Introduction to Progent's Security Support Services
Progent's industry certified network security experts can provide a wide range of services intended to assist businesses of any size to uncover and correct security vulnerabilities, block attacks, recover from the issues resulting from a breakdown of protection, and meet government requirements for protecting information and reporting security incidents. Progent offers a choice of service delivery models:

  • As-needed online and on-site assistance billed to the nearest minute
  • On-going managed services billed at an affordable flat monthly fee
  • Value-priced service bundles for a single security assessment
As-needed Security and Compliance Support Services
Once you register for Progent's services (registration is free), you can get as-needed remote or on-premises assistance from one of Progent security consultant. This classic support model is primarily reactive and optimized for quickly taking care of IT issues that are disrupting your productivity or that are beyond the scope of your own support personnel. Typical examples include configuring a firewall or VPN tunnel, implementing a critical security patch for a Cisco switch or router, setting up secure access to a public cloud, or recovering from a ransomware attack. These security services are invoiced to the nearest minute, which avoids the frustrating case of receiving big invoices for quick fixes.

Delivery options for Progent's on-demand support services include:

  • Online Security Support Services
    The majority security-related problems can be handled online via a combination of phone-based support and an connection between Progent's Technical Response Center (TRC) and a client's network. Progent's TRC group can provide remote security help by offering easy access to consultants with the background and technical resources to fix some of the most challenging issues quickly, keeping your service expenses low and minimizing lost productivity.
  • Onsite Security Support Services
    For cases where onsite assistance is necessary, Progent can send a technical professional to major metropolitan areas across the U.S. Progent can also dispatch a security consultant with high-level certifications and advanced skills to any site in the country.
Progent's security engineers are qualified to support environments based on Microsoft Windows, Linux, Mac, Solaris, and popular derivatives of UNIX. Progent's broad selection of services addresses firewall technology, e-mail systems, protected system design, and information restoration. Progent's support staff has earned the industry's top security credentials including CISM and ISSAP. Progent also offers immediate access to remote Cisco CCIE network infrastructure engineers who can provide advanced support with tough network technology problems.

ProSight Flat-rate Managed Services for Information Assurance
Progent's value-priced ProSight suite of outsourced network management services is intended to provide small and mid-size businesses with enterprise-class support and cutting-edge technology for all facets of information assurance and compliance. ProSight managed services offered by Progent include:

  • ProSight Email Guard: Inbound and Outbound Spam Filtering, Data Leakage Protection and Email Encryption
    ProSight Email Guard is Progent's email filtering and encryption solution that incorporates the services and infrastructure of leading information security vendors to provide centralized management and world-class security for all your email traffic. The hybrid structure of Email Guard integrates a Cloud Protection Layer with a local security gateway device to provide advanced defense against spam, viruses, Dos Attacks, DHAs, and other email-based malware. The Cloud Protection Layer acts as a preliminary barricade and blocks most threats from making it to your security perimeter. This reduces your exposure to inbound threats and saves system bandwidth and storage. Email Guard's onsite security gateway device adds a deeper level of analysis for inbound email. For outgoing email, the on-premises gateway provides AV and anti-spam filtering, policy-based Data Loss Prevention, and email encryption. The local security gateway can also help Microsoft Exchange Server to monitor and safeguard internal email traffic that stays inside your corporate firewall. Find out more about Progent's ProSight Email Guard spam filtering, virus blocking, content filtering and data loss protection.

  • ProSight Active Security Monitoring: Next Generation Endpoint Protection and Ransomware Recovery
    Progent's ProSight Active Security Monitoring (ASM) is an endpoint protection (EPP) solution that utilizes next generation behavior-based machine learning technology to guard endpoints as well as servers and VMs against new malware assaults like ransomware and file-less exploits, which routinely get by legacy signature-matching anti-virus products. ProSight Active Security Monitoring protects on-premises and cloud resources and offers a single platform to automate the complete threat lifecycle including blocking, identification, mitigation, cleanup, and forensics. Key features include one-click rollback with Windows Volume Shadow Copy Service and real-time network-wide immunization against new attacks. Find out more about Progent's ProSight Active Security Monitoring next-generation endpoint protection and ransomware recovery.

  • ProSight Data Protection Services: Managed Cloud Backup
    ProSight Data Protection Services offer small and mid-sized organizations a low cost end-to-end service for secure backup/disaster recovery (BDR). Available at a fixed monthly rate, ProSight DPS automates your backup processes and allows rapid recovery of critical data, applications and virtual machines that have become lost or damaged as a result of hardware breakdowns, software glitches, natural disasters, human mistakes, or malware attacks such as ransomware. ProSight Data Protection Services can help you back up, retrieve and restore files, folders, apps, system images, plus Microsoft Hyper-V and VMware images. Critical data can be protected on the cloud, to a local device, or mirrored to both. Progent's BDR specialists can provide advanced support to set up ProSight DPS to be compliant with government and industry regulatory requirements like HIPPA, FINRA, and PCI and, when needed, can help you to recover your business-critical information. Find out more about ProSight Data Protection Services Managed Backup.

