Introduction to Progent's Security and Compliance Consulting Services
Progent's industry certified computer security and compliance professionals offer a wide selection of services intended to help organizations of all sizes to identify and correct security weaknesses, block attacks, remediate the issues caused by a breach of protection, and meet regulatory mandates for protecting data and reporting security incidents. Progent offers a choice of service delivery models:

  • As-needed remote and on-premises support billed to the nearest minute
  • On-going managed services billed at an affordable flat monthly rate
  • Value-priced service packages for a single security evaluation
As-needed Security Consulting Services
Once you register for Progent's services (registration is free), you can receive as-needed online or onsite assistance from a Progent security and compliance consultant. This classic support model is essentially reactive and optimized for rapidly taking care of technical issues that are impacting your productivity or that have stymied your in-house support staff. Typical scenarios include replacing a firewall appliance or VPN connection, implementing a critical security update for a Cisco switch, setting up compliant access to cloud-based resources, or recovering from a ransomware assault. These services are billed to the nearest minute, which eliminates the frustrating case of getting large invoices for quick fixes.

Delivery alternatives for Progent's as-needed support include:

  • Remote Security Services
    Most security-related issues can be handled online via a mix of phone-based support and an connection between Progent's Technical Response Center (TRC) and a client's network. Progent's Technical Response Center can deliver online security help by offering efficient access to consultants who have the experience and resources to resolve some of the most difficult problems quickly, making your support costs affordable and reducing lost productivity.
  • On-premises Security Support Services
    For cases where on-premises assistance is required, Progent can send a technical professional to major cities across the United States. Progent can also send a security consultant with top certifications and world-class skills to any site in the country.
Progent's security engineers are certified to support systems based on Windows, Linux, Mac, Solaris, and major derivatives of UNIX. Progent's wide selection of services covers firewall configuration, e-mail systems, protected network architecture, and data restoration. Progent's support staff has earned the industry's most advanced security accreditations including Certified Information Systems Auditor (CISA) and Information System Security Architecture Professional (ISSAP). Progent also can provide immediate access to remote Cisco-certified CCIE network infrastructure consultants who can deliver advanced support with tough network configuration problems.

ProSight Fixed-price Managed Services for Information Assurance
Progent's value-priced ProSight line of network monitoring and management services is intended to provide small and mid-size organizations with enterprise-class support and state-of-the-art technology for all aspects of information assurance and compliance. Managed services available from Progent include:

  • ProSight Active Security Monitoring (ASM): Next Generation Endpoint Protection and Ransomware Defense
    Progent's ProSight Active Security Monitoring (ASM) is an endpoint protection solution that utilizes next generation behavior analysis technology to guard endpoint devices as well as servers and VMs against new malware assaults such as ransomware and email phishing, which routinely get by legacy signature-based anti-virus products. ProSight Active Security Monitoring protects on-premises and cloud resources and offers a unified platform to manage the entire malware attack lifecycle including blocking, detection, containment, remediation, and forensics. Top features include single-click rollback using Windows Volume Shadow Copy Service (VSS) and real-time system-wide immunization against newly discovered threats. Learn more about Progent's ProSight Active Security Monitoring (ASM) endpoint protection and ransomware defense.

  • ProSight Enhanced Security Protection: Unified Endpoint Protection
    Progent's ProSight Enhanced Security Protection (ESP) managed services deliver affordable in-depth protection for physical and virtual servers, workstations, mobile devices, and Exchange Server. ProSight ESP uses contextual security and advanced machine learning for continuously monitoring and reacting to cyber assaults from all attack vectors. ProSight ESP offers firewall protection, intrusion alerts, endpoint management, and web filtering through leading-edge technologies packaged within one agent accessible from a unified console. Progent's data protection and virtualization experts can assist your business to design and configure a ProSight ESP deployment that addresses your organization's unique requirements and that allows you demonstrate compliance with legal and industry data protection regulations. Progent will help you specify and configure security policies that ProSight ESP will enforce, and Progent will monitor your IT environment and respond to alerts that require urgent action. Progent can also help you to set up and test a backup and disaster recovery solution such as ProSight Data Protection Services so you can get back in business quickly from a potentially disastrous cyber attack such as ransomware. Read more about Progent's ProSight Enhanced Security Protection unified endpoint security and Exchange filtering.

