Overview of Progent's Security and Compliance Consulting Services
Progent's certified network security and compliance professionals offer a broad selection of support services intended to help organizations of all sizes to identify and eliminate security vulnerabilities, block assaults, remediate any issues resulting from a breakdown of protection, and comply with government requirements for protecting information and reporting incidents. Progent offers a selection of service modes:

  • On-demand remote and on-premises support invoiced to the nearest minute
  • Continual managed services billed at an affordable fixed monthly rate
  • Value-priced service bundles for a single security evaluation
On-demand Security and Compliance Support Services
After you sign up for Progent's services (signing up is free), you can get on-demand remote or onsite support from a Progent security expert. This classic service model is essentially reactive and optimized for quickly taking care of technical issues that are disrupting your productivity or that have stymied your in-house support personnel. Typical scenarios are configuring a firewall appliance or VPN connection, installing a vital security update for a Cisco switch, designing compliant access to a public cloud, or restoring data after a ransomware assault. These services are invoiced by the minute, which avoids the annoying case of getting big invoices for quick fixes.

Delivery alternatives for Progent's on-demand support services include:

  • Online Security Support Services
    Most security-related problems can be handled remotely via a mix of phone-based help and an Internet connection between Progent's Technical Response Center (TRC) and a customer's network. Progent's Technical Response Center can provide online security support by offering efficient access to consultants who have the experience and technical resources to resolve many of the most challenging problems quickly, making your service expenses low and reducing lost productivity.
  • Onsite Security Support Services
    For cases where onsite support is necessary, Progent can dispatch a technical professional to major metropolitan areas across the U.S. Progent can also send a security consultant with high-level certifications and world-class skills to any site in the U.S.
Progent's accredited security consultants are qualified to provide help for environments based on Microsoft Windows, Linux, macOS and OS X, Solaris, and major versions of UNIX. Progent's broad range of services encompasses firewall technology, email and messaging systems, secure network architecture, and information recovery. Progent's support team has been awarded the industry's top security accreditations including CISA and CISSP. Progent also can provide fast access to remote Cisco-certified CCIE network infrastructure engineers who can deliver advanced support with complex network configuration issues.

ProSight Flat-rate Managed Services for Information Assurance
Progent's low-cost ProSight suite of network management outsourcing services is designed to provide small and mid-size businesses with enterprise-class support and state-of-the-art technology for all facets of information assurance and compliance. Managed services offered by Progent include:

  • ProSight Active Security Monitoring (ASM): Next Generation Endpoint Protection and Ransomware Recovery
    Progent's ProSight Active Security Monitoring is an endpoint protection solution that incorporates next generation behavior machine learning technology to guard endpoints and servers and VMs against modern malware assaults like ransomware and file-less exploits, which easily get by traditional signature-matching AV products. ProSight Active Security Monitoring safeguards local and cloud resources and offers a single platform to address the complete malware attack progression including protection, identification, mitigation, cleanup, and post-attack forensics. Key capabilities include single-click rollback with Windows Volume Shadow Copy Service (VSS) and real-time system-wide immunization against new attacks. Find out more about Progent's ProSight Active Security Monitoring endpoint protection and ransomware defense.

  • ProSight Enhanced Security Protection (ESP): Unified Physical and Virtual Endpoint Security
    ProSight Enhanced Security Protection (ESP) managed services offer ultra-affordable in-depth protection for physical servers and VMs, workstations, smartphones, and Exchange Server. ProSight ESP utilizes adaptive security and modern behavior analysis for round-the-clock monitoring and responding to security assaults from all vectors. ProSight ESP offers firewall protection, penetration alarms, device control, and web filtering through cutting-edge tools incorporated within one agent accessible from a single console. Progent's security and virtualization consultants can assist you to design and configure a ProSight ESP environment that meets your organization's specific requirements and that helps you prove compliance with legal and industry data security standards. Progent will assist you specify and implement security policies that ProSight ESP will enforce, and Progent will monitor your IT environment and react to alerts that call for urgent action. Progent can also assist your company to set up and verify a backup and disaster recovery system like ProSight Data Protection Services (DPS) so you can get back in business rapidly from a potentially disastrous security attack like ransomware. Find out more about Progent's ProSight Enhanced Security Protection (ESP) unified endpoint protection and Exchange email filtering.