  • ProSight WAN Watch: Infrastructure Remote Monitoring and Management
    Progentís ProSight WAN Watch is an infrastructure management service that makes it easy and affordable for smaller organizations to diagram, monitor, reconfigure and debug their networking appliances like routers, firewalls, and access points as well as servers, printers, endpoints and other networked devices. Using cutting-edge RMM technology, ProSight WAN Watch ensures that network maps are kept updated, captures and displays the configuration of virtually all devices on your network, tracks performance, and sends notices when issues are discovered. By automating complex management activities, WAN Watch can cut hours off ordinary tasks like making network diagrams, reconfiguring your network, finding devices that require critical software patches, or resolving performance problems. Find out more details about ProSight WAN Watch infrastructure monitoring and management services.

  • ProSight LAN Watch: Server and Desktop Monitoring and Management
    ProSight LAN Watch is Progentís server and desktop monitoring service that incorporates advanced remote monitoring and management (RMM) techniques to keep your IT system operating at peak levels by tracking the state of vital assets that drive your business network. When ProSight LAN Watch uncovers a problem, an alert is sent automatically to your designated IT management staff and your Progent engineering consultant so that any potential issues can be resolved before they can impact your network Find out more about ProSight LAN Watch server and desktop remote monitoring services.

  • ProSight Virtual Hosting: Hosted Virtual Machines at Progent's Tier III Data Center
    With ProSight Virtual Hosting service, a small business can have its critical servers and applications hosted in a protected Tier III data center on a high-performance virtual host configured and managed by Progent's network support experts. With Progent's ProSight Virtual Hosting model, the customer retains ownership of the data, the OS software, and the apps. Because the environment is virtualized, it can be moved easily to an alternate hosting solution without a lengthy and technically risky configuration process. With ProSight Virtual Hosting, your business is not tied a single hosting provider. Find out more details about ProSight Virtual Hosting services.

  • ProSight IT Asset Management: Network Documentation Management
    Progent's ProSight IT Asset Management service is an IT infrastructure documentation management service that makes it easy to capture, update, find and protect information related to your network infrastructure, processes, applications, and services. You can instantly find passwords or serial numbers and be warned about upcoming expirations of SSLs ,domains or warranties. By updating and managing your IT infrastructure documentation, you can eliminate up to half of time wasted trying to find critical information about your network. ProSight IT Asset Management includes a centralized location for storing and sharing all documents required for managing your business network such as standard operating procedures (SOPs) and self-service instructions. ProSight IT Asset Management also supports advanced automation for gathering and relating IT information. Whether youíre making improvements, performing regular maintenance, or reacting to a crisis, ProSight IT Asset Management delivers the data you need as soon as you need it. Find out more details about Progent's ProSight IT Asset Management service.
ProSight Network Audits
Progent's ProSight Network Audits are a fast and low-cost way for small and mid-size businesses to get an objective evaluation of the overall health of their information system. Powered by some of the top remote monitoring and management tools available, and overseen by Progent's certified team of information technology professionals, ProSight Network Audits show you how well the configuration of your essential network assets conform to best practices. The Basic and Advanced versions of ProSight Network Audit services are offered at a budget-friendly, one-time cost and provide immediate benefits such as a cleaner Active Directory environment. Both also include one year of advanced remote network monitoring and management (RMM). Benefits can include lower-cost management, improved compliance with information security standards, higher utilization of IT resources, faster problem resolution, more reliable backup and restore, and less downtime. Read more about ProSight Network Audits network infrastructure assessment.

The ProSight Ransomware Preparedness Report
The ProSight Ransomware Preparedness Report is an affordable service centered on a phone discussion with a Progent information assurance expert. The interview is intended to help evaluate your company's ability to stop or recover rapidly after a ransomware incident. Progent will consult with you personally to gather information about your existing security profile and backup platform, and Progent will then produce a written Basic Security and Best Practices Report describing how you can follow best practices to build a cost-effective security and backup system that aligns with your company's needs. For more information, see Progent's ProSight Ransomware Preparedness Report.

Set-price Security Assessment and Validation Packages
Progent has put together a selection of set-price security and compliance assessment packages that deliver exceptional value by utilizing Progent's enterprise-class system monitoring and analysis software as well as Progent's consulting skills to produce an objective and thorough assessment of your IT environment security posture.