  • ProSight DPS: Managed Cloud Backup
    ProSight Data Protection Services offer small and mid-sized organizations a low cost end-to-end solution for reliable backup/disaster recovery (BDR). Available at a low monthly rate, ProSight Data Protection Services automates and monitors your backup processes and allows rapid restoration of critical files, apps and VMs that have become lost or damaged as a result of hardware breakdowns, software glitches, natural disasters, human mistakes, or malicious attacks like ransomware. ProSight Data Protection Services can help you protect, retrieve and restore files, folders, apps, system images, as well as Microsoft Hyper-V and VMware virtual machine images. Critical data can be backed up on the cloud, to a local storage device, or to both. Progent's BDR specialists can provide world-class expertise to configure ProSight DPS to be compliant with government and industry regulatory requirements such as HIPPA, FINRA, PCI and Safe Harbor and, whenever needed, can assist you to restore your critical data. Find out more about ProSight DPS Managed Backup.

  • ProSight Email Guard: Inbound and Outbound Spam Filtering, Data Leakage Protection and Content Filtering
    ProSight Email Guard is Progent's email security solution that incorporates the technology of leading information security companies to deliver web-based management and comprehensive security for all your email traffic. The hybrid structure of Progent's Email Guard managed service integrates cloud-based filtering with an on-premises security gateway appliance to offer complete defense against spam, viruses, Dos Attacks, DHAs, and other email-borne threats. The cloud filter acts as a preliminary barricade and blocks the vast majority of unwanted email from making it to your security perimeter. This reduces your exposure to inbound attacks and saves system bandwidth and storage space. Email Guard's onsite gateway device provides a further layer of inspection for incoming email. For outbound email, the onsite security gateway offers anti-virus and anti-spam protection, policy-based Data Loss Prevention, and encryption. The onsite gateway can also help Microsoft Exchange Server to monitor and protect internal email traffic that originates and ends inside your security perimeter. Learn more about Progent's ProSight Email Guard spam filtering, virus blocking, content filtering and data loss prevention.

  • ProSight WAN Watch: Infrastructure Remote Monitoring and Management
    Progentís ProSight WAN Watch is an infrastructure management service that makes it easy and inexpensive for small and mid-sized businesses to map, track, reconfigure and debug their connectivity hardware such as switches, firewalls, and load balancers plus servers, printers, endpoints and other networked devices. Using cutting-edge Remote Monitoring and Management technology, WAN Watch ensures that infrastructure topology maps are kept updated, captures and manages the configuration of almost all devices on your network, tracks performance, and sends alerts when problems are detected. By automating tedious network management activities, WAN Watch can knock hours off common chores such as making network diagrams, reconfiguring your network, finding devices that need important software patches, or isolating performance bottlenecks. Learn more details about ProSight WAN Watch network infrastructure management consulting.

  • ProSight LAN Watch: Server and Desktop Monitoring and Management
    ProSight LAN Watch is Progentís server and desktop remote monitoring service that uses state-of-the-art remote monitoring and management (RMM) techniques to keep your IT system running at peak levels by tracking the health of vital assets that drive your business network. When ProSight LAN Watch detects a problem, an alert is transmitted immediately to your specified IT management staff and your Progent engineering consultant so that all looming problems can be addressed before they have a chance to impact productivity Find out more details about ProSight LAN Watch server and desktop monitoring consulting.

  • ProSight Virtual Hosting: Hosted Virtual Machines at Progent's World-class Data Center
    With Progent's ProSight Virtual Hosting service, a small or mid-size business can have its key servers and apps hosted in a secure fault tolerant data center on a high-performance virtual host set up and maintained by Progent's IT support experts. With Progent's ProSight Virtual Hosting service model, the customer retains ownership of the data, the OS platforms, and the applications. Because the system is virtualized, it can be ported easily to a different hardware environment without requiring a lengthy and difficult configuration process. With ProSight Virtual Hosting, you are not tied one hosting service. Find out more about ProSight Virtual Hosting services.

