Introduction to Progent's Security Support Services
Progent's industry certified network security and compliance consultants offer a broad selection of services intended to assist companies of any size to uncover and correct security vulnerabilities, block malicious attacks, recover from the damage caused by a breach of protection, and comply with government mandates for protecting information and reporting incidents. Progent offers a choice of service modes:

  • On-demand online and on-premises support invoiced by the minute
  • Continual fully managed services invoiced at an affordable fixed monthly rate
  • Value-priced service bundles for a single security evaluation
On-demand Security Support Services
Once you register for Progent's services (signing up is free), you can receive as-needed online or on-premises assistance from a Progent security consultant. This classic support model is essentially reactive and geared toward rapidly taking care of technical problems that are disrupting your network or that are beyond the scope of your own support staff. Typical examples include debugging a firewall or VPN connection, implementing a critical security update for a Cisco switch or router, setting up secure access to cloud-based resources, or restoring data after a ransomware attack. These security services are billed to the nearest minute, which eliminates the frustrating situation of getting large bills for quick repairs.

Delivery alternatives for Progent's as-needed support include:

  • Online Security Support
    Most security issues can be handled online through a combination of phone help and a remote connection between Progent's Technical Response Center (TRC) and a customer's network. Progent's TRC group can deliver online security support by offering easy access to consultants who have the background and resources to fix some of the most difficult problems quickly, making your service costs low and minimizing lost productivity.
  • Onsite Security Services
    For cases where onsite support is necessary, Progent can dispatch a technical expert to major metropolitan areas throughout the United States. Progent can also send a security specialist with top certifications and advanced skills to any site in the U.S.
Progent's accredited engineers are certified to provide help for systems based on Microsoft, Linux, Apple Mac, Sun, and popular derivatives of UNIX. Progent's wide range of consulting services encompasses firewall expertise, email systems, protected system architecture, and information restoration. Progent's support staff has been awarded the industry's most advanced security accreditations including GIAC (Global Information Assurance Certification) and Certified Information Systems Security Professional (CISSP). Progent also offers fast access to remote Cisco CCIE network engineers who can deliver world-class assistance with tough network configuration problems.

ProSight Low-Cost Managed Services for Information Assurance
Progent's low-cost ProSight suite of outsourced network management services is intended to provide small and mid-size businesses with enterprise-class support and state-of-the-art technology for all facets of information assurance and compliance. ProSight managed services available from Progent include:

  • ProSight Email Guard: Inbound and Outbound Spam Filtering, Data Leakage Protection and Email Encryption
    ProSight Email Guard is Progent's email filtering and encryption solution that uses the technology of leading data security companies to provide web-based control and world-class security for your email traffic. The powerful architecture of Progent's Email Guard integrates a Cloud Protection Layer with an on-premises gateway device to offer complete protection against spam, viruses, Dos Attacks, Directory Harvest Attacks (DHAs), and other email-borne malware. Email Guard's cloud filter acts as a first line of defense and keeps the vast majority of threats from making it to your security perimeter. This reduces your exposure to inbound threats and saves system bandwidth and storage space. Email Guard's onsite security gateway device provides a further level of inspection for inbound email. For outbound email, the onsite gateway provides anti-virus and anti-spam filtering, DLP, and email encryption. The on-premises gateway can also assist Exchange Server to monitor and safeguard internal email traffic that stays inside your security perimeter. Learn more about Progent's ProSight Email Guard spam filtering, virus blocking, email content filtering and data loss prevention.

  • ProSight Active Security Monitoring: Endpoint Protection and Ransomware Defense
    ProSight Active Security Monitoring (ASM) is an endpoint protection (EPP) solution that utilizes next generation behavior-based analysis tools to guard endpoint devices as well as servers and VMs against modern malware attacks such as ransomware and file-less exploits, which easily evade legacy signature-matching AV tools. ProSight Active Security Monitoring protects local and cloud resources and provides a single platform to automate the entire malware attack lifecycle including protection, detection, containment, remediation, and post-attack forensics. Top features include one-click rollback using Windows Volume Shadow Copy Service and automatic network-wide immunization against new threats. Find out more about Progent's ProSight Active Security Monitoring next-generation endpoint protection and ransomware defense.

  • ProSight Data Protection Services: Managed Cloud Backup
    ProSight Data Protection Services provide small and mid-sized organizations a low cost end-to-end service for reliable backup/disaster recovery (BDR). Available at a low monthly cost, ProSight DPS automates and monitors your backup processes and allows rapid recovery of critical data, apps and virtual machines that have become lost or corrupted due to hardware breakdowns, software glitches, natural disasters, human error, or malware attacks such as ransomware. ProSight DPS can help you back up, retrieve and restore files, folders, applications, system images, plus Hyper-V and VMware virtual machine images. Critical data can be backed up on the cloud, to a local storage device, or mirrored to both. Progent's BDR consultants can deliver advanced support to set up ProSight Data Protection Services to to comply with regulatory requirements like HIPPA, FIRPA, and PCI and, when needed, can help you to recover your critical data. Find out more about ProSight Data Protection Services Managed Cloud Backup.

