Overview of Progent's Security Consulting Services
Progent's industry certified network security and compliance experts offer a wide range of services designed to assist companies of any size to detect and eliminate security weaknesses, defend against assaults, remediate any issues resulting from a breakdown of security, and meet regulatory mandates for protecting information and reporting incidents. Progent can provide a choice of service modes:

  • On-demand online and on-site support invoiced by the minute
  • Continual fully managed services invoiced at an affordable flat monthly fee
  • Set-price service packages for a one-time security and compliance assessment
On-demand Security and Compliance Support Services
Once you sign up for Progent's services (signing up is free), you can receive as-needed online or on-premises support from a Progent security and compliance consultant. This classic service model is primarily reactive and optimized for rapidly resolving technical issues that are impacting your productivity or that have stumped your in-house support staff. Common scenarios include debugging a firewall or VPN tunnel, implementing a vital security update for a Cisco switch, setting up compliant access to cloud-based resources, or restoring data after a ransomware attack. These security services are billed by the minute, which eliminates the annoying case of receiving big bills for quick fixes.

Delivery options for Progent's on-demand support services include:

  • Remote Security Support Services
    Most security-related problems can be resolved online via a mix of phone-based help and a remote connection between Progent's Technical Response Center (TRC) and a client's network. Progent's Technical Response Center can deliver remote security help by offering easy access to consultants with the background and technical resources to resolve some of the most difficult problems quickly, keeping your support expenses low and minimizing lost productivity.
  • Onsite Security Services
    For cases where on-premises support is required, Progent can send a technical professional to major metropolitan areas across the U.S. Progent can also dispatch a security consultant with top certifications and world-class skills to any location in the country.
Progent's accredited consultants are qualified to provide help for environments based on Windows, Linux, Mac, Solaris, and popular versions of UNIX. Progent's wide selection of consulting services encompasses firewall configuration, e-mail systems, protected network architecture, and information recovery. Progent's technical support team has earned the world's top security credentials including Certified Information Systems Auditor and Information System Security Architecture Professional. Progent also can provide immediate access to online Cisco-certified CCIE network engineers who can deliver world-class support with tough network integration problems.

Progent's Low-Cost Managed Services for Information Assurance
Progent's value-priced ProSight portfolio of outsourced network management services is designed to provide small and mid-size businesses with enterprise-class support and state-of-the-art technology for all facets of information assurance. Managed services offered by Progent include:

  • ProSight Email Guard: Inbound and Outbound Spam Filtering, Data Leakage Protection and Content Filtering
    ProSight Email Guard is Progent's email security solution that uses the technology of top information security companies to provide web-based control and comprehensive security for your email traffic. The hybrid structure of Progent's Email Guard integrates cloud-based filtering with an on-premises gateway appliance to offer advanced defense against spam, viruses, Dos Attacks, Directory Harvest Attacks (DHAs), and other email-based threats. The cloud filter acts as a preliminary barricade and blocks most threats from reaching your network firewall. This decreases your vulnerability to inbound attacks and saves network bandwidth and storage space. Email Guard's onsite gateway appliance provides a further layer of inspection for inbound email. For outbound email, the onsite security gateway offers AV and anti-spam filtering, policy-based Data Loss Prevention, and encryption. The local security gateway can also assist Exchange Server to monitor and protect internal email traffic that originates and ends within your corporate firewall. Learn more about Progent's ProSight Email Guard spam filtering, virus blocking, content filtering and data leakage prevention.

  • ProSight Active Security Monitoring (ASM): Endpoint Protection and Ransomware Defense
    ProSight Active Security Monitoring (ASM) is an endpoint protection (EPP) service that incorporates next generation behavior analysis technology to guard endpoints as well as physical and virtual servers against modern malware attacks such as ransomware and email phishing, which routinely evade traditional signature-matching anti-virus products. ProSight ASM safeguards on-premises and cloud resources and offers a single platform to manage the entire threat lifecycle including blocking, detection, mitigation, remediation, and post-attack forensics. Key capabilities include single-click rollback using Windows VSS and real-time system-wide immunization against newly discovered threats. Find out more about Progent's ProSight Active Security Monitoring (ASM) endpoint protection and ransomware recovery.

