Introduction to Progent's Security Consulting Services
Progent's industry certified network security consultants offer a wide range of support services designed to help organizations of all sizes to detect and correct security vulnerabilities, defend against attacks, remediate the problems resulting from a breakdown of protection, and meet regulatory mandates for reporting incidents. Progent can provide remote and in person service and also offers highly affordable set-price security evaluation packages to complement Progent's regular time-based pricing.

Service delivery alternatives available from Progent include:

  • On-line Security Services
    Most security issues can be addressed online via a mix of phone-based support and remote data connections between Progent's Technical Response Center (TRC) and the client's computer system. Progent's TRC support team includes network security professionals with the knowledge and experience and technical resources to solve some of the most intractable problems quickly, keeping your support costs reasonable and reducing downtime. Progent provides security support on a by-the-minute model with no minimum charges for remote support. Progent's billing policy avoids situations where simple solutions result in big charges. Progent also has available a number of set-price online security assessment bundles that represent extraordinary value by leveraging Progent's sophisticated system monitoring software plus Progent's consulting expertise to produce an objective and actionable picture of your network security profile.

  • Onsite Security Services
    In cases in which on-premises support is needed, Progent can send a service professional to major cities throughout the United States Progent's security engineers are also available to assist with projects that call for high-level security specialists to be on site anywhere in the U.S., and Progent's most advanced security evaluation packages for large businesses include the participation of a team of qualified security experts at your location.

  • Time-critical Security Support Services
    For fast assistance with computer security issues, your company can have access to a world-class online support expert by contacting Progent's team of security professionals at Progent's TRC. Progent's emergency online security service staff is ready to provide effective and economical help with security issues that are impacting the productivity of your information system. Progent's accredited consultants are certified to provide help for systems based on Microsoft, Linux, Macintosh, Solaris, and popular derivatives of UNIX. Progent's wide array of consulting services covers firewall technology, e-mail security, secure network design, and data restoration. Progent's technical support team has been awarded the industry's top security accreditations including CISM and CISSP. Progent also can provide immediate access to remote Cisco CCIE network infrastructure consultants who can deliver world-class assistance with tough network integration issues.

Our Network Has Been Hacked: What Should We Do Now?
Network Security ConsultantsIf your company is now faced with a network security crisis and you do not have a formal recovery procedure, visit Progent's Online Technical Help to find out how to get fast assistance. Progent provides remote help from experienced network technicians and can refer trouble tickets to certified security specialists if necessary. Your company does not need to be a current Progent client to receive urgent help for a security problem, but you can register as a Progent customer in advance at no cost and your status as a current client could save precious time when there is an emergency.

Usually, smaller companies have no response procedure in case of a damaging attack. This is risky, since the cost of a serious security attack can be more devastating for a small business than for a large corporation. Progent's security consultants can help your you to design a sensible recovery and incident reporting plan that reduces the network disruption following a security breach. The step-by-step incident response model outlined by Global Information Assurance Certification is Progent's suggested procedure for reacting to a major security penetration.

Practice Areas of Progent's Security Support Services
Managing network protection as well as preparation for restoring vital data and functions after an attack demands a continual program involving an array of technologies and procedures. Progent's security experts can assist your business at any level in your efforts to protect your IT system and stay in compliance, Services range from security audits to designing a complete security strategy. Key technologies supported by Progent's security consultants include Security Planning and Prevention, Data Restoration and Security Failure Analysis, plus Outsourced Protection from Email-Borne Attacks.