  • ProSight WAN Watch: Infrastructure Management
    Progentís ProSight WAN Watch is a network infrastructure monitoring and management service that makes it easy and affordable for smaller businesses to diagram, monitor, reconfigure and troubleshoot their networking hardware like routers and switches, firewalls, and access points as well as servers, printers, client computers and other devices. Using cutting-edge RMM technology, WAN Watch makes sure that infrastructure topology maps are always updated, captures and manages the configuration of almost all devices connected to your network, monitors performance, and sends notices when problems are detected. By automating complex management processes, ProSight WAN Watch can knock hours off ordinary chores like network mapping, expanding your network, locating devices that need important updates, or isolating performance issues. Learn more about ProSight WAN Watch network infrastructure monitoring and management services.

  • ProSight LAN Watch: Server and Desktop Monitoring
    ProSight LAN Watch is Progentís server and desktop monitoring service that uses state-of-the-art remote monitoring and management technology to help keep your IT system running at peak levels by tracking the health of critical computers that drive your information system. When ProSight LAN Watch uncovers a problem, an alarm is sent automatically to your specified IT management staff and your assigned Progent consultant so any potential problems can be resolved before they can disrupt productivity Learn more about ProSight LAN Watch server and desktop remote monitoring services.

  • ProSight Virtual Hosting: Hosted Virtual Machines at Progent's Tier III Data Center
    With ProSight Virtual Hosting service, a small organization can have its critical servers and apps hosted in a secure Tier III data center on a fast virtual machine host configured and maintained by Progent's network support professionals. Under Progent's ProSight Virtual Hosting model, the customer owns the data, the operating system software, and the apps. Since the system is virtualized, it can be moved easily to an alternate hardware solution without requiring a lengthy and technically risky configuration procedure. With ProSight Virtual Hosting, you are not tied a single hosting provider. Learn more about ProSight Virtual Hosting services.

  • ProSight IT Asset Management: Network Documentation Management
    Progent's ProSight IT Asset Management service is an IT infrastructure documentation management service that allows you to capture, maintain, retrieve and safeguard data related to your IT infrastructure, processes, applications, and services. You can instantly locate passwords or serial numbers and be alerted about impending expirations of SSL certificates ,domains or warranties. By updating and organizing your IT infrastructure documentation, you can eliminate up to 50% of time wasted searching for vital information about your IT network. ProSight IT Asset Management features a common repository for storing and collaborating on all documents related to managing your business network such as recommended procedures and How-To's. ProSight IT Asset Management also supports a high level of automation for collecting and relating IT data. Whether youíre making enhancements, doing maintenance, or responding to an emergency, ProSight IT Asset Management delivers the information you require when you need it. Find out more details about Progent's ProSight IT Asset Management service.
ProSight Network Audits
Progent's ProSight Network Audits offer a quick and low-cost way for small and mid-size businesses to obtain an unbiased evaluation of the health of their IT system. Based on a selection of the top remote monitoring and management (RMM) tools in the industry, and overseen by Progent's certified team of IT professionals, ProSight Network Audits help you see how well the deployment of your core network devices adhere to industry leading practices. Both the Basic and Advanced versions of ProSight Network Audit services are offered at a low, one-time cost and provide immediate ROI like a cleaner Active Directory system. Both versions also come with a year of state-of-the-art remote network monitoring and management. Advantages can include easier network management, improved compliance with information security requirements, higher utilization of network assets, quicker troubleshooting, more dependable backup and recovery, and higher availability. See more information about Progent's ProSight Network Audits network infrastructure review.

Set-price Security Evaluation and Validation Bundles
Progent has put together a number of fixed-price security and compliance evaluation packages that provide high value by deploying Progent's advanced system monitoring and analysis tools plus Progent's technical experience to create an objective and comprehensive evaluation of your IT environment security profile.