  • ProSight DPS: Managed Backup
    ProSight Data Protection Services from Progent offer small and medium-sized businesses a low cost and fully managed solution for secure backup/disaster recovery. For a low monthly price, ProSight Data Protection Services automates your backup activities and allows rapid restoration of critical files, apps and virtual machines that have become lost or damaged as a result of hardware failures, software glitches, disasters, human mistakes, or malicious attacks such as ransomware. ProSight Data Protection Services can help you protect, recover and restore files, folders, apps, system images, as well as Microsoft Hyper-V and VMware images. Important data can be backed up on the cloud, to an on-promises device, or mirrored to both. Progent's BDR consultants can provide advanced expertise to configure ProSight Data Protection Services to be compliant with regulatory standards like HIPPA, FINRA, and PCI and, whenever necessary, can assist you to restore your business-critical data. Learn more about ProSight DPS Managed Backup and Recovery.

  • ProSight Email Guard: Inbound and Outbound Spam Filtering, Data Leakage Protection and Email Encryption
    ProSight Email Guard is Progent's email security platform that uses the technology of top information security vendors to provide web-based management and comprehensive protection for all your email traffic. The hybrid structure of Email Guard managed service integrates a Cloud Protection Layer with a local gateway appliance to provide advanced defense against spam, viruses, Denial of Service (DoS) Attacks, Directory Harvest Attacks (DHAs), and other email-borne threats. Email Guard's Cloud Protection Layer acts as a first line of defense and blocks the vast majority of threats from making it to your network firewall. This reduces your vulnerability to inbound attacks and conserves system bandwidth and storage space. Email Guard's onsite gateway appliance adds a further layer of analysis for incoming email. For outbound email, the onsite gateway provides AV and anti-spam protection, protection against data leaks, and encryption. The on-premises gateway can also help Exchange Server to monitor and safeguard internal email that stays inside your corporate firewall. Find out more about Progent's ProSight Email Guard spam filtering, virus defense, content filtering and data leakage protection.

  • ProSight WAN Watch: Network Infrastructure Management
    ProSight WAN Watch is a network infrastructure monitoring and management service that makes it simple and affordable for small and mid-sized organizations to map, track, optimize and debug their networking hardware like switches, firewalls, and access points plus servers, client computers and other networked devices. Incorporating cutting-edge Remote Monitoring and Management (RMM) technology, WAN Watch makes sure that network maps are kept updated, captures and manages the configuration information of virtually all devices on your network, monitors performance, and generates notices when potential issues are discovered. By automating time-consuming network management processes, ProSight WAN Watch can cut hours off ordinary tasks like network mapping, reconfiguring your network, locating appliances that require critical software patches, or isolating performance problems. Find out more details about ProSight WAN Watch infrastructure management services.

  • ProSight LAN Watch: Server and Desktop Remote Monitoring and Management
    ProSight LAN Watch is Progentís server and desktop monitoring managed service that incorporates state-of-the-art remote monitoring and management technology to keep your network running efficiently by tracking the health of vital assets that drive your business network. When ProSight LAN Watch uncovers an issue, an alarm is sent automatically to your designated IT staff and your Progent consultant so any potential issues can be resolved before they have a chance to disrupt your network Learn more details about ProSight LAN Watch server and desktop monitoring services.

  • ProSight Virtual Hosting: Hosted Virtual Machines at Progent's Tier III Data Center
    With ProSight Virtual Hosting service, a small or mid-size organization can have its critical servers and applications hosted in a protected Tier III data center on a high-performance virtual machine host set up and managed by Progent's IT support professionals. Under Progent's ProSight Virtual Hosting model, the customer retains ownership of the data, the OS platforms, and the applications. Since the environment is virtualized, it can be moved immediately to an alternate hardware environment without a lengthy and difficult reinstallation procedure. With ProSight Virtual Hosting, you are not locked into a single hosting provider. Learn more about ProSight Virtual Hosting services.