  • ProSight Data Protection Services: Managed Backup
    ProSight Data Protection Services from Progent offer small and mid-sized businesses a low cost and fully managed service for reliable backup/disaster recovery (BDR). For a fixed monthly price, ProSight Data Protection Services automates and monitors your backup processes and enables rapid restoration of vital files, applications and virtual machines that have become lost or damaged due to hardware failures, software bugs, disasters, human mistakes, or malware attacks such as ransomware. ProSight Data Protection Services can help you back up, recover and restore files, folders, applications, system images, as well as Hyper-V and VMware images. Critical data can be backed up on the cloud, to a local storage device, or mirrored to both. Progent's backup and recovery consultants can provide advanced expertise to set up ProSight Data Protection Services to to comply with government and industry regulatory requirements such as HIPPA, FINRA, PCI and Safe Harbor and, when necessary, can assist you to recover your business-critical data. Read more about ProSight Data Protection Services managed cloud backup and recovery.

  • ProSight WAN Watch: Network Infrastructure Management
    ProSight WAN Watch is an infrastructure monitoring and management service that makes it easy and inexpensive for smaller organizations to map, monitor, enhance and debug their networking hardware such as routers and switches, firewalls, and wireless controllers plus servers, printers, endpoints and other devices. Using state-of-the-art RMM technology, ProSight WAN Watch makes sure that infrastructure topology maps are kept current, copies and displays the configuration of almost all devices on your network, monitors performance, and sends alerts when potential issues are discovered. By automating tedious network management processes, ProSight WAN Watch can cut hours off common chores such as network mapping, reconfiguring your network, finding appliances that require important software patches, or resolving performance problems. Find out more about ProSight WAN Watch infrastructure management services.

  • ProSight Systems Watch: Server and Desktop Monitoring
    ProSight Systems Watch is Progentís server and desktop and management subscription service that incorporates advanced remote monitoring and management techniques to keep your network operating efficiently by tracking the state of critical assets that power your information system. When ProSight Systems Watch detects an issue, an alert is sent automatically to your designated IT management staff and your assigned Progent engineering consultant so all looming problems can be addressed before they have a chance to disrupt productivity Find out more about ProSight Systems Watch server and desktop automated management consulting.
Fixed-price Security Assessment and Verification Packages
Progent has put together a selection of fixed-price security assessment bundles that provide exceptional value by utilizing Progent's advanced network monitoring software as well as Progent's consulting skills to produce an objective and comprehensive assessment of your IT environment security profile.
  • Security Inventory Service Packages for Small Organizations
    Progent offers two value-priced security inventory scanning packages intended to allow small organizations to get a professional security assessment from an accredited security engineer. With Progent's External Security Inventory Scan, an engineer administers an extensive assessment of your IT system from beyond your firewalled perimeter to determine possible gaps in the security posture you present to the public. With Progent's Internal Security Inventory Scan, a certified security consultant executes a network scan from an authorized machine within your corporate firewall to evaluate your exposure to inside attacks. The two security inventory scanning services are configured and executed from a secured offsite location. The scan is managed by an engineer who has been awarded advanced security certifications and who creates a report that describes and interprets the information collected by the security scan and recommend various enhancements where appropriate.
  • Security Vulnerability Evaluation Packages for Enterprises
    Progent offers three levels of set-price security assessment service packages designed for enterprises who want to meet compliance standards required by government or industry regulators. Progent's security assessment service bundles offer larger organizations an opportunity to obtain an objective assessment at the viability of their security profile. For each security assessment bundle, Progent consultants with top security credentials analyze and report on collected data and provide recommendations for cost-effective improvements. All the network security audit bundles include an extra-cost option for on-premises engineers anywhere in the United States.
  • Stealth Penetration Testing Services
    Stealth penetration testing, often known as PEN testing, is a critical tool for allowing businesses to find out how vulnerable their network systems are to modern threats. Progent's stealth penetration testing test how well your corporate security procedures and technologies resist authorized but unannounced penetration attempts managed by Progent's experienced security experts using advanced hacking techniques. Find out about Progent's stealth penetration testing services.
We've Been Hacked: What Do We Do?
Network Security ConsultantsIf your company is now experiencing a network security emergency and you have no detailed response procedure, go to Progent's Online Computer Help to find out how to receive fast assistance. Progent offers online help from skilled network technicians and can refer trouble tickets to certified security experts if required. Your company does not have to be a current Progent customer to receive urgent support for a security breach, but you can sign up as a Progent client in advance for free and your standing as a current client could save precious time in a crisis.

