Introduction to Progent's Security Support Services
Progent's industry certified network security professionals can provide a wide range of support services designed to help businesses of any size to detect and correct security weaknesses, defend against assaults, recover from the problems caused by a breakdown of security, and meet regulatory mandates for reporting incidents. Progent can provide online and on-site support and has developed economical set-price security evaluation bundles to complement Progent's standard by-the-minute billing.

Service delivery options offered by Progent include:

  • On-line Security Support Services
    Most security issues can be handled online via a combination of phone-based assistance and remote Internet connections between Progent's Technical Response Center and a customer's network. Progent's TRC service group includes security professionals with the experience and tools to fix some of the most challenging issues promptly, keeping your support costs reasonable and minimizing downtime. Progent provides security support services on a by-the-minute basis without minimum billing for remote support. Progent's pricing structure avoids scenarios where simple fixes turn into big expenses. Progent also offers a variety of set-price remote security evaluation packages that provide exceptional value by leveraging Progent's advanced network monitoring software and Progent's consulting expertise to produce an objective and thorough analysis of your information system security profile.

  • On-premises Security Support Options
    For circumstances in which in-person support is necessary, Progent can send a field service professional to major metropolitan areas throughout the United States Progent's security consultants are also available for projects that call for high-level security specialists to be on site anywhere in the United States, and Progent's most advanced security evaluation bundles for large businesses feature the services of several qualified security engineers on site.

  • Urgent Security Support Services
    To get fast help with network security issues, your company can have access to a seasoned online support expert by contacting Progent's roster of certified security professionals at Progent's TRC. Progent's urgent remote security support staff is ready to offer fast and economical help with security emergencies that are impacting the productivity of your information system. Progent's security engineers are certified to support environments based on Microsoft Windows, Linux, Mac, Sun, and major derivatives of UNIX. Progent's broad range of services addresses firewall technology, email and messaging security, secure system architecture, and information recovery. Progent's technical support team has been awarded the world's most advanced security certifications including Certified Information Systems Auditor (CISA) and Information System Security Architecture Professional. Progent also can provide fast access to remote Cisco-certified CCIE network infrastructure consultants who can deliver advanced support with tough network configuration problems.

Our Network Has Been Hacked: What Do We Do Now?
Network Security ConsultantsIf you are currently experiencing a network security emergency and you do not have a formal recovery plan, visit Progent's Remote Technical Support to learn how to receive immediate assistance. Progent offers remote assistance from skilled engineers and can refer trouble tickets to certified security specialists if required. Your business does not have to be a current Progent customer to receive urgent help for a security breakdown, but you can sign up as a Progent client in advance for free and your status as a registered customer could save valuable time in case of an emergency.

Typically, smaller companies do not have a response procedure in case of a damaging penetration. This is not good, since the cost of a serious security attack can be more catastrophic for a small business than for a big corporation. Progent's security engineers can help your you to design an efficient response and event reporting plan that minimizes the network downtime following an attack. The formal incident response model outlined by GIAC is Progent's suggested method for handling a serious security incident.

Areas of Progent's Security Consulting Expertise
Managing network protection as well as planning for restoring vital information and systems following a security breach requires a continual program that entails a variety of tools and processes. Progent's certified engineers can support your business at any level in your attempt to secure your IT system and stay in compliance, Services range from security assessments to designing a complete security plan. Key areas supported by Progent's security engineers include Planning and Prevention, Information Recovery and Security Failure Analysis, plus Managed Protection from Email-Borne Attacks.

