Introduction to Progent's Security Consulting Services
Progent's certified network security experts offer a broad range of professional services designed to help companies of any size to detect and correct security weaknesses, block attacks, recover from the problems caused by a breach of security, and meet government mandates for reporting incidents. Progent can provide remote and in person support and offers economical set-price security assessment bundles to complement Progent's standard time-based billing.

Service delivery options available from Progent are:

  • Remote Security Services
    Typical security problems can be resolved remotely by a mix of phone-based assistance and secure data connections between Progent's Technical Response Center and a customer's computer system. Progent's TRC support group includes security professionals with the background and the technical resources to fix some of the most intractable problems promptly, making your service expenses affordable and minimizing lost productivity. Progent offers security support on a per-minute model without minimum charges for online support. Progent's billing model avoids scenarios where simple fixes entail big charges. Progent also has available a variety of set-price online security and compliance evaluation packages that represent exceptional value by utilizing Progent's advanced network monitoring technology and Progent's engineering experience to deliver a professional and actionable analysis of your network security profile.

  • Onsite Security Support Services
    In cases where on-site support is required, Progent can send a field technician to larger metropolitan areas throughout the U.S. Progent's certified security engineers are in addition available for projects that require world-class security specialists to be on premises anywhere in the United States, and Progent's most comprehensive security assessment packages for enterprises feature the participation of several qualified security experts at your location.

  • Time-critical Security Support Services
    To get urgent help with critical computer security issues, your company can get in touch with a world-class online troubleshooting expert by contacting Progent's roster of certified security professionals available at Progent's Technical Response Center. Progent's urgent remote security service staff is ready to offer fast and low-cost help with security issues that are impacting the productivity of your IT network. Progent's security engineers are qualified to provide help for environments based on Microsoft, Linux, Mac OS X, Sun Solaris, and popular derivatives of UNIX. Progent's wide selection of services covers firewall technology, email and messaging systems, protected network design, and data restoration. Progent's support team has been awarded the world's most advanced security certifications including Certified Information Security Manager (CISM) and Certified Information Systems Security Professional. Progent also can provide fast access to remote Cisco-certified CCIE network consultants who can provide world-class support with complex network integration issues.

Our Network Has Been Hacked: What Do We Do?
Network Security ConsultantsIf your business is currently fighting a network security emergency and you have not prepared a detailed recovery procedure, refer to Progent's Online Technical Help to see how to get fast assistance. Progent provides online help from skilled network technicians and can refer problems to high-level security specialists if required. Your business does not have to be a current Progent client to get emergency help for a security breakdown, but you can register as a Progent client ahead of time at no cost and your standing as a registered customer can save valuable time during a crisis.

Typically, smaller organizations have not documented a recovery plan in case of a successful attack. This is risky, since the damage from a successful security attack can be more devastating for a small business than for a large enterprise. Progent's security specialists can assist your you to design an efficient response and event reporting plan that reduces the IT system downtime following an attack. The formal post-attack handling procedure promoted by GIAC (Global Information Assurance Certification) is Progent's suggested method for handling a major security attack.

Practice Areas of Progent's Security Support Services
Managing network security as well as preparedness for recovering vital information and systems after an attack demands a continual program that entails an array of technologies and procedures. Progent's certified security engineers can assist your organization at any level in your efforts to guard your information network and remain in compliance, Progent's services range from security evaluation to designing a comprehensive security plan. Key areas supported by Progent's security consultants include Security Planning and Implementation, Information Restoration and Security Forensics, plus Outsourced Protection from Email-Borne Threats.