  • ProSight IT Asset Management: Network Documentation Management
    ProSight IT Asset Management service is a cloud-based IT documentation management service that makes it easy to create, maintain, find and safeguard data related to your IT infrastructure, procedures, business apps, and services. You can quickly find passwords or serial numbers and be alerted automatically about impending expirations of SSLs or domains. By updating and organizing your IT documentation, you can eliminate up to 50% of time thrown away searching for vital information about your network. ProSight IT Asset Management includes a common repository for storing and collaborating on all documents related to managing your business network like recommended procedures and How-To's. ProSight IT Asset Management also supports advanced automation for gathering and relating IT information. Whether youíre making enhancements, doing regular maintenance, or responding to a crisis, ProSight IT Asset Management delivers the data you require when you need it. Learn more about ProSight IT Asset Management service.
ProSight Network Audits
Progent's ProSight Network Audits are a fast and affordable alternative for small and medium-size organizations to get an objective assessment of the overall health of their information system. Powered by some of the leading remote monitoring and management platforms available, and overseen by Progent's certified group of information technology professionals, ProSight Network Audits help you see how well the configuration of your core infrastructure assets adhere to leading practices. The Basic and Advanced options for ProSight Network Audit services are available at a low, one-time cost and provide immediate benefits like a more manageable Active Directory environment. Both versions also come with one year of cutting-edge remote network monitoring and management (RMM). Benefits can include lower-cost network management, better compliance with government and industry security requirements, more efficient utilization of network resources, quicker troubleshooting, more dependable backup and recovery, and higher availability. Read more about ProSight Network Audits IT infrastructure review.

Progent's ProSight Ransomware Preparedness Report Service
The ProSight Ransomware Preparedness Report is a low-cost service centered on a brief discussion with a Progent backup/recovery expert. The fact-finding interview is intended to help evaluate your company's ability to block or recover quickly after a ransomware incident. Progent will consult with you personally to gather information about your existing antivirus tools and backup/recovery system, and Progent will then deliver a custom Basic Security and Best Practices Report describing how you can follow best practices to create an efficient security and backup/recovery system that aligns with your company's needs. For additional information, visit The ProSight Ransomware Preparedness Report Service.

Set-price Security Evaluation and Validation Packages
Progent has put together a selection of set-price security and compliance evaluation bundles that provide exceptional value by deploying Progent's advanced network monitoring software plus Progent's consulting skills to create an unbiased and comprehensive evaluation of your IT environment security posture.

  • Security Assessment Service Packages for Small Businesses
    Progent offers two ultra-affordable security inventory service packages intended to allow small businesses to obtain a professional security evaluation from an accredited security consultant. With Progent's External Security Inventory Scan, a consultant administers an extensive assessment of your network from beyond your firewalled perimeter to determine possible risks in the security posture you present to the public. With Progent's Internal Security Inventory Scan, a certified security consultant runs a network scan using an authorized machine inside your company firewall to assess your exposure to internal attacks. The two security inventory scanning services are configured and executed from a secured offsite location. The project is administered by an engineer who has been awarded advanced security certifications and who produces a document that details and evaluates the data captured by the security scan and recommend various improvements where required.
  • Security Vulnerability Assessment Bundles for Large Businesses
    Progent offers three levels of set-price security assessment service packages designed for enterprises who need to meet compliance standards required by state or industry regulators. Progent's security evaluation service packages offer enterprises a chance to obtain an objective assessment at the viability of their security profile. For each security assessment package, Progent consultants with top security credentials study and report on captured data and provide recommendations for efficient improvements. All the network security assessment bundles include an extra-cost option for onsite engineers at any location in the United States.
  • Stealth Penetration Testing
    Stealth penetration testing, commonly referred to as PEN testing, is an accepted technique for allowing businesses to determine how open their IT systems are to modern threats. Progent's stealth penetration testing services test how effectively your existing security procedures and platforms resist authorized but unannounced intrusion attempts launched by Progent's experienced security specialists using advanced hacking methods. Find out about Progent's stealth penetration testing (PEN Test) services.
Our System Has Been Hacked: What Are We Supposed to Do?
Network Security ConsultantsIf your company is now fighting a security crisis and you have not prepared a detailed recovery plan, refer to Progent's Online Network Support to see how to receive fast help. Progent offers online assistance from skilled network technicians and can refer problems to certified security specialists if required. Your business does not have to be a current Progent customer to receive emergency support for a security breakdown, but you can register as a Progent client in advance at no cost and your status as a registered client can save precious time during a crisis.