  • Security Assessment Service Bundles for Small Organizations
    Progent offers two ultra-affordable security inventory service packages intended to enable small organizations to obtain a professional security evaluation from a certified security consultant. With Progent's External Security Inventory Scan, an engineer administers a comprehensive assessment of your IT system from outside your firewalled perimeter to determine potential gaps in the security posture you expose to the public. With Progent's Internal Security Inventory Scan, a security expert runs a system scan using an authorized machine within your firewalled perimeter to assess your exposure to internal attacks. The two security inventory scans are configured and executed from a secured external site. The project is managed by a consultant who has earned high-level security certifications and who creates a report that details and evaluates the information captured by the scan and suggests practical improvements where appropriate.
  • Security Vulnerability Evaluation Bundles for Large Businesses
    Progent offers three levels of flat-rate security assessment service bundles designed for large organizations who want to meet compliance standards required by state or industry regulators. Progent's security assessment service bundles offer larger businesses a chance to get an objective assessment at the viability of their security posture. For every security assessment package, Progent consultants with advanced security credentials study and report on collected data and provide suggestions for efficient improvements. Each of the network security audit bundles include an added-cost option for onsite consultants at any location in the United States.
  • Stealth Penetration Testing
    Stealth penetration testing, commonly referred to as PEN testing, is an accepted technique for allowing organizations to determine how vulnerable their network systems are to current-generation threats. Progent's stealth penetration testing test how well your existing security policies and platforms resist authorized but unannounced intrusion attempts managed by Progent's certified security specialists using cutting-edge hacking methods. Find out about Progent's stealth penetration testing services.
We've Been Hacked: What Can We Do?
Network Security ConsultantsIf your company is currently faced with a network security emergency and you do not have a formal recovery procedure, refer to Progent's Remote Network Support to find out how to receive fast help. Progent offers remote technical support from experienced engineers and can escalate trouble tickets to high-level security specialists if necessary. Your business does not need to be a current Progent customer to receive urgent support for a security problem, but you can register as a Progent customer ahead of time for free and your status as a current client could save precious time during a crisis.

Usually, smaller organizations do not have a recovery plan in case of a damaging penetration. This is not good, because the damage from a serious security assault can be more devastating for a small business than for a big corporation. Progent's security specialists can assist your company to design an efficient response and incident reporting plan that reduces the IT system disruption resulting from an attack. The formal post-attack response procedure promoted by GIAC is Progent's recommended procedure for responding to a major security incident.

High-value Security Expertise Offered by Progent
Progent's security consultants offer consulting support in vital facets of computer compliance including:

  • Security Vulnerability Audits and Compliance Testing
    Progent provides experience with information risk auditing utilities like MS Baseline Security Analyzer or LANguard for conducting a set of comprehensive system tests to reveal potential security problems. Progent has broad experience with these and similar utilities and can assist you to analyze assessment results and respond appropriately. Progent's certified security consultants also provide web application testing and can conduct thorough assessments of enterprise-wide security to determine your organization's compliance with key worldwide security standards including FISMA, NIST, and ISO. In addition, Progent can evaluate the effectiveness of your wireless protection covering fixed wireless equipment plus portable devices. Learn more information concerning Progent's Information Risk Audits and Security Compliance Assessment.
  • Designing, Implementing, and Testing Secure Environments
    Any company ought to have a thoroughly thought out security strategy that includes both proactive and responsive elements. The pre-attack plan is a set of precautions that helps to minimize vulnerabilities. The post-attack plan specifies procedures to help security staff to evaluate the losses resulting from a breach, remediate the damage, document the event, and revive network activity as quickly as possible. Progent can advise you how to design protection into your business processes, configure auditing utilities, define and implement a secure computer infrastructure, and recommend processes and policies that will maximize the safety of your network. Progent's security professionals are ready to assist you to configure a firewall, deploy protected offsite access to email and data, and configure an effective VPN. If you are interested in an affordable option for outsourcing your network security administration, Progent's Round-the-clock Network Support Packages include non-stop remote network monitoring and immediate resolution of emergencies.
  • Data Recovery and Security Forensics
    Progent offers expertise in recovering networks and computers that have been compromised, are in question, or have ceased to function following a security attack. Progent can help determine the losses resulting from the attack, return your company to normal functions, and recover data compromised owing to the attack. Progent's security specialists can also manage a thorough forensic evaluation by going over event logs and using other advanced forensics techniques. Progent's background with security issues minimizes your downtime and permits Progent to recommend efficient measures to prevent or mitigate future assaults.
  • Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Series Firewalls, and PIX 500 Firewalls Configuration and Troubleshooting
    Cisco Certified CCIE Security ExpertsThe new Cisco ASA 5500-X Family of firewalls with Firepower Services deliver substantially more bang for the buck than Cisco's earlier PIX and ASA 5500 firewalls and have superseded the ASA 5500 and PIX 500 firewalls for new deployments. After Cisco's acquisition of Sourcefire, the whole line of Cisco ASA 5500-X devices can be configured to support Firepower Services, built on Sourcefire's Snort product, which is the world's most deployed intrusion protection system. Firepower services provide powerful new features such as advanced malware protection (AMP), URL filtering, real-time threat analytics, and security automation. Progent's Cisco-certified CCIE network experts can assist you to maintain your current PIX or Cisco ASA 5500 security appliances or upgrade to Cisco ASA 5500-X firewalls with Firepower Services. Progent's consultants offer remote and onsite help with ASA 5500-X firewalls with Firepower Services and can help you to plan, configure, tune, manage and troubleshoot firewall solutions based around Cisco ASA 5500-X firewalls with Firepower Services. Learn additional details about Cisco ASA 5500-X Firewalls with Firepower integration and troubleshooting services.
  • Additional Firewall and Virtual Private Network (VPN) Technologies
    In addition to supporting a broad range of network security technologies available from Microsoft and Cisco, Progent offers small companies top-level consulting for security products from other major firewall and Virtual Private Network vendors such as:
  • SIEM Security Information and Event Management Solutions
    Security information and event management (SIEM) software and services are designed to interpret the enormous amounts of information represented by security event records generated by multiple sources including network appliances, servers, and applications and tools. SIEM software analyzes the security event records from these various sources and produces consolidated reports of security incidents as required by government regulations and industry compliance standards. Progent's GIAC-certified information assurance experts and Cisco CCIE certified network experts can help businesses to design, deploy and operate a SIEM system that enables them to see the behavior of attacks and comply with security incident reporting requirements. (See Progent's Security information and Event Management (SIEM) solutions.)
Progent's Security Credentials
Progent's security professionals have been awarded some of the most respected certifications offered in the industry. All of these certifications require extensive examinations and proven work background to guarantee that recipients have mastered a substantial body of security knowledge and techniques and can provide high-level consulting to information environments of any size.
  • Certified Information Security Manager Security Consulting Services
    Certified Information Security Manager (CISM) defines the core competencies and worldwide benchmarks of performance that information technology security professionals are required to achieve. CISM provides business management the confidence that consultants who have earned their CISM have the experience and knowledge to provide effective security administration and engineering support. Progent can offer a CISM-certified expert to assist your enterprise in key security disciplines such as information security governance, risk assessment, data protection process control, and crisis response support. Learn more information concerning Progent's Certified Information Security Manager Security Consulting Expertise.