  • Security Inventory Service Bundles for Small Organizations
    Progent offers two value-priced security inventory scanning packages intended to allow small businesses to get an objective security assessment from an accredited security engineer. With Progent's External Security Inventory Scan, an engineer manages a comprehensive examination of your network from beyond your firewalled perimeter to identify potential risks in the security posture you present to the outside. With Progent's Internal Security Inventory Scan, a certified security expert runs a system scan using an authorized computer within your firewalled perimeter to evaluate your vulnerability to internal assaults. The two security inventory scans are configured and run from a secured external site. The project is managed by an engineer who has earned high-level security certifications and who produces a document that details and interprets the information captured by the security scan and recommend practical improvements where required.
  • Security Vulnerability Evaluation Bundles for Large Organizations
    Progent offers three levels of set-price security evaluation service packages intended for enterprises who need to meet compliance standards required by government or industry regulators. Progent's security assessment service packages offer larger organizations a chance to get an objective assessment at the viability of their security profile. For each security assessment package, Progent engineers with top security credentials analyze and report on captured data and offer recommendations for efficient remediation. All the network security audit bundles include an added-cost option for on-premises consultants at any location in the United States.
  • Stealth Penetration Testing Services
    Stealth penetration testing, often referred to as PEN testing, is an accepted tool for allowing businesses to find out how vulnerable their network systems are to current-generation threats. Progent's stealth penetration testing test how effectively your existing security procedures and platforms resist authorized but unannounced penetration attempts managed by Progent's experienced security specialists utilizing advanced hacking methods. Read about Progent's stealth penetration testing services.
We've Been Hacked: What Can We Do Now?
Network Security ConsultantsIf your business is currently experiencing a security crisis and you have not prepared a formal response plan, visit Progent's Online Technical Support to see how to get fast help. Progent provides online technical support from skilled engineers and can escalate problems to certified security specialists if required. Your business does not have to be a registered Progent client to get emergency help for a security breakdown, but you can sign up as a Progent customer ahead of time for free and your standing as a registered client can save precious time when there is an emergency.

Typically, smaller organizations have no response plan in case of a successful attack. This is risky, since the cost of a successful security attack can be even more catastrophic for a small business than for a big enterprise. Progent's security engineers can assist your company to design an effective response and incident reporting plan that reduces the network disruption following a security breach. The formal incident handling procedure outlined by GIAC is Progent's recommended method for handling a major security penetration.

High-value Security Services Offered by Progent
Progent's certified security engineers can provide advanced support in vital areas of network security including:

  • Information Risk Evaluation and Security Compliance Testing
    Progent provides expertise with security auditing tools like Microsoft Baseline Security Analyzer and LANguard for conducting a variety of automatic system tests to reveal possible security problems. Progent has extensive skills with these and similar tools and can assist your company to understand audit reports and respond efficiently. Progent's security engineers also can perform web software testing and can perform thorough evaluation of corporate-wide security to determine your organization's compliance with major worldwide security specifications such as HIPAA, NIST, and ISO. In addition, Progent can evaluate the strength of your wireless security covering stationary wireless equipment plus mobile handsets. Find out more details concerning Progent's Information Risk Audits and Compliance Testing.
  • Planning, Building, and Testing Secure Environments
    Every company should have a thoroughly considered security strategy that incorporates both preventive and responsive elements. The pre-attack strategy is a set of precautions that works to minimize vulnerabilities. The reactive strategy defines activities to assist IT staff to inventory the damage resulting from an attack, repair the damage, document the experience, and revive network activity as quickly as possible. Progent can show you how to design protection into your business processes, set up auditing software, define and build a secure computer architecture, and propose procedures and policies that will enhance the protection of your information system. Progent's security professionals are available to help you to set up a firewall, design secure online and mobile access to email and data, and install an efficient virtual private network. If you are looking for an affordable way for jobbing out your network security management, Progent's Round-the-clock Monitoring Services feature automated online network monitoring and immediate response to problems.
  • System Recovery and Security Forensics
    Progent provides expertise in restoring networks and devices that have been hacked, are in question, or have stopped working because of a security attack. Progent can help evaluate the losses caused by the attack, restore normal business operations, and recover information lost owing to the event. Progent's security specialists can also perform a thorough forensic evaluation by going over activity logs and using other proven forensics techniques. Progent's background with security problems reduces your off-air time and permits Progent to recommend effective ways to prevent or mitigate new attacks.
  • Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Series Firewalls, and PIX Firewalls Integration and Troubleshooting
    Cisco CCIE Network Security EngineersThe latest generation of ASA 5500-X Series Next-Generation Firewalls with Firepower Services deliver substantially more value than Cisco's previous firewalls and have replaced the ASA 5500 and PIX 500 security appliances for new deployments. After Cisco's purchase of Sourcefire, the entire line of ASA 5500-X firewalls can be configured to support Firepower Services, built on Sourcefire's Snort technology, which is the market's most deployed intrusion protection system (IPS). Firepower services bring powerful new capabilities including advanced malware protection (AMP), URL filtering, real-time threat analytics, and automation. Progent's Cisco-certified CCIE network consultants can assist your company to maintain your legacy PIX or Cisco ASA 5500 firewalls and upgrade efficiently to ASA 5500-X firewalls with Firepower Services. Progent's consultants offer remote and on-premises support for ASA 5500-X firewalls with Firepower Services and can help your business to plan, deploy, optimize, administer and debug firewall solutions built on Cisco ASA 5500-X firewalls with Firepower Services. See additional details about Cisco ASA 5500-X Firewalls with Firepower configuration and debugging support.
  • Other Firewall and Virtual Private Network Solutions
    In addition to supporting a broad range of network security technologies available from Microsoft and Cisco, Progent offers small and mid-size companies top-level support for security products from other popular firewall and Virtual Private Network suppliers such as:
  • SIEM Solutions
    Security information and event management (SIEM) applications and services are intended to make sense the enormous amounts of information represented by security incident records generated by a wide range of sources including network infrastructure appliances, operating systems, and application software and monitoring tools. SIEM applications analyzes the security event records from these various sources and produces consolidated reports of security events as required by government regulations and industry compliance standards. Progent's GIAC-certified network security experts and Cisco CCIE certified network infrastructure consultants can help businesses to plan, install and manage a SIEM system that helps them to see the progress of attacks and comply with security incident reporting regulations. (See Progent's Security information and Event Management solutions.)
Progent's Security Certifications
Progent's security specialists have earned some of the most prestigious accreditations offered in the security industry. These accreditations demand extensive examinations and demonstrated field experience to guarantee that recipients have acquired expertise with a substantial body of security information and techniques and can provide advanced solutions to computer environments of any complexity.
  • Certified Information Security Manager (CISM) Security Consulting Expertise
    Certified Information Security Manager identifies the core competencies and worldwide standards of performance that computer security managers are expected to achieve. CISM offers business management the assurance that consultants who have been awarded their certification have the background and knowledge to offer effective security administration and consulting services. Progent can provide a CISM support professional to assist your organization in vital security disciplines including data protection governance, vulnerability management, data protection program control, and incident handling management. Read more information concerning Progent's CISM Security Support Assistance.