  • Designing, Building, and Testing Secure Networks
    Every company ought to develop a thoroughly considered security strategy that incorporates both preventive and responsive activity. The proactive strategy is a collection of precautions that helps to reduce security holes. The reactive plan defines procedures to help IT staff to evaluate the damage resulting from an attack, repair the damage, document the experience, and revive network activity as quickly as feasible. Progent can show you how to incorporate protection into your business processes, set up scanning utilities, define and build a safe network infrastructure, and propose processes and policies that will enhance the safety of your information system. Progent's security professionals are available to help you to set up a firewall, deploy safe online and mobile connectivity to email and files, and install an effective VPN. If your company is interested in an economical option for outsourcing your network security administration, Progent's 24x7 Monitoring Packages feature non-stop remote network tracking and fast resolution of problems.
  • System Recovery and Security Forensics
    Progent has skill in recovering networks and devices that have been hacked, are in question, or have stopped working as a result of a security breakdown. Progent can show you how to determine the damage resulting from the attack, return your company to normal business operations, and recover information lost owing to the breach. Progent's certified specialists can also oversee a thorough failure analysis by examining event logs and using other proven forensics tools. Progent's background with security problems reduces your business disruption and allows Progent to propose effective measures to avoid or contain future assaults.
  • Email Security with Spam Filtering, Virus Protection, Content Filtering, and Data Leakage Prevention
    Email Guard is Progent's email filtering and encryption platform that uses the technology of top information security vendors to deliver centralized management and comprehensive protection for your inbound and outbound email. The hybrid architecture of Progent's Email Guard managed service integrates cloud-based filtering with an on-premises gateway appliance to offer advanced defense against spam, viruses, Denial of Service Attacks, DHAs, and other email-based malware. Email Guard's cloud filter acts as a preliminary barricade and blocks the vast majority of unwanted email from making it to your network firewall. This reduces your exposure to inbound attacks and conserves system bandwidth and storage. Email Guard's onsite security gateway device adds a deeper level of inspection for incoming email. For outgoing email, the onsite security gateway offers anti-virus and anti-spam protection, protection against data leaks, and encryption. The on-premises gateway can also assist Microsoft Exchange Server to track and safeguard internal email traffic that originates and ends within your corporate firewall. Learn more about Progent's Email Guard Spam Filtering, Virus Defense, Content Filtering and Data Leakage Protection.
High-value Security Expertise Available from Progent
Progent's seasoned engineers offer advanced support in key facets of computer compliance including:
  • Security Vulnerability Audits and Security Compliance Testing
    Progent offers experience with information risk evaluation utilities like Microsoft Baseline Security Analyzer or LANguard for conducting a set of automatic network scans to identify potential security gaps. Progent has broad experience with monitoring utilities and can assist your company to understand audit reports and respond efficiently. Progent's certified security engineers also provide web application testing and can conduct expert assessments of corporate-wide security to validate your organization's compliance with major industry security specifications such as HIPAA, NIST, and ISO 17799. In addition, Progent can assess the effectiveness of your wireless protection covering fixed wireless equipment plus portable devices. Learn additional information concerning Progent's Security Vulnerability Evaluation and Compliance Testing.
  • Security Inventory Packages for Small Businesses
    Progent has put together two low-cost security inventory service packages designed to enable small businesses to receive an objective security evaluation from an accredited security specialist. With Progent's External Network Security Inventory Scan, a security expert administers an extensive test of your IT infrastructure from beyond your firewall to determine potential risks in the security profile you present to the outside world. With Progent's Internal Network Security Inventory Scan, a certified security professional runs a system scan from an authorized computer inside your company firewall to evaluate your exposure to internal attacks. The two security inventory services are configured and run from a secured external site. The project is managed by a consultant with high-level security accreditations who generates a report that details and analyzes the data collected by the security scan and suggests practical improvements where call for.
  • Security Assessment Packages for Large Companies
    Progent's qualified security engineers can deliver a selection of fixed-cost network security audit service packages designed for enterprises who need to comply with security standards demanded by government regulators or by vendors. Progent's network security audit service packages offer larger businesses a chance to get an impartial opinion about the effectiveness of their protection profile. For each security evaluation bundle, Progent engineers with top security accreditations analyze and summarize collected data and provide recommendations for effective remediation. The different network security evaluation bundles include an added-cost option for onsite engineers anywhere in the U.S.
  • Migrating from Microsoft Internet Security and Acceleration (ISA) Server and Forefront Threat Management Gateway
    Microsoft Internet Security and Acceleration (ISA) Server and its replacement Microsoft Forefront TMG are software platforms that contain an application-aware firewall able to guard networks from external and internal threats. The two products provide deep examination of Internet protocols to uncover threats that can get by legacy firewalls. Microsoft ISA Server was superseded by Microsoft Forefront TMG, which is built on ISA Server's technology while providing a number of improved capabilities. Forefront TMG 2010 has subsequently been retired by Microsoft, and the security features provided by the product are now usually taken over by dedicated hardware devices from companies such as Cisco, Check Point, SonicWALL and WatchGuard. (See Cisco ASA 5500-X Firewall with Firepower Services configuration and support.) Progent offers advanced Forefront TMG support services and ISA Server 2006 expertise to help you maintain and debug your legacy firewalls, and Progent can help you to upgrade smoothly to a modern security solution by providing planning, integration, tuning, training and troubleshooting.
  • Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Series Firewalls, and PIX Security Appliances Configuration and Debugging
    Cisco Certified CCIE Security EngineersThe current Cisco ASA 5500-X Series Next-Generation Firewalls with Firepower Services provide significantly more performance than Cisco's previous firewalls and have replaced the ASA 5500 and PIX security appliances for new installations. After Cisco's purchase of Sourcefire, the entire family of Cisco ASA 5500-X devices can be configured to enable Firepower Services, built on Sourcefire's Snort product, which is the market's most popular network intrusion protection system (IPS). Firepower services bring enhanced capabilities including advanced malware protection (AMP), URL filtering, dynamic threat analytics, and security automation. Progent's Cisco-certified CCIE network consultants can help your company to manage your existing PIX or Cisco ASA 5500 security appliances or upgrade to ASA 5500-X firewalls with Firepower Services. Progent's consultants can provide online and on-premises help with ASA 5500-X firewalls with Firepower Services and can assist your organization to plan, integrate, tune, administer and troubleshoot firewall environments based on Cisco ASA 5500-X firewalls with Firepower Services. Find out additional information about ASA 5500-X Firewalls with Firepower integration and troubleshooting support.
  • Additional Firewall and VPN Solutions
    In addition to being expert in a wide array of network security technologies from Microsoft and Cisco, Progent offers small and mid-size companies expert consulting for technologies from other popular firewall and Virtual Private Network (VPN) vendors such as:
  • SIEM Security Information and Event Management Integration and Support
    Security information and event management (SIEM) software and services are designed to digest the enormous amounts of information represented by security incident logs created by multiple sources such as network infrastructure appliances, servers, and application software and tools. SIEM software organizes the security event records from these diverse sources and creates consolidated reports of security events as required by government regulations and industry compliance guidelines. Progent's GIAC-certified network security experts and Cisco CCIE certified network infrastructure consultants can help organizations to design, deploy and manage a SIEM system that helps them to see the progress of attacks and comply with event reporting regulations. (See Progent's SIEM solutions.)
Progent's Security Credentials
Progent's security consultants have earned some of the most prestigious certifications offered in the security industry. All of these certifications require extensive examinations and demonstrated field background to ensure that candidates have acquired expertise with a significant amount of security knowledge and methodologies and can offer high-level security solutions to computer environments of any size.
  • Certified Information Security Manager (CISM) Security Consulting Services
    CISM defines the fundamental competencies and worldwide benchmarks of service that information technology security professionals are required to master. CISM provides business management the confidence that those who have been awarded their accreditation possess the experience and knowledge to offer effective security management and engineering support. Progent can offer a CISM expert to assist your enterprise in critical security areas including information security governance, risk management, data protection program control, and incident response management. Read additional details about Progent's Certified Information Security Manager Security Consulting Assistance.
  • Certified Information Systems Security Professionals (CISSP) Security Consulting Expertise
    Progent's CISSP consultants are security specialists who have earned CISSP status through verified experience, rigorous study, and formal examination. CISSP qualification recognizes expertise in an international standard for information security. ANSI has granted the CISSP status accreditation in the area of information security under ISO/IEC 17024. Areas of knowledge included within CISSP include security administration practices, security design and models, access control systems, software development security, operations security, physical security, encryption, communications, Internet security, and disaster recovery planning. Learn the details concerning Progent's CISSP Support Expertise.
  • ISSAP Consulting Services
    Progent's ISSAP qualified security consultants are consultants who have earned ISSAP certification following thorough examination and substantial experience. field experience with information security architecture. ISSAP security experts have acquired comprehensive knowledge of access management systems and techniques, phone system and network security, cryptography, needs evaluation, BCP and disaster recovery, and physical security integration. Progent's ISSAP-certified security consultants can assist your business with all aspects of architecture security. Get more details about Progent's ISSAP Accredited Secure Network Infrastructure Consulting Services.
  • Certified Information Systems Auditor Support Services
    The Certified Information Systems Auditor (CISA) accreditation is an important qualification that signifies expertise in information system security auditing. Certified by the American National Standards Institute (ANSI), the CISA credential has consultants undergo a comprehensive test given by the ISACA professional group. Progent can provide the expertise of a CISA-qualified security consultant trained to help businesses in the fields of IS audit process, information technology governance, systems and architecture planned useful life, IT service delivery, protecting data assets, and business continuity planning. Get additional details concerning Progent's Certified Information Systems Auditor (CISA) Support Assistance.
  • Global Information Assurance Certification Consulting Services
    GIAC was established in 1999 to validate the skill of computer security engineers. GIAC's goal is to assure that a certified professional has the skills appropriate to deliver support in vital categories of system, data, and program security. GIAC accreditations are recognized by businesses and institutions throughout the world including and the U.S. National Security Agency (NSA). Progent offers the assistance of certified consultants for any of the network security disciplines addressed within GIAC accreditation programs such as assessing networks, incident handling, traffic analysis, and web services security. Read more information about Progent's GIAC (Global Information Assurance Certification) Support Services.
Get in Touch with Progent for Network Security Support
If you're trying to find security consulting, phone Progent at 800-993-9400 or refer to Contact Progent.
















© 2002- 2017 Progent Corporation. All rights reserved.