Overview of Progent's Security Consulting Services
Progent's industry certified network security consultants can provide a wide range of support services intended to assist businesses of all sizes to identify and correct security weaknesses, defend against assaults, remediate any problems caused by a breach of security, and comply with government requirements for reporting security incidents. Progent delivers online and on-site support and also has developed economical fixed-cost security assessment packages to supplement Progent's standard by-the-minute billing.

Support services delivery alternatives available from Progent are:

  • On-line Security Services
    The majority of security problems can be resolved remotely via a combination of telephone support and remote Internet connections between Progent's Technical Response Center and a customer's network. Progent's TRC service team includes security professionals with the knowledge and experience and the tools to fix some of the most challenging problems promptly, keeping your support costs reasonable and reducing lost productivity. Progent provides security assistance on a per-minute basis without minimum charges for online support. Progent's pricing structure avoids situations where simple fixes result in major charges. Progent also offers a number of fixed-price online security and compliance assessment bundles that provide extraordinary value by leveraging Progent's advanced security scanning technology and Progent's consulting experience to deliver an objective and thorough analysis of your information system vulnerability.

  • On-premises Security Support Options
    For circumstances in which in-person support is needed, Progent can dispatch a field service technician to larger cities throughout the U.S. Progent's security consultants are in addition available to assist with jobs that call for world-class security specialists to be on site anywhere in the U.S., and Progent's most comprehensive security evaluation packages for large businesses feature the services of a team of certified security engineers at your location.

  • Urgent Security Services
    To get fast help with computer security issues, your company can have access to a seasoned online troubleshooting specialist by contacting Progent's roster of certified security professionals at Progent's Technical Response Center. Progent's emergency remote security support consultants are ready to offer fast and low-cost help with security emergencies that threaten the productivity of your IT network. Progent's accredited security consultants are certified to support environments based on Microsoft Windows, Linux, Mac, Sun, and major versions of UNIX. Progent's broad array of consulting services addresses firewall expertise, email and messaging systems, secure system design, and data recovery. Progent's support staff has earned the industry's most advanced security certifications including CISM and Information System Security Architecture Professional (ISSAP). Progent also offers fast access to remote Cisco CCIE network consultants who can deliver advanced support with tough network technology problems.

We've Been Hacked: What Can We Do?
Network Security ConsultantsIf your company is now faced with a security crisis and you have no formal recovery procedure, refer to Progent's Online Network Support to learn how to get fast help. Progent provides online technical support from skilled engineers and can escalate trouble tickets to certified security specialists if necessary. Your business does not need to be a registered Progent client to receive urgent help for a security problem, but you can sign up as a Progent customer in advance at no cost and your standing as a current client could save valuable time during a crisis.

Usually, smaller companies have no recovery plan in case of a damaging penetration. This is not good, since the damage from a serious security attack can be more catastrophic for a small company than for a large corporation. Progent's security engineers can help your company to create a practical response and incident reporting procedure that reduces the IT system downtime following a security breach. The formal incident handling procedure promoted by GIAC (Global Information Assurance Certification) is Progent's suggested method for reacting to a serious security attack.

Areas of Progent's Security Expertise
Managing network protection and staying ready for recovering vital information and systems following a security breach demands an on-going effort that entails a variety of technologies and procedures. Progent's certified security professionals can help your business at any level in your efforts to protect your information system and stay in compliance, Services range from security evaluation to creating a comprehensive security strategy. Important technologies supported by Progent's experts include Planning and Implementation, Information Recovery and Security Failure Analysis, plus Managed Protection from E-mail-Borne Threats.