  • Certified Information Systems Security Professionals (CISSP) Security Consulting Expertise
    Progent's CISSP experts are security specialists who have earned CISSP certification as a result of demonstrated professional work, rigorous study, and formal examination. CISSP Certification recognizes mastery of an international standard for information security. ANSI has granted the CISSP credential accreditation in the area of information security under ISO/IEC 17024. Fields of knowledge included within CISSP include security management procedures, security design and models, access permission methodology, software development security, operations security, physical security, encryption, communications, network security, and disaster recovery planning. Learn additional details about Progent's CISSP Support Expertise.

  • ISSAP Engineering Support
    Progent's ISSAP certified security experts are consultants who have been awarded ISSAP status after rigorous testing and extensive experience. field experience with network security architecture. ISSAP consultants have in-depth knowledge of access management mechanisms and methodologies, telecommunications and network infrastructure protection, cryptography, needs evaluation, business continuity planning (BCP) and disaster recovery, and physical security. Progent's ISSAP-qualified security specialists can assist your business with all phases of secure network architecture. Learn more information about Progent's ISSAP Certified Secure IT Infrastructure Engineering Support.

  • Certified Information Systems Auditor Support Expertise
    The CISA credential is a globally recognized qualification that signifies mastery in information system security auditing. Certified by the American National Standards Institute, the CISA accreditation requires that consultants undergo a comprehensive test given by the ISACA professional group. Progent offers the expertise of a CISA-certified security engineer able to help companies in the areas of information systems audit services, information technology administration, network assets and architecture planned useful life, IT support, protecting information resources, and disaster recovery planning. Find out the details concerning Progent's CISA Support Services.

  • Global Information Assurance Certification Support Expertise
    GIAC (Global Information Assurance Certification) was established in 1999 to certify the knowledge of computer security engineers. GIAC's mission is to make sure that an accredited professional has the knowledge appropriate to deliver support in critical categories of network, data, and application program security. GIAC certifications are acknowledged by businesses and institutions throughout the world including and the United States National Security Agency. Progent offers the assistance of GIAC certified professionals for any of the network security disciplines addressed under GIAC certification topics including assessing perimeters, security incident handling, traffic analysis, and web-based application security. Get more information about Progent's GIAC (Global Information Assurance Certification) Consulting Expertise.
Get in Touch with Progent for Network Security Consulting Services
If you're trying to find network security help, phone Progent at 800-993-9400 or go to Contact Progent.

© 2002- 2018 Progent Corporation. All rights reserved.