legacy PIX or ASA 5500 security appliances and migrate to Cisco ASA 5500-X firewalls with Firepower Services. Progent's consultants can provide online and on-premises support for ASA 5500-X firewalls with Firepower Services and can help you to plan, configure, optimize, manage and troubleshoot firewall solutions built around Cisco ASA 5500-X firewalls with Firepower Services. Read additional details about ASA Firewalls with Firepower integration and debugging services.
  • Other Firewall and Virtual Private Network (VPN) Consulting Services
    In addition to being expert in a broad array of protection technologies from Microsoft and Cisco, Progent can provide small and mid-size companies top-level consulting for products from other important firewall and Virtual Private Network vendors including:
  • SIEM Solutions
    Security information and event management (SIEM) software and services are intended to make sense the massive quantity of data collected in security incident records generated by a wide range of sources including network appliances, operating systems, and applications and tools. SIEM software analyzes the security event records from these diverse sources and creates summary reports of security events as required by state regulations and business compliance guidelines. Progent's GIAC-certified network security consultants and Cisco CCIE certified network infrastructure experts can assist businesses to design, install and manage a SIEM solution that helps them to see the behavior of security incidents and comply with security incident reporting requirements. (See Progent's SIEM solutions.)
Progent's Security Certifications
Progent's security engineers have earned some of the most respected accreditations available in the industry. These certifications require extensive testing and demonstrated work experience to guarantee that candidates have mastered a substantial body of security knowledge and methodologies and can provide high-level security solutions to information environments of any complexity.
  • Certified Information Security Manager Security Consulting Services
    CISM identifies the basic competencies and worldwide standards of performance that information security professionals are required to achieve. CISM offers business management the assurance that those who have earned their accreditation possess the background and knowledge to provide effective security management and consulting support. Progent can offer a CISM support professional to help your organization in key security disciplines including data security governance, risk management, information security program control, and incident response support. Get additional details about Progent's Certified Information Security Manager Security Support Assistance.
  • CISSP Security Support Expertise
    Progent's CISSP experts are security engineers who have earned CISSP certification as a result of verified experience, rigorous study, and formal testing. CISSP qualification indicates expertise in a worldwide standard for IT security. American National Standards Institute has given the CISSP credential accreditation in the field of information security under ISO/IEC 17024. Areas of expertise included under CISSP include security administration practices, security design and models, connection control methodology, software development security, operations security, physical security, encryption, telecommunications, network security, and disaster recovery planning. Learn the details about Progent's Certified Information Systems Security Professionals (CISSP) Consulting Expertise.
  • ISSAP Engineering Services
    Progent's ISSAP certified security experts are consultants who have been awarded ISSAP certification following thorough testing and substantial hands-on work with information security design. ISSAP security experts have comprehensive knowledge of access management systems and techniques, telecommunications and network security, cryptography, requirements analysis, BCP and disaster recovery, and physical security integration. Progent's ISSAP-qualified security experts can help your business with all phases of architecture security. Read additional information concerning Progent's ISSAP Certified Secure System Architecture Engineering Services.
  • Certified Information Systems Auditor (CISA) Support Expertise
    The Certified Information Systems Auditor accreditation is a recognized achievement that indicates mastery in IS security auditing. Accredited by ANSI, the CISA accreditation requires that consultants pass a comprehensive test administered by the ISACA international professional association. Progent can provide the services of a CISA-certified security audit consultant able to help businesses in the fields of IS audit services, information technology administration, network assets and infrastructure planned useful life, IT support, safeguarding data resources, and disaster recovery planning. Read more details about Progent's CISA Support Assistance.
  • GIAC (Global Information Assurance Certification) Support Expertise
    GIAC (Global Information Assurance Certification) was founded in 1999 to validate the knowledge of network security experts. GIAC's goal is to make sure that an accredited professional has the skills necessary to provide services in vital areas of system, data, and application software security. GIAC accreditations are recognized by businesses and government organizations throughout the world including and the U.S. NSA. Progent offers the support of certified security engineers for any of the security services covered under GIAC accreditation programs such as assessing networks, incident handling, traffic analysis, and web services security. Learn the details concerning Progent's Global Information Assurance Certification Support Expertise.
Get in Touch with Progent for Network Security Expertise
If you want computer security expertise, phone Progent at 800-993-9400 or see Contact Progent.

© 2002- 2017 Progent Corporation. All rights reserved.