Usually, smaller businesses have no recovery procedure in the event of a successful attack. This is risky, because the damage from a successful security attack can be even more devastating for a small company than for a big enterprise. Progent's security specialists can help your company to design a practical recovery and event reporting procedure that reduces the network disruption resulting from a security breach. The formal incident response model promoted by Global Information Assurance Certification is Progent's suggested method for reacting to a major security attack.

High-value Security Services Offered by Progent
Progent's seasoned consultants offer expertise in vital facets of IT protection including:

  • Information Risk Evaluation and Compliance Testing
    Progent provides expertise with security evaluation tools such as MS Baseline Security Analyzer and LANguard for conducting a set of comprehensive system tests to identify potential security problems. Progent has broad experience with these tools and can assist your company to analyze audit results and respond appropriately. Progent's security consultants also provide web software testing and can perform thorough evaluation of enterprise-wide security to determine your organization's compliance with important global security standards including FISMA, PCI, and ISO 17799. Also, Progent can assess the effectiveness of your wireless protection covering fixed wireless equipment plus portable devices. Find out more information about Progent's Information Risk Audits and Security Compliance Testing.
  • Designing, Building, and Validating Protected Environments
    Any business ought to develop a thoroughly considered security strategy that includes both proactive and responsive activity. The proactive plan is a set of steps that works to minimize security holes. The reactive plan specifies procedures to help security personnel to assess the damage resulting from a breach, remediate the damage, record the experience, and restore business activity as quickly as possible. Progent can show you how to design security into your business operations, configure scanning software, create and implement a secure computer infrastructure, and propose procedures and policies to optimize the protection of your computing environment. Progent's security experts are ready to help you to set up a firewall, design secure remote connectivity to email and files, and install an effective VPN. If your company is interested in an affordable option for jobbing out your network security administration, Progent's 24x7 Network Support Services include continual remote system monitoring and fast response to problems.
  • Data Recovery and Security Forensics
    Progent has skill in recovering systems and devices that have been compromised, are in question, or have ceased to function following a security penetration. Progent can help evaluate the losses resulting from the assault, return your company to ordinary functions, and retrieve data lost owing to the attack. Progent's certified specialists can also oversee a thorough failure evaluation by going over event logs and using other proven forensics tools. Progent's background with security consulting minimizes your off-air time and permits Progent to propose efficient measures to avoid or contain new assaults.
  • Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Firewalls, and PIX Security Appliances Integration and Troubleshooting
    Cisco CCIE Security ExpertsThe latest generation of Cisco ASA 5500-X Family of firewalls with Firepower Services offer significantly more value than Cisco's previous PIX and ASA 5500 firewalls and have replaced the ASA 5500 and PIX security appliances for new installations. After Cisco's purchase of Sourcefire, the whole line of ASA 5500-X devices can be configured to support Firepower Services, based on Sourcefire's Snort technology, which is the market's most deployed intrusion protection system (IPS). Firepower services provide powerful new capabilities including advanced malware protection (AMP), URL filtering, dynamic threat analytics, and security automation. Progent's Cisco-qualified CCIE network experts can assist your company to maintain your legacy PIX or ASA 5500 security appliances or upgrade to ASA 5500-X firewalls with Firepower Services. Progent's consultants can provide online and onsite support for ASA 5500-X firewalls with Firepower Services and can assist your organization to plan, configure, optimize, administer and troubleshoot firewall solutions built around Cisco ASA 5500-X firewalls with Firepower Services. Find out more information about ASA 5500-X Firewalls with Firepower Services integration and troubleshooting services.
  • Other Firewall and VPN Solutions
    As well as supporting a wide range of protection technologies available from Microsoft and Cisco, Progent can provide small businesses top-level consulting for technologies from other major firewall and VPN suppliers such as:
  • SIEM Solutions
    Security information and event management (SIEM) software and services are intended to interpret the massive quantity of data collected in security incident logs created by multiple sources including network infrastructure appliances, operating systems, and application software and tools. SIEM software organizes the security event records from these various sources and produces consolidated reports of security incidents as mandated by government regulations and business compliance guidelines. Progent's GIAC-certified information assurance experts and Cisco-certified network experts can assist organizations to plan, deploy and manage a SIEM system that helps them to see the progress of attacks and comply with event reporting requirements. (See Progent's Security information and Event Management solutions.)
Progent's Security Certifications
Progent's security consultants have earned the most prestigious accreditations offered in the industry. These certifications demand exhaustive testing and proven work background to guarantee that candidates have acquired expertise with a significant amount of security information and techniques and can provide advanced consulting to information networks of any size.
  • Certified Information Security Manager Security Support Services
    Certified Information Security Manager defines the basic skills and worldwide standards of service that computer security professionals are expected to achieve. It offers executive management the assurance that those who have been awarded their certification possess the background and knowledge to offer efficient security administration and engineering services. Progent can provide a CISM-certified consultant to assist your enterprise in critical security areas such as data protection governance, vulnerability management, data protection program management, and incident response management. Read more information concerning Progent's Certified Information Security Manager Security Support Assistance.