  • CISSP Security Support Services
    Progent's CISSP consultants are security specialists who have been awarded CISSP accreditation through verified professional work, rigorous study, and formal testing. CISSP qualification indicates expertise in a worldwide standard for IT security. American National Standards Institute has granted the CISSP status official recognition in the area of information security under ISO/IEC 17024. Fields of expertise included within CISSP include security management practices, security design and models, connection control methodology, applications development security, business processes security, physical security, cryptography, telecommunications, network security, and business continuity planning. Learn the details about Progent's Certified Information Systems Security Professionals (CISSP) Support Services.

  • Information Systems Security Architecture Professionals (ISSAP) Consulting Support
    Progent's ISSAP qualified security consultants are experts who have earned ISSAP accreditation following thorough testing and significant experience. field experience with network security architecture. ISSAP consultants possess in-depth understanding of access management systems and techniques, telecommunications and network protection, cryptography, needs evaluation, business continuity planning (BCP) and disaster recovery planning (DRP), and physical security integration. Progent's ISSAP-qualified security consultants can help your business with all aspects of secure network architecture. Read the details concerning Progent's ISSAP Accredited Secure Network Architecture Engineering Support.

  • Certified Information Systems Auditor Professional Services
    The Certified Information Systems Auditor credential is a globally recognized achievement that indicates expertise in network security auditing. Accredited by the American National Standards Institute, the CISA accreditation requires that consultants pass an exhaustive examination administered by the ISACA professional group. Progent can provide the services of a CISA-qualified security audit consultant able to assist companies in the areas of IS audit services, IT administration, network assets and infrastructure planned useful life, IT support, protecting information resources, and disaster recovery planning. Read additional details concerning Progent's Certified Information Systems Auditor Professional Services.

  • GIAC (Global Information Assurance Certification) Support Expertise
    GIAC (Global Information Assurance Certification) was founded in 1999 to validate the knowledge of information technology security engineers. GIAC's mission is to ensure that a certified security consultant has the knowledge appropriate to provide support in critical categories of network, data, and application security. GIAC certifications are acknowledged by companies and government organizations around the world including and the United States National Security Agency (NSA). Progent can provide the support of GIAC certified consultants for any of the network security capabilities addressed under GIAC certification topics such as assessing perimeters, security incident handling, traffic analysis, and web application security. Read more details concerning Progent's Global Information Assurance Certification Professional Expertise.
Contact Progent for Network Security Help
If you need network security engineering help, telephone Progent at 800-993-9400 or refer to Contact Progent.

© 2002- 2018 Progent Corporation. All rights reserved.