  • ProSight IT Asset Management: Network Documentation Management
    ProSight IT Asset Management service is an IT infrastructure documentation management service that makes it easy to capture, maintain, find and safeguard data about your IT infrastructure, processes, applications, and services. You can instantly find passwords or IP addresses and be warned about upcoming expirations of SSLs or domains. By updating and organizing your IT documentation, you can eliminate as much as half of time thrown away looking for critical information about your IT network. ProSight IT Asset Management features a common location for storing and collaborating on all documents related to managing your business network such as standard operating procedures and How-To's. ProSight IT Asset Management also supports advanced automation for gathering and associating IT information. Whether youíre making improvements, doing regular maintenance, or reacting to an emergency, ProSight IT Asset Management gets you the knowledge you need when you need it. Learn more details about Progent's ProSight IT Asset Management service.
ProSight Network Audits
Progent's ProSight Network Audits are a fast and affordable way for small and mid-size organizations to get an objective evaluation of the health of their information system. Powered by some of the top remote monitoring and management (RMM) platforms available, and supervised by Progent's certified group of information technology experts, ProSight Network Audits help you see how well the deployment of your core network assets adhere to leading practices. The Basic and Advanced versions of ProSight Network Audit services are available at a budget-friendly, one-time cost and deliver immediate ROI such as a more manageable Active Directory (AD) environment. Both versions also come with one year of cutting-edge remote network monitoring and management. Benefits can include easier management, improved compliance with data security standards, higher utilization of IT assets, faster problem resolution, more dependable backup and restore, and less downtime. Read more about ProSight Network Audits IT infrastructure review.

The ProSight Ransomware Preparedness Report
The ProSight Ransomware Preparedness Report service is a low-cost service built around a brief interview with a Progent information assurance expert. The interview is designed to assess your company's preparedness either to stop or recover rapidly after a ransomware attack. Progent will consult with you directly to collect information about your existing AV defense and backup system, and Progent will then produce a custom Basic Security and Best Practices Report describing how you can apply industry best practices to create an efficient security and backup environment that aligns with your company's requirements. For more information, visit Progent's ProSight Ransomware Preparedness Report Service.

Set-price Security Assessment and Verification Bundles
Progent offers a selection of set-price security and compliance evaluation bundles that provide high value by utilizing Progent's advanced network monitoring tools plus Progent's technical skills to produce an objective and thorough evaluation of your IT environment security posture.

  • Security Inventory Service Packages for Small Organizations
    Progent offers two value-priced security inventory service packages designed to enable small businesses to obtain a professional security assessment from an accredited security consultant. With Progent's External Security Inventory Scan, a consultant manages a comprehensive examination of your IT system from outside your corporate firewall to determine potential gaps in the security posture you expose to the public. With Progent's Internal Security Inventory Scan, a certified security expert executes a system scan from an authorized computer within your corporate firewall to assess your vulnerability to inside threats. These two security inventory scanning services are set up and run from a secured offsite location. The project is managed by a consultant who has earned high-level security certifications and who creates a report that describes and interprets the information collected by the security scan and recommend various improvements where required.
  • Security Vulnerability Evaluation Bundles for Large Businesses
    Progent has developed three levels of fixed-price security evaluation service bundles designed for large organizations who need to meet compliance standards required by government or industry agencies. Progent's security evaluation service bundles offer enterprises a chance to get a professional look at the strength of their security profile. For every security assessment package, Progent consultants with top security credentials study and report on collected data and offer suggestions for cost-effective remediation. All the network security assessment bundles include an added-cost option for onsite engineers at any location in the U.S.
  • Stealth Penetration Testing Services
    Stealth penetration testing, often referred to as PEN testing, is a vital technique for helping businesses to find out how open their IT systems are to current-generation threats. Progent's stealth penetration testing check how effectively your corporate security policies and technologies stand up to authorized but unannounced intrusion attempts launched by Progent's certified security experts utilizing advanced hacking methods. Read about Progent's stealth penetration testing services.
Our Network Has Been Hacked: What Do We Do Now?
Network Security ConsultantsIf your company is now faced with a network security crisis and you have no detailed recovery procedure, visit Progent's Remote Computer Help to find out how to receive immediate assistance. Progent offers online help from experienced engineers and can refer trouble tickets to high-level security experts if necessary. Your organization does not have to be a current Progent client to get emergency help for a security breakdown, but you can register as a Progent client in advance at no cost and your status as a registered client could save valuable time in case of an emergency.