  • Designing, Implementing, and Testing Secure Environments
    Every company should have a thoroughly thought out security plan that incorporates both proactive and responsive elements. The pre-attack strategy is a collection of precautions that works to reduce vulnerabilities. The post-attack strategy defines procedures to help security staff to inventory the losses caused by a breach, repair the damage, document the event, and revive business activity as quickly as possible. Progent can advise you how to incorporate security into your company operations, install scanning software, define and build a safe IT infrastructure, and propose processes and policies that will optimize the protection of your network. Progent's security professionals are ready to help you to configure a firewall, deploy secure online and mobile connectivity to e-mail and data, and configure an efficient virtual private network. If your company is interested in an economical option for jobbing out your network security management, Progent's Round-the-clock Network Support Packages include continual remote server tracking and immediate resolution of emergencies.
  • System Restoration and Security Forensics
    Progent has skill in recovering networks and servers that have been hacked, are quarantined, or have ceased to function following a security breakdown. Progent can help evaluate the losses caused by the attack, restore ordinary functions, and recover information compromised owing to the assault. Progent's certified engineers can also manage a thorough forensic evaluation by examining event logs and using a variety of proven assessment techniques. Progent's background with security consulting reduces your downtime and permits Progent to recommend effective measures to avoid or mitigate future assaults.
  • Email Security with Spam Filtering, Virus Protection, Content Filtering, and Data Leakage Prevention
    Email Guard is Progent's email filtering and encryption solution that uses the technology of leading information security vendors to provide centralized management and comprehensive security for your email traffic. The powerful architecture of Email Guard managed service integrates cloud-based filtering with an on-premises security gateway appliance to offer advanced defense against spam, viruses, Denial of Service (DoS) Attacks, Directory Harvest Attacks, and other email-borne malware. The cloud filter acts as a preliminary barricade and keeps most threats from reaching your network firewall. This reduces your vulnerability to inbound threats and conserves network bandwidth and storage space. Email Guard's on-premises security gateway device provides a further layer of analysis for inbound email. For outbound email, the local security gateway offers AV and anti-spam protection, protection against data leaks, and encryption. The local security gateway can also help Microsoft Exchange Server to track and safeguard internal email that stays within your corporate firewall. Find out more about Progent's Email Guard Spam Filtering, Virus Defense, Email Content Filtering and Data Leakage Protection.
Advanced Security Services Available from Progent
Progent's security engineers can provide world-class consulting in key areas of computer security including:
  • Information Risk Audits and Security Compliance Assessment
    Progent offers experience with security auditing software such as MS Baseline Security Analyzer and LANguard from GFI for performing a set of automatic network scans to identify potential security holes. Progent has extensive skills with scanning utilities and can help your company to understand audit results and respond efficiently. Progent's certified security consultants also offer web application testing and can conduct expert assessments of enterprise-wide security to verify your organization's compliance with major worldwide security standards including HIPAA, NIST, and ISO. Also, Progent can assess the effectiveness of your wireless protection including stationary wireless equipment plus portable handsets. Get additional details about Progent's Information Risk Evaluation and Compliance Testing.
  • Security Inventory Service Packages for Small Businesses
    Progent offers two ultra-affordable security inventory and evaluation bundles designed to allow small companies to receive an objective network security evaluation from an accredited security expert. With Progent's External Network Security Inventory Scan, a security expert runs a comprehensive examination of your IT infrastructure from outside your company firewall to determine potential risks in the security profile you present to the outside world. With Progent's Internal Network Security Inventory Checkup, an engineer executes a system scan from an authorized computer within your firewall to determine your exposure to internal attacks. Both security inventory packages are set up and executed from a protected external location. The process is managed by a consultant with high-level security accreditations who produces a document that details and interprets the data collected by the scan and suggests cost-effective improvements where call for.
  • Security Evaluation Packages for Enterprises
    Progent's certified security engineers can deliver a range of set-price network security audit packages designed for corporations who have to meet security levels required by government regulators or by customers. Progent's security assessment bundles give larger businesses an opportunity to receive a professional look at the effectiveness of their protection environment. For every security assessment bundle, Progent consultants with top security accreditations analyze and report on scanned data and make suggestions for effective remediation. The various security audit packages include an added-cost alternative for on-premises security engineers anywhere in the U.S.
  • Migrating from ISA Server and Forefront Threat Management Gateway
    Microsoft ISA Server 2006 and the newer Forefront Threat Management Gateway are software platforms that contain an application-layer firewall that can guard networks from external and internal attacks. The two platforms perform deep inspection of network protocols to detect exploits that can get by traditional firewalls. Microsoft Internet Security and Acceleration Server was replaced by Microsoft Forefront TMG 2010, which is built on ISA Server 2006's technology while delivering a variety of enhanced features. Forefront TMG has subsequently been discontinued by Microsoft, and the gateway security functions offered by the platform are now commonly handled by purpose-built physical devices from vendors such as Cisco, Check Point, SonicWALL and WatchGuard. (See Cisco ASA 5500-X Firewall with Firepower Services integration and management.) Progent provides advanced Microsoft Forefront TMG support services and Microsoft ISA Server 2006 expertise to help you manage and troubleshoot your older firewalls, and Progent can help your organization to upgrade smoothly to a modern firewall solution by providing system design, configuration, tuning, IT staff training and debugging.
  • Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Series Firewalls, and PIX Security Appliances Integration and Debugging
    Cisco CCIE Network Security EngineersThe current ASA 5500-X Family of firewalls with Firepower Services provide significantly more bang for the buck than Cisco's earlier PIX and ASA 5500 firewalls and have replaced the ASA 5500 and PIX security appliances for all new installations. After Cisco's purchase of Sourcefire, the whole line of ASA 5500-X devices can be configured to support Firepower Services, based on Sourcefire's Snort product, which is the world's most popular network intrusion protection system (IPS). Firepower services bring enhanced features including advanced malware protection (AMP), URL filtering, dynamic threat analytics, and automation. Progent's Cisco-qualified CCIE network consultants can help your company to manage your current PIX or ASA 5500 firewalls or migrate efficiently to ASA 5500-X firewalls with Firepower Services. Progent's consultants offer online and on-premises help with ASA 5500-X firewalls with Firepower Services and can help your organization to design, integrate, tune, manage and debug firewall solutions built on Cisco ASA 5500-X firewalls with Firepower Services. Find out more information about Cisco ASA 5500-X Firewalls with Firepower configuration and troubleshooting support.
  • Other Firewall and Virtual Private Network (VPN) Consulting Services
    As well as supporting a broad array of protection technologies from Microsoft and Cisco, Progent offers small and mid-size companies expert engineering services for products from other major firewall and Virtual Private Network suppliers including:
  • SIEM Solutions
    Security information and event management (SIEM) software and services are designed to digest the enormous amounts of data represented by security event logs generated by multiple sources such as network infrastructure appliances, servers, and applications and monitoring tools. SIEM applications analyzes the security logs from these various sources and produces summary reports of security incidents as required by government regulations and business compliance standards. Progent's GIAC-certified computer security consultants and Cisco CCIE certified network experts can assist organizations to plan, deploy and manage a SIEM system that enables them to understand the behavior of security incidents and comply with event reporting requirements. (Visit Progent's SIEM solutions.)
Progent's Security Certifications
Progent's security specialists have earned some of the most respected accreditations available in the industry. All of these certifications require exhaustive testing and proven work experience to guarantee that candidates have mastered a substantial amount of security information and techniques and can offer high-level consulting to computer environments of any complexity.
  • Certified Information Security Manager Security Support Services
    CISM defines the basic competencies and international standards of performance that computer security professionals are expected to master. It offers executive management the assurance that those who have been awarded their certification have the background and skill to provide effective security administration and engineering services. Progent can offer a CISM support professional to assist your organization in critical security areas including data protection governance, vulnerability assessment, data protection program management, and crisis response support. Read additional details about Progent's Certified Information Security Manager Security Consulting Expertise.
  • CISSP Security Support Expertise
    Progent's CISSP experts are security specialists who have been awarded CISSP status through demonstrated experience, rigorous study, and exhaustive testing. CISSP Certification recognizes expertise in a worldwide standard for IT security. American National Standards Institute has granted the CISSP status official recognition in the area of IT security under ISO/IEC 17024. Areas of expertise included within CISSP include security management procedures, security design and test systems, access permission methodology, software development security, business processes security, physical security, encryption, telecommunications, network security, and business continuity planning. Get more details concerning Progent's CISSP Support Expertise.
  • Information Systems Security Architecture Professionals (ISSAP) Engineering Support
    Progent's ISSAP qualified security consultants are consultants who have been awarded ISSAP accreditation as a result of rigorous testing and significant hands-on work with information security architecture. ISSAP consultants have acquired comprehensive understanding of access management systems and techniques, telecommunications and network infrastructure security, cryptography, needs evaluation, business continuity planning (BCP) and disaster recovery, and physical security. Progent's ISSAP-qualified security experts can assist your business with all aspects of architecture security. Get more information about Progent's ISSAP Certified Protected Network Infrastructure Engineering Assistance.
  • Certified Information Systems Auditor (CISA) Consulting Services
    The CISA credential is a globally recognized achievement that represents expertise in information system security audit and control. Certified by the American National Standards Institute, the CISA accreditation requires that candidates undergo an extensive examination given by the ISACA international professional association. Progent offers the services of a CISA-certified security audit professional able to help companies in the fields of IS audit process, information technology administration, network assets and infrastructure planned useful life, IT service delivery, safeguarding information assets, and business continuity preparedness. Find out more details about Progent's Certified Information Systems Auditor Professional Services.
  • GIAC Consulting Expertise
    GIAC (Global Information Assurance Certification) was founded in 1999 to validate the knowledge of network security engineers. GIAC's goal is to make sure that a certified professional possesses the knowledge needed to deliver services in important categories of network, information, and application program security. GIAC accreditations are acknowledged by companies and institutions around the world including and the United States National Security Agency (NSA). Progent offers the expertise of GIAC certified consultants for all of the network security disciplines covered within GIAC certification topics including assessing security systems, incident handling, traffic analysis, and web application security. Learn more information about Progent's Global Information Assurance Certification Professional Services.
Get in Touch with Progent for Network Security Support
If you're looking for security help, call Progent at 800-993-9400 or see Contact Progent.

© 2002- 2017 Progent Corporation. All rights reserved.