  • CISSP Security Consulting Services
    Progent's Certified Information Systems Security Professionals (CISSPs) are security specialists who have earned CISSP accreditation as a result of demonstrated professional work, extensive study, and formal testing. CISSP Certification indicates mastery of a worldwide standard for IT security. American National Standards Institute has granted the CISSP status accreditation in the field of information security under ISO/IEC 17024. Areas of expertise covered within CISSP include security administration practices, security architecture and models, connection control methodology, applications development security, operations security, physical security, cryptography, communications, network security, and business continuity planning. Get additional information concerning Progent's Certified Information Systems Security Professionals (CISSP) Support Services.

  • ISSAP Consulting Services
    Progent's ISSAP qualified security consultants are experts who have earned ISSAP accreditation following thorough examination and significant experience. field experience with network security design. ISSAP consultants have comprehensive knowledge of access management systems and techniques, telecommunications and network security, cryptography, needs evaluation, business continuity planning (BCP) and disaster recovery planning (DRP), and physical security. Progent's ISSAP-qualified security specialists can assist your company with all aspects of secure network architecture. Learn more information about Progent's ISSAP Certified Secure Network Infrastructure Engineering Support.

  • Certified Information Systems Auditor Professional Services
    The Certified Information Systems Auditor credential is a recognized qualification that signifies mastery in information system security audit and control. Certified by ANSI, the CISA accreditation requires that consultants pass an exhaustive examination given by the ISACA international professional group. Progent offers the expertise of a CISA-qualified security audit professional trained to assist businesses in the areas of information systems audit process, information technology enforcement, systems and infrastructure lifecycle, IT service delivery, safeguarding data resources, and business continuity planning. Read additional information about Progent's CISA Professional Expertise.

  • Global Information Assurance Certification Support Services
    GIAC was established in 1999 to certify the knowledge of network security engineers. GIAC's goal is to ensure that an accredited professional possesses the skills necessary to provide services in key categories of network, data, and program security. GIAC certifications are recognized by companies and institutions throughout the world including and the United States National Security Agency (NSA). Progent can provide the support of GIAC certified consultants for any of the security capabilities addressed under GIAC accreditation topics including auditing IT infrastructure, security incident handling, intrusion detection, and web application security. Read more details about Progent's GIAC Consulting Expertise.
Contact Progent for Network Security Support
If you need network security help, phone Progent at 800-993-9400 or visit Contact Progent.

© 2002- 2018 Progent Corporation. All rights reserved.