Usually, smaller businesses have not documented a recovery plan in case of a damaging penetration. This is not good, because the cost of a serious security attack can be even more devastating for a small business than for a big enterprise. Progent's security engineers can help your you to design a practical response and event reporting plan that minimizes the IT system downtime following an attack. The step-by-step post-attack response procedure promoted by GIAC is Progent's recommended method for reacting to a major security attack.

Advanced Security Expertise Offered by Progent
Progent's security engineers offer expertise in vital areas of IT protection including:

  • Information Risk Audits and Compliance Assessment
    Progent provides expertise with security auditing software like MS Baseline Security Analyzer and LANguard for performing a set of comprehensive system scans to identify potential security problems. Progent has broad skills with these and similar utilities and can assist your company to understand audit results and react appropriately. Progent's certified security engineers also can perform web software testing and can perform expert assessments of enterprise-wide security to validate your company's compliance with important industry security specifications including HIPAA, NIST, and ISO. In addition, Progent can evaluate the strength of your wireless protection covering stationary wireless equipment plus mobile handsets. Find out more information concerning Progent's Security Vulnerability Evaluation and Security Compliance Assessment.
  • Designing, Implementing, and Validating Protected Environments
    Every organization should have a carefully thought out security strategy that incorporates both preventive and reactive elements. The pre-attack plan is a set of steps that works to minimize vulnerabilities. The post-attack plan specifies procedures to help security staff to evaluate the losses resulting from an attack, remediate the damage, record the experience, and revive network functions as quickly as feasible. Progent can show you how to design security into your business operations, configure auditing utilities, define and build a safe computer infrastructure, and propose processes and policies to optimize the protection of your computing environment. Progent's security experts are available to assist you to set up a firewall, deploy protected offsite connectivity to e-mail and files, and install an effective virtual private network (VPN). If your company is looking for an affordable option for jobbing out your security management, Progent's 24x7 Monitoring Options include automated remote network tracking and immediate resolution of emergencies.
  • Data Recovery and Security Forensics
    Progent provides skill in restoring networks and servers that have been hacked, are suspect, or have ceased to function following a security breach. Progent can help determine the damage resulting from the attack, restore normal functions, and retrieve data lost owing to the attack. Progent's security specialists can also manage a thorough failure analysis by going over activity logs and using a variety of proven forensics techniques. Progent's background with security problems minimizes your downtime and allows Progent to propose effective strategies to prevent or mitigate future assaults.
  • Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Firewalls, and PIX Firewalls Configuration and Troubleshooting
    Cisco CCIE Network Security EngineersThe current Cisco ASA 5500-X Family of firewalls with Firepower Services provide significantly more bang for the buck than Cisco's previous PIX and ASA 5500 firewalls and have superseded the ASA 5500 and PIX 500 security appliances for new deployments. After Cisco's acquisition of Sourcefire, the whole family of Cisco ASA 5500-X devices can be provisioned to support Firepower Services, based on Sourcefire's Snort product, which is the world's most popular network intrusion protection system (IPS). Firepower services bring enhanced capabilities such as advanced malware protection (AMP), URL filtering, dynamic threat analytics, and automation. Progent's Cisco-qualified CCIE network consultants can help your company to manage your legacy PIX or Cisco ASA 5500 firewalls or upgrade efficiently to Cisco ASA 5500-X firewalls with Firepower Services. Progent's consultants offer remote and on-premises help with ASA 5500-X firewalls with Firepower Services and can help your business to design, deploy, optimize, manage and troubleshoot firewall solutions based around Cisco ASA 5500-X firewalls with Firepower Services. Read more information about Cisco ASA 5500-X Firewalls with Firepower configuration and debugging services.
  • Other Firewall and VPN Solutions
    As well as being expert in a wide array of security solutions from Microsoft and Cisco, Progent offers small and mid-size businesses expert engineering services for security products from other popular firewall and VPN suppliers such as:
  • SIEM Integration and Support
    Security information and event management (SIEM) software and services are intended to interpret the massive quantity of data collected in security incident records created by multiple sources such as network infrastructure appliances, operating systems, and application software and tools. SIEM software organizes the security event records from these various sources and creates summary reports of security events as required by state regulations and industry compliance guidelines. Progent's GIAC-certified network security consultants and Cisco CCIE certified network infrastructure consultants can help businesses to plan, deploy and operate a SIEM system that helps them to understand the behavior of security incidents and comply with event reporting regulations. (Visit Progent's Security information and Event Management (SIEM) solutions.)
Progent's Security Certifications
Progent's security consultants have earned the most prestigious certifications available in the industry. All of these accreditations demand extensive testing and proven field experience to guarantee that candidates have mastered a significant amount of security knowledge and techniques and can offer advanced security solutions to information environments of any size.
  • Certified Information Security Manager Security Support Expertise
    CISM identifies the basic competencies and international benchmarks of service that computer security managers are required to achieve. It offers executive management the confidence that those who have earned their CISM have the background and skill to offer effective security administration and engineering services. Progent can offer a CISM-certified support professional to assist your enterprise in vital security areas including data protection governance, risk management, data protection process control, and incident handling management. Find out more information about Progent's Certified Information Security Manager Security Support Assistance.