Usually, smaller businesses do not have a recovery plan in case of a successful attack. This is risky, since the cost of a serious security assault can be more devastating for a small business than for a big corporation. Progent's security specialists can assist your business to design a practical response and incident reporting procedure that reduces the network disruption following a security breach. The step-by-step incident response procedure outlined by Global Information Assurance Certification is Progent's preferred method for reacting to a major security incident.

High-value Security Services Available from Progent
Progent's veteran consultants can provide consulting support in vital facets of IT compliance such as:

  • Security Vulnerability Audits and Compliance Testing
    Progent offers experience with information risk evaluation software such as Microsoft Baseline Security Analyzer or LANguard for conducting a set of automatic network tests to reveal possible security gaps. Progent has broad experience with these tools and can assist your company to analyze audit reports and react appropriately. Progent's certified security consultants also provide web software validation and can conduct expert assessments of enterprise-wide security to verify your company's compliance with key industry security standards including FISMA, PCI, and ISO. In addition, Progent can evaluate the effectiveness of your wireless protection covering stationary wireless appliances plus portable devices. Find out the details about Progent's Vulnerability Audits and Compliance Testing.
  • Designing, Implementing, and Testing Protected Environments
    Any business should have a thoroughly considered security strategy that includes both preventive and responsive steps. The proactive strategy is a collection of steps that works to reduce vulnerabilities. The post-attack plan defines procedures to assist security staff to assess the losses caused by a breach, remediate the damage, document the event, and restore business functions as quickly as possible. Progent can advise you how to build protection into your company processes, install scanning software, define and execute a safe network architecture, and recommend procedures and policies to maximize the safety of your information system. Progent's security professionals are ready to assist you to configure a firewall, deploy secure remote access to e-mail and files, and install an efficient virtual private network. If your company is looking for an economical way for outsourcing your security administration, Progent's 24x7 Monitoring Services feature non-stop online network monitoring and quick resolution of emergencies.
  • System Restoration and Security Forensics
    Progent offers expertise in restoring networks and servers that have been hacked, are in question, or have stopped working because of a security breach. Progent can help determine the damage resulting from the breach, return your company to ordinary business operations, and retrieve data lost as a result of the attack. Progent's security specialists can also perform a comprehensive forensic evaluation by going over event logs and utilizing other advanced assessment tools. Progent's background with security consulting minimizes your off-air time and allows Progent to suggest effective measures to prevent or contain future assaults.
  • Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Firewalls, and PIX Security Appliances Integration and Troubleshooting
    Cisco Certified CCIE Security ExpertsThe new ASA 5500-X Series Next-Generation Firewalls with Firepower Services provide significantly more value than Cisco's earlier PIX and ASA 5500 firewalls and have superseded the ASA 5500 and PIX 500 security appliances for all new installations. Since Cisco's acquisition of Sourcefire, the whole line of Cisco ASA 5500-X devices can be provisioned to support Firepower Services, based on Sourcefire's Snort product, which is the market's most deployed intrusion protection system. Firepower services provide enhanced features such as advanced malware protection (AMP), URL filtering, dynamic threat analytics, and automation. Progent's Cisco-certified CCIE network experts can assist your company to manage your existing PIX or Cisco ASA 5500 security appliances or migrate to Cisco ASA 5500-X firewalls with Firepower Services. Progent's consultants can provide online and on-premises support for ASA 5500-X firewalls with Firepower Services and can assist your business to plan, configure, optimize, administer and troubleshoot firewall solutions built around Cisco ASA 5500-X firewalls with Firepower Services. Find out additional details about Cisco ASA Firewalls with Firepower integration and troubleshooting services.
  • Additional Firewall and Virtual Private Network Technologies
    In addition to supporting a broad array of security technologies from Microsoft and Cisco, Progent offers small and mid-size organizations expert engineering services for technologies from other popular firewall and Virtual Private Network (VPN) vendors including:
  • SIEM Solutions
    Security information and event management (SIEM) applications and services are designed to digest the massive quantity of information represented by security event records generated by multiple sources such as network appliances, servers, and applications and tools. SIEM software analyzes the security logs from these diverse sources and produces summary reports of security events as mandated by state regulations and business compliance standards. Progent's GIAC-certified network security experts and Cisco-certified network experts can assist businesses to plan, install and manage a SIEM system that helps them to understand the progress of security incidents and comply with security incident reporting requirements. (See Progent's SIEM solutions.)
Progent's Security Certifications
Progent's security specialists have been awarded some of the most respected certifications offered in the security industry. All of these certifications require exhaustive testing and proven work experience to ensure that recipients have mastered a significant body of security knowledge and methodologies and can provide advanced consulting to computer networks of any complexity.
  • Certified Information Security Manager Security Support Services
    CISM identifies the fundamental competencies and international standards of performance that information technology security professionals are expected to achieve. CISM offers business management the confidence that those who have been awarded their accreditation possess the experience and skill to offer efficient security administration and consulting services. Progent can provide a CISM-certified support professional to assist your organization in vital security disciplines such as data security governance, vulnerability assessment, information protection program management, and incident handling management. Get more details about Progent's CISM Security Consulting Assistance.