  • Designing, Implementing, and Testing Secure Networks
    Every business should have a thoroughly considered security plan that includes both proactive and responsive steps. The proactive strategy is a collection of precautions that works to reduce vulnerabilities. The post-attack plan defines activities to help security staff to inventory the losses caused by an attack, remediate the damage, record the experience, and revive business activity as soon as possible. Progent can show you how to incorporate protection into your business operations, set up scanning software, define and build a secure IT infrastructure, and recommend procedures and policies that will enhance the protection of your network. Progent's security professionals are ready to assist you to set up a firewall, design safe online and mobile access to e-mail and data, and install an efficient virtual private network. If your company is looking for an economical way for jobbing out your security administration, Progent's 24x7 Monitoring Services feature automated remote system tracking and fast resolution of emergencies.
  • System Recovery and Security Forensics
    Progent provides expertise in recovering networks and servers that have been hacked, are in question, or have failed because of a security penetration. Progent can show you how to evaluate the damage caused by the breach, restore normal business operations, and retrieve data lost owing to the attack. Progent's security specialists can also perform a thorough forensic analysis by going over activity logs and utilizing other advanced forensics tools. Progent's background with security issues reduces your business disruption and permits Progent to recommend efficient measures to prevent or contain future attacks.
  • Email Security with Spam Filtering, Virus Defense, Content Filtering, and Data Leakage Protection
    Email Guard is Progent's email filtering and encryption solution that uses the technology of leading data security vendors to provide web-based control and comprehensive protection for your email traffic. The hybrid structure of Progent's Email Guard managed service integrates a Cloud Protection Layer with a local security gateway appliance to offer advanced defense against spam, viruses, Denial of Service (DoS) Attacks, Directory Harvest Attacks, and other email-borne malware. The Cloud Protection Layer acts as a preliminary barricade and blocks the vast majority of threats from reaching your security perimeter. This reduces your exposure to inbound attacks and conserves network bandwidth and storage space. Email Guard's onsite security gateway device provides a deeper layer of inspection for inbound email. For outgoing email, the onsite gateway offers AV and anti-spam filtering, protection against data leaks, and email encryption. The local gateway can also assist Exchange Server to monitor and safeguard internal email traffic that originates and ends within your security perimeter. Learn more about Progent's Email Guard Spam Filtering, Virus Blocking, Email Content Filtering and Data Leakage Prevention.
Advanced Security Expertise Offered by Progent
Progent's veteran consultants offer consulting support in vital facets of IT compliance including:
  • Vulnerability Evaluation and Compliance Testing
    Progent offers expertise with security evaluation tools such as MS Baseline Security Analyzer and LANguard for conducting a variety of automatic network scans to uncover potential security holes. Progent has extensive experience with these and similar tools and can assist your company to understand assessment reports and react efficiently. Progent's security engineers also offer web application testing and can conduct thorough evaluation of corporate-wide security to confirm your company's compliance with important industry security standards such as FISMA, NIST, and ISO 17799. In addition, Progent can evaluate the strength of your wireless security covering stationary wireless appliances plus mobile devices. Learn more information concerning Progent's Security Vulnerability Evaluation and Security Compliance Assessment.
  • Security Inventory Scanning Packages for Small Companies
    Progent offers two low-cost security inventory scanning packages designed to enable small businesses to get a professional security evaluation from a qualified security engineer. With Progent's External Network Security Inventory Scan, a security expert runs an extensive test of your IT infrastructure from beyond your firewalled perimeter to uncover possible risks in the security posture you expose to the outside world. With Progent's Internal Security Inventory Checkup, a security engineer runs a network scan from an authorized machine inside your company firewall to assess vulnerabilities to inside assaults. Both security inventory packages are configured and executed from a secured remote location. The project is managed by a consultant with top security accreditations who generates a report that details and interprets the data captured by the scan and proposes practical improvements if appropriate.
  • Security Evaluation Bundles for Large Companies
    Progent's certified security engineers can provide a range of fixed-cost network security evaluation packages designed for enterprises who have to comply with security standards demanded by government agencies or by customers. Progent's security assessment bundles offer larger businesses a chance to receive an independent opinion about the strength of their security environment. For each security evaluation package, Progent engineers with top security credentials analyze and summarize collected data and make recommendations for efficient improvements. The various network security evaluation bundles feature an added-cost alternative for on-premises engineers anywhere in the U.S.
  • Migrating from ISA Server and Microsoft Forefront Threat Management Gateway
    Microsoft ISA Server and its replacement Forefront TMG are software platforms that contain an application-aware firewall that can defend systems from external and inside attacks. Both platforms provide deep inspection of Internet protocols to detect threats that can get by traditional firewalls. Microsoft Internet Security and Acceleration Server was superseded by Forefront TMG, which is built on ISA Server's technology while delivering a variety of improved capabilities. Forefront TMG 2010 has in turn been discontinued by Microsoft, and the security features provided by the product are now commonly taken over by dedicated physical appliances from companies such as Cisco, Barracuda, SonicWALL and WatchGuard. (See Cisco ASA Firewall with Firepower Services integration and support.) Progent provides advanced Microsoft Forefront TMG support services and ISA Server 2006 consulting services to help you manage and debug your older firewall environment, and Progent can help you to migrate efficiently to a more current firewall solution by providing planning, configuration, optimization, training and troubleshooting.
  • Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Firewalls, and PIX Security Appliances Configuration and Troubleshooting
    Cisco Certified CCIE Network Security ExpertsThe current Cisco ASA 5500-X Series of firewalls with Firepower Services deliver substantially more bang for the buck than Cisco's earlier PIX and ASA 5500 firewalls and have superseded the ASA 5500 and PIX firewalls for new deployments. After Cisco's acquisition of Sourcefire, the whole line of Cisco ASA 5500-X firewalls can be provisioned to support Firepower Services, based on Sourcefire's Snort technology, which is the market's most deployed network intrusion protection system (IPS). Firepower services bring powerful new capabilities such as advanced malware protection (AMP), URL filtering, real-time threat analytics, and security automation. Progent's Cisco-qualified CCIE network consultants can assist you to maintain your existing PIX or ASA 5500 firewalls and upgrade efficiently to ASA 5500-X firewalls with Firepower Services. Progent's consultants offer remote and on-premises help with ASA 5500-X firewalls with Firepower Services and can help your organization to design, deploy, tune, administer and troubleshoot firewall environments built on Cisco ASA 5500-X firewalls with Firepower Services. Find out more details about ASA 5500-X Firewalls with Firepower integration and troubleshooting services.
  • Other Firewall and Virtual Private Network (VPN) Solutions
    In addition to being expert in a wide range of protection technologies from Microsoft and Cisco, Progent can provide small organizations expert engineering services for solutions from other important firewall and VPN suppliers including:
  • SIEM Security Information and Event Management Solutions
    Security information and event management (SIEM) applications and services are designed to digest the enormous amounts of information represented by security incident logs generated by multiple sources including network appliances, servers, and applications and monitoring tools. SIEM applications analyzes the security event records from these diverse sources and produces consolidated reports of security events as mandated by government regulations and business compliance standards. Progent's GIAC-certified information assurance consultants and Cisco CCIE certified network infrastructure experts can help businesses to design, deploy and manage a SIEM system that enables them to see the progress of attacks and comply with security incident reporting regulations. (See Progent's Security information and Event Management solutions.)
Progent's Security Accreditations
Progent's security consultants have earned some of the most respected accreditations available in the security industry. All of these certifications demand extensive testing and proven field background to ensure that recipients have mastered a significant body of security information and methodologies and can offer high-level consulting to computer networks of any complexity.
  • CISM Security Support Expertise
    Certified Information Security Manager identifies the fundamental competencies and international standards of performance that IT security professionals are expected to achieve. CISM offers business management the assurance that those who have been awarded their certification have the background and skill to offer efficient security administration and consulting services. Progent can offer a CISM consultant to help your enterprise in vital security disciplines including data protection governance, vulnerability assessment, information protection process control, and crisis handling support. Find out the details concerning Progent's CISM Security Support Expertise.
  • Certified Information Systems Security Professionals (CISSP) Security Support Expertise
    Progent's CISSP experts are security specialists who have been awarded CISSP accreditation as a result of verified professional work, extensive study, and exhaustive examination. CISSP Certification recognizes mastery of a worldwide standard for IT security. American National Standards Institute has given the CISSP status official recognition in the area of IT security under ISO/IEC 17024. Areas of knowledge covered under CISSP include security administration practices, security design and test systems, connection permission systems, software development security, business processes security, physical security, encryption, telecommunications, Internet security, and business continuity planning. Find out the details about Progent's CISSP Consulting Expertise.
  • Information Systems Security Architecture Professionals (ISSAP) Consulting Services
    Progent's ISSAP certified security experts are consultants who have been awarded ISSAP status following thorough testing and extensive hands-on work with network security architecture. ISSAP consultants have in-depth knowledge of access management mechanisms and techniques, phone system and network infrastructure security, cryptography, needs evaluation, business continuity and DRP, and physical security. Progent's ISSAP-qualified security consultants can help your business with all phases of architecture security. Get additional information concerning Progent's ISSAP Accredited Protected IT Infrastructure Engineering Services.
  • Certified Information Systems Auditor (CISA) Consulting Services
    The CISA accreditation is a globally recognized qualification that indicates expertise in information system security auditing. Certified by the American National Standards Institute (ANSI), the CISA accreditation has consultants undergo an extensive test given by the ISACA international professional association. Progent can provide the services of a CISA-qualified security audit professional able to help companies in the areas of IS audit services, information technology enforcement, systems and architecture lifecycle, IT service delivery, protecting information resources, and business continuity preparedness. Find out more details concerning Progent's Certified Information Systems Auditor (CISA) Professional Expertise.
  • GIAC (Global Information Assurance Certification) Support Expertise
    Global Information Assurance Certification was established in 1999 to validate the knowledge of IT security engineers. GIAC's goal is to make sure that an accredited professional has the knowledge necessary to provide support in key categories of network, data, and application software security. GIAC accreditations are recognized by companies and institutions around the world including and the U.S. National Security Agency. Progent offers the support of certified security engineers for all of the security disciplines covered under GIAC certification topics such as assessing perimeters, security incident handling, traffic analysis, and web application security. Learn additional information concerning Progent's GIAC Consulting Services.
Contact Progent for Network Security Help
If you're trying to find security engineering help, phone Progent at 800-993-9400 or refer to Contact Progent.
















© 2002- 2017 Progent Corporation. All rights reserved.