  • Planning, Implementing, and Validating Protected Environments
    Any business should have a thoroughly considered security strategy that incorporates both proactive and reactive activity. The pre-attack plan is a collection of steps that works to reduce vulnerabilities. The post-attack plan specifies procedures to help security staff to evaluate the damage resulting from an attack, repair the damage, document the event, and restore business activity as soon as possible. Progent can show you how to design security into your company operations, install scanning utilities, define and execute a secure computer architecture, and recommend processes and policies to enhance the protection of your computing environment. Progent's security professionals are available to assist you to set up a firewall, design secure offsite access to e-mail and files, and install an effective virtual private network (VPN). If your company is interested in an economical way for outsourcing your security management, Progent's 24x7 Network Support Services include continual remote network monitoring and fast response to problems.
  • Data Restoration and Failure Analysis
    Progent offers expertise in recovering networks and devices that have been hacked, are suspect, or have failed as a result of a security attack. Progent can help assess the damage resulting from the attack, return your company to normal business operations, and retrieve data lost owing to the breach. Progent's certified specialists can also oversee a comprehensive failure analysis by examining activity logs and utilizing a variety of advanced forensics tools. Progent's background with security issues minimizes your business disruption and allows Progent to propose effective strategies to avoid or mitigate future attacks.
  • Email Security with Spam Filtering, Virus Protection, Content Filtering, and Data Loss Prevention
    Email Guard is Progent's email filtering and encryption solution that uses the technology of top information security vendors to deliver web-based management and world-class security for all your inbound and outbound email. The powerful structure of Progent's Email Guard managed service combines cloud-based filtering with a local security gateway appliance to offer advanced defense against spam, viruses, Denial of Service Attacks, Directory Harvest Attacks, and other email-based threats. The cloud filter serves as a preliminary barricade and blocks most unwanted email from reaching your security perimeter. This decreases your vulnerability to external threats and conserves network bandwidth and storage space. Email Guard's onsite gateway device provides a deeper layer of inspection for inbound email. For outgoing email, the local gateway offers AV and anti-spam protection, policy-based Data Loss Prevention, and email encryption. The on-premises security gateway can also assist Exchange Server to track and safeguard internal email traffic that stays inside your corporate firewall. Find out more about Progent's Email Guard Spam Filtering, Virus Defense, Email Content Filtering and Data Leakage Prevention.
High-value Security Expertise Offered by Progent
Progent's security consultants offer advanced support in vital facets of IT security including:
  • Security Vulnerability Evaluation and Security Compliance Testing
    Progent provides expertise with security evaluation utilities like MS Baseline Security Analyzer and LANguard from GFI for performing a set of automatic system scans to reveal possible security problems. Progent has extensive skills with scanning tools and can help you to analyze audit reports and react efficiently. Progent's security engineers also can perform web application validation and can conduct thorough evaluation of corporate-wide security to validate your company's compliance with important industry security standards including FISMA, PCI, and ISO 17799. In addition, Progent can evaluate the effectiveness of your wireless protection including stationary wireless equipment as well as portable handsets. Find out additional details about Progent's Vulnerability Audits and Compliance Assessment.
  • Security Inventory and Evaluation Packages for Small Businesses
    Progent has put together two ultra-affordable security inventory service packages intended to allow small businesses to receive a professional network security evaluation from an accredited security consultant. With Progent's External Network Security Inventory Checkup, a security expert administers an extensive test of your network from outside your firewalled perimeter to uncover possible risks in the security posture you present to the outside world. With Progent's Internal Security Inventory Checkup, a security engineer executes a system scan from an authorized machine inside your firewall to evaluate the risk to internal attacks. Both security inventory services are configured and run from a secured remote location. The process is implemented by an engineer with high-level security accreditations who produces a document that summarizes and interprets the information collected by the scan and suggests cost-effective improvements if appropriate.
  • Security Vulnerability Evaluation Bundles for Enterprises
    Progent's qualified security engineers can deliver a range of set-price network security assessment packages designed for institutions who need to meet security standards demanded by state agencies or by vendors. Progent's network security evaluation packages offer larger businesses an opportunity to get a professional look at the strength of their protection environment. For every security assessment bundle, Progent engineers with top security credentials analyze and report on scanned data and make suggestions for effective remediation. The various security assessment bundles feature an added-cost option for on-premises engineers United States.
  • Migrating from ISA Server 2006 and Microsoft Forefront Threat Management Gateway
    Microsoft ISA Server and its replacement Forefront Threat Management Gateway are software solutions that contain an application-aware firewall able to guard networks from external and internal threats. Both products perform deep inspection of network protocols to detect attacks that can elude early-generation firewalls. Microsoft Internet Security and Acceleration Server was replaced by Microsoft Forefront TMG 2010, which is built on ISA Server's technology while providing a variety of improved capabilities. Forefront TMG 2010 has been discontinued by Microsoft, and the security features provided by the product are now typically taken over by purpose-built physical devices from companies that include Cisco, Barracuda, SonicWALL and WatchGuard. (See Cisco ASA 5500-X Firewall with Firepower Services configuration and management.) Progent offers online Microsoft Forefront TMG support and ISA Server 2006 expertise to help you maintain and debug your older firewall environment, and Progent can help you to migrate efficiently to a more current security platform by providing system design, configuration, tuning, training and debugging.
  • Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Series Firewalls, and PIX Firewalls Configuration and Debugging
    Cisco CCIE Network Security SpecialistsThe latest generation of ASA 5500-X Series of firewalls with Firepower Services offer substantially more bang for the buck than Cisco's earlier PIX and ASA 5500 firewalls and have superseded the ASA 5500 and PIX firewalls for all new deployments. After Cisco's purchase of Sourcefire, the entire family of ASA 5500-X devices can be provisioned to enable Firepower Services, built on Sourcefire's Snort product, which is the market's most deployed network intrusion protection system. Firepower services provide powerful new features including advanced malware protection (AMP), URL filtering, dynamic threat analytics, and automation. Progent's Cisco-certified CCIE network experts can assist your company to maintain your current PIX or ASA 5500 security appliances or migrate to ASA 5500-X firewalls with Firepower Services. Progent's consultants offer remote and onsite help with ASA 5500-X firewalls with Firepower Services and can assist your company to design, deploy, optimize, manage and troubleshoot firewall solutions built on Cisco ASA 5500-X firewalls with Firepower Services. See additional details about ASA Firewalls with Firepower configuration and troubleshooting support.
  • Other Firewall and Virtual Private Network Technologies
    As well as being expert in a wide array of security technologies available from Microsoft and Cisco, Progent can provide small organizations top-level consulting for technologies from other important firewall and Virtual Private Network vendors such as:
  • SIEM Security Information and Event Management Solutions
    Security information and event management (SIEM) applications and services are intended to interpret the massive quantity of data collected in security event records created by a wide range of sources including network infrastructure appliances, operating systems, and applications and tools. SIEM software organizes the security event records from these various sources and produces summary reports of security incidents as mandated by government regulations and industry compliance guidelines. Progent's GIAC-certified computer security experts and Cisco CCIE certified network infrastructure experts can help organizations to design, deploy and manage a SIEM system that helps them to see the behavior of attacks and comply with security incident reporting regulations. (See Progent's Security information and Event Management (SIEM) solutions.)
Progent's Security Credentials
Progent's security professionals have been awarded the most respected certifications offered in the industry. These accreditations demand exhaustive testing and proven field background to ensure that candidates have mastered a significant body of security knowledge and techniques and can offer high-level solutions to computer environments of any complexity.
  • CISM Security Consulting Expertise
    CISM identifies the basic skills and worldwide benchmarks of performance that information technology security professionals are expected to achieve. It provides executive management the confidence that consultants who have earned their certification possess the background and knowledge to provide effective security management and consulting services. Progent can offer a CISM expert to help your organization in key security areas such as information protection governance, risk management, information security program management, and crisis handling management. Read more details concerning Progent's Certified Information Security Manager Security Consulting Expertise.
  • Certified Information Systems Security Professionals (CISSP) Security Consulting Services
    Progent's CISSP experts are security specialists who have been awarded CISSP certification through demonstrated professional work, extensive study, and formal examination. CISSP qualification recognizes mastery of an international standard for information security. ANSI has granted the CISSP status official recognition in the area of information security under ISO/IEC 17024. Areas of expertise included within CISSP include security management procedures, security architecture and test systems, connection permission systems, software development security, operations security, hardware security, encryption, telecommunications, network security, and disaster recovery planning. Get more information about Progent's Certified Information Systems Security Professionals (CISSP) Consulting Services.
  • ISSAP Engineering Services
    Progent's ISSAP qualified security experts are experts who have been awarded ISSAP status after thorough testing and significant experience. field experience with information security architecture. ISSAP consultants have in-depth understanding of access management systems and techniques, telecommunications and network infrastructure protection, cryptography, needs evaluation, business continuity and disaster recovery, and physical security. Progent's ISSAP-certified security experts can help your business with all aspects of architecture security. Find out more details about Progent's ISSAP Certified Secure Network Infrastructure Consulting Assistance.
  • CISA Consulting Services
    The Certified Information Systems Auditor accreditation is a globally recognized qualification that signifies mastery in IS security audit and control. Accredited by the American National Standards Institute, the CISA accreditation requires that consultants pass an extensive examination administered by the ISACA professional association. Progent can provide the services of a CISA-certified security professional able to assist companies in the areas of IS audit services, IT enforcement, network assets and architecture lifecycle, information technology support, protecting information resources, and business continuity planning. Learn more details concerning Progent's Certified Information Systems Auditor (CISA) Professional Expertise.
  • Global Information Assurance Certification Professional Services
    GIAC (Global Information Assurance Certification) was founded in 1999 to certify the knowledge of network security experts. GIAC's goal is to verify that a certified security consultant possesses the knowledge needed to provide services in important areas of system, information, and software security. GIAC accreditations are recognized by businesses and institutions around the world including and the United States NSA. Progent offers the help of GIAC certified professionals for any of the network security services addressed under GIAC certification topics including auditing networks, incident handling, traffic analysis, and web-based application security. Find out additional information concerning Progent's Global Information Assurance Certification Consulting Expertise.
Contact Progent for Computer Security Expertise
If you need security consulting expertise, telephone Progent at 800-993-9400 or see Contact Progent.
















© 2002- 2017 Progent Corporation. All rights reserved.