  • Certified Information Systems Security Professionals (CISSP) Security Consulting Services
    Progent's CISSP experts are security specialists who have earned CISSP certification through demonstrated experience, rigorous study, and formal testing. CISSP Certification indicates mastery of an international standard for information security. ANSI has given the CISSP credential accreditation in the field of information security under ISO/IEC 17024. Fields of knowledge included within CISSP include security administration procedures, security design and models, connection control systems, software development security, business processes security, physical security, cryptography, communications, Internet security, and business continuity planning. Read additional information about Progent's Certified Information Systems Security Professionals (CISSP) Support Services.

  • CISSP-ISSAP Security Architecture Consulting Support
    Progent's CISSP-ISSAP qualified cybersecurity architecture consultants have been awarded ISSAP certification following rigorous testing and substantial hands-on work with network security design. ISSAP consultants have comprehensive understanding of access management mechanisms and methodologies, phone system and network protection, cryptography, needs evaluation, BCP and DRP, and physical security integration. Progent's CISSP-ISSAP-qualified security experts can help your company with all aspects of secure network architecture. Read additional information concerning Progent's ISSAP Accredited Protected IT Infrastructure Consulting Services.

  • CISA Professional Expertise
    The Certified Information Systems Auditor accreditation is a prestigious achievement that represents mastery in information system security audit and control. Certified by the American National Standards Institute, the CISA credential requires that candidates pass an exhaustive test given by the ISACA international professional group. Progent offers the services of a CISA-certified security consultant trained to assist businesses in the fields of information systems audit process, information technology enforcement, network assets and infrastructure planned useful life, IT support, safeguarding data resources, and business continuity preparedness. Find out more details about Progent's CISA Professional Services.

  • CRISC Risk Management Experts
    The Certified in Risk and Information Systems Control (CRISC) certification program was initiated by ISACA in 2010 to validate a consultant's ability to design, deploy, and maintain IS controls to reduce risk. Progent can provide the services of a CRISC-certified engineer to help you to develop and execute a workplace continuity plan based on leading practices identified by CRISC and geared to align with your company's risk appetite, business goals, and IT budget. Progent's network risk management expertise is a good fit the support available from Progent's CISA-certified security engineers for impartially auditing your IS management design and also with the services of Progent's CISM experts for defining company-wide security policies. Get more details concerning Progent's CRISC-certified Network Risk Management Consulting.

  • Global Information Assurance Certification Support Services
    Global Information Assurance Certification was founded in 1999 to certify the skill of IT security professionals. GIAC's mission is to make sure that a certified professional possesses the knowledge appropriate to provide services in vital areas of system, information, and application program security. GIAC certifications are recognized by businesses and institutions throughout the world including and the U.S. National Security Agency (NSA). Progent offers the expertise of certified professionals for any of the security capabilities addressed within GIAC certification topics such as assessing security systems, security incident response, traffic analysis, and web services security. Get more information about Progent's Global Information Assurance Certification Professional Assistance.
Get in Touch with Progent for Network Security Support
If you're looking for computer security consulting expertise, telephone Progent at 800-993-9400 or go to Contact Progent.
















© 2002- 2019 Progent Corporation. All rights reserved.