  • Certified Information Systems Security Professionals (CISSP) Security Consulting Expertise
    Progent's CISSP consultants are security engineers who have been awarded CISSP accreditation through verified experience, rigorous study, and exhaustive examination. CISSP qualification indicates mastery of an international standard for IT security. American National Standards Institute has given the CISSP credential accreditation in the field of IT security under ISO/IEC 17024. Fields of expertise covered under CISSP include security management procedures, security architecture and models, connection control methodology, software development security, business processes security, hardware security, encryption, communications, Internet security, and business continuity planning. Learn the details concerning Progent's CISSP Support Expertise.

  • CISSP-ISSAP} Cybersecurity Architecture Consulting Support
    Progent's CISSP-ISSAP certified security architecture experts have been awarded ISSAP accreditation as a result of rigorous examination and significant hands-on work with information security architecture. ISSAP security experts possess in-depth knowledge of access control systems and techniques, telecommunications and network infrastructure protection, cryptography, requirements analysis, business continuity and disaster recovery, and physical security. Progent's CISSP-ISSAP-qualified security experts can help your company with all phases of architecture security. Learn more details concerning Progent's ISSAP Certified Protected System Infrastructure Consulting Services.

  • CISA Consulting Services
    The Certified Information Systems Auditor (CISA) credential is an important achievement that indicates mastery in IS security audit and control. Certified by the American National Standards Institute (ANSI), the CISA accreditation requires that candidates undergo an extensive test administered by the ISACA international professional association. Progent offers the services of a CISA-qualified security professional trained to help companies in the fields of information systems audit services, IT enforcement, network assets and architecture planned useful life, information technology support, safeguarding data resources, and business continuity planning. Find out additional details about Progent's CISA Support Expertise.

  • CRISC-certified Risk Mitigation Specialists
    The CRISC program was established by ISACA to verify a consultant's skills to design, implement, and support IS control mechanisms to reduce risk. Progent offers the expertise of a CRISC-certified engineer to assist your company to develop and execute a business continuity or disaster recovery strategy that follows industry best practices identified by CRISC and crafted to match your company's risk tolerance, business objectives, and IT budget. Progent's risk mitigation expertise is a good fit the services available from Progent's CISA-qualified security engineers for objectively evaluating your IS control mechanisms and with the services of Progent's CISM-certified consultants for implementing company-wide security policies. Find out more information about Progent's CRISC Risk Management Services.

  • Global Information Assurance Certification Consulting Services
    GIAC (Global Information Assurance Certification) was founded in 1999 to certify the knowledge of IT security engineers. GIAC's mission is to verify that a certified professional possesses the skills appropriate to deliver services in important categories of system, information, and program security. GIAC accreditations are acknowledged by companies and government organizations all over the world including and the U.S. National Security Agency. Progent offers the expertise of GIAC certified professionals for any of the security capabilities addressed under GIAC accreditation programs including auditing perimeters, security incident handling, traffic analysis, and web-based application security. Find out the details concerning Progent's GIAC (Global Information Assurance Certification) Consulting Services.
Contact Progent for Network Security Expertise
If you're trying to find computer security expertise, telephone Progent at 800-993-9400 or refer to Contact Progent.
















© 2002- 2019 Progent Corporation. All rights reserved.