Introduction to Progent's Security Support Services
Progent's certified network security and compliance consultants can provide a wide range of services intended to assist businesses of any size to uncover and eliminate security vulnerabilities, defend against assaults, remediate any damage resulting from a breakdown of protection, and comply with regulatory mandates for guarding data and reporting incidents. Progent can provide a choice of service delivery models:

  • On-demand online and on-site assistance invoiced to the nearest minute
  • Continual fully managed services invoiced at an affordable fixed monthly fee
  • Set-price service packages for a single security and compliance evaluation
On-demand Security Consulting Services
Once you register for Progent's services (signing up is free), you can receive on-demand remote or onsite support from one of Progent security expert. This traditional support model is primarily reactive and geared toward rapidly resolving IT issues that are disrupting your network or that have stumped your in-house support staff. Common scenarios include replacing a firewall appliance or VPN tunnel, installing a critical security patch for a Cisco switch or router, designing compliant access to cloud-based resources, or restoring data after a ransomware assault. These services are invoiced by the minute, which avoids the frustrating situation of receiving big invoices for quick repairs.

Delivery options for Progent's as-needed support services include:

  • Remote Security Support Services
    Most security-related problems can be handled remotely through a mix of phone-based help and an connection between Progent's Technical Response Center (TRC) and a client's computer. Progent's TRC group can provide online security support by offering easy access to consultants with the background and technical resources to resolve some of the most challenging problems quickly, keeping your service expenses affordable and reducing lost productivity.
  • Onsite Security Services
    For instances where on-premises assistance is required, Progent can dispatch a technical professional to major metropolitan areas across the U.S. Progent can also send a security consultant with high-level certifications and advanced skills to any site in the country.
Progent's security consultants are qualified to support environments based on Windows, Linux, Apple, Solaris, and popular derivatives of UNIX. Progent's wide selection of consulting services encompasses firewall configuration, e-mail systems, secure network architecture, and information restoration. Progent's technical support team has earned the world's top security certifications including GIAC (Global Information Assurance Certification) and CISSP. Progent also offers fast access to online Cisco-certified CCIE network engineers who can provide world-class support with tough network integration issues.

Progent's Flat-rate Managed Services for Information Assurance
Progent offers a collection of low-cost, set-price monthly services intended to provide small and mid-size organizations with enterprise-class support and state-of-the-art technology for all aspects of information assurance and compliance. Managed services offered by Progent include:

  • ProSight Email Guard: Spam Filtering, Data Leakage Protection and Content Filtering
    ProSight Email Guard is Progent's email security solution that incorporates the services and infrastructure of leading information security companies to provide web-based management and world-class security for your email traffic. The powerful architecture of Email Guard combines cloud-based filtering with an on-premises security gateway device to provide complete defense against spam, viruses, Dos Attacks, Directory Harvest Attacks (DHAs), and other email-borne threats. The Cloud Protection Layer acts as a preliminary barricade and blocks most unwanted email from reaching your security perimeter. This reduces your vulnerability to external threats and saves network bandwidth and storage space. Email Guard's onsite security gateway appliance provides a deeper layer of analysis for incoming email. For outgoing email, the onsite gateway offers anti-virus and anti-spam filtering, protection against data leaks, and email encryption. The on-premises security gateway can also assist Exchange Server to monitor and protect internal email traffic that stays within your corporate firewall. Find out more about Progent's ProSight Email Guard spam filtering, virus defense, email content filtering and data loss prevention.

  • ProSight Active Security Monitoring (ASM): Next Generation Endpoint Protection and Ransomware Recovery
    Progent's ProSight Active Security Monitoring (ASM) is an endpoint protection (EPP) service that utilizes next generation behavior-based machine learning technology to guard endpoint devices and physical and virtual servers against new malware attacks like ransomware and file-less exploits, which easily get by traditional signature-based AV tools. ProSight ASM safeguards on-premises and cloud resources and provides a single platform to manage the entire malware attack lifecycle including protection, infiltration detection, mitigation, cleanup, and post-attack forensics. Top features include one-click rollback using Windows VSS and real-time system-wide immunization against new attacks. Read more about Progent's ProSight Active Security Monitoring (ASM) next-generation endpoint protection and ransomware defense.

  • ProSight DPS: Managed Cloud Backup
    ProSight Data Protection Services from Progent provide small and mid-sized organizations an affordable end-to-end service for reliable backup/disaster recovery (BDR). Available at a low monthly price, ProSight DPS automates and monitors your backup activities and enables fast recovery of critical files, applications and virtual machines that have become unavailable or damaged as a result of hardware breakdowns, software glitches, natural disasters, human mistakes, or malware attacks such as ransomware. ProSight Data Protection Services can help you protect, retrieve and restore files, folders, applications, system images, plus Hyper-V and VMware virtual machine images. Critical data can be protected on the cloud, to a local device, or mirrored to both. Progent's BDR specialists can provide advanced support to set up ProSight DPS to to comply with government and industry regulatory requirements like HIPPA, FIRPA, and PCI and, when necessary, can help you to restore your business-critical data. Find out more about ProSight Data Protection Services managed backup and recovery.

  • ProSight WAN Watch: Network Infrastructure Management
    ProSight WAN Watch is an infrastructure monitoring and management service that makes it easy and affordable for small and mid-sized businesses to diagram, track, optimize and debug their connectivity hardware such as routers, firewalls, and wireless controllers plus servers, endpoints and other networked devices. Using state-of-the-art Remote Monitoring and Management (RMM) technology, ProSight WAN Watch ensures that network maps are kept current, captures and displays the configuration information of almost all devices on your network, tracks performance, and sends alerts when issues are detected. By automating time-consuming management processes, WAN Watch can cut hours off ordinary chores like network mapping, expanding your network, finding devices that need critical software patches, or isolating performance bottlenecks. Learn more about ProSight WAN Watch network infrastructure monitoring and management consulting.

  • ProSight Systems Watch: Server and Desktop Monitoring
    ProSight Systems Watch is Progentís server and desktop and management service that uses state-of-the-art remote monitoring and management techniques to help keep your IT system running at peak levels by tracking the health of vital assets that power your business network. When ProSight Systems Watch uncovers a problem, an alarm is sent automatically to your specified IT personnel and your assigned Progent consultant so that all potential issues can be addressed before they can disrupt productivity Learn more about ProSight Systems Watch server and desktop automated management services.
Set-price Security Evaluation and Verification Packages
Progent has put together a portfolio of fixed-price security evaluation bundles that provide exceptional value by deploying Progent's advanced network monitoring and analysis tools as well as Progent's technical skills to produce an objective and comprehensive assessment of your IT environment security posture.
  • Security Inventory Service Bundles for Small Organizations
    Progent offers two ultra-affordable security inventory scanning service packages designed to enable small businesses to obtain a professional security evaluation from an accredited security engineer. With Progent's External Security Inventory Scan, an engineer manages an extensive examination of your IT system from outside your firewalled perimeter to determine potential gaps in the security posture you present to the public. With Progent's Internal Security Inventory Scan, a certified security expert runs a network scan using an authorized machine within your corporate firewall to evaluate your exposure to inside attacks. The two security inventory scanning services are configured and executed from a secured offsite location. The scan is administered by a consultant who has earned advanced security certifications and who creates a report that describes and interprets the information collected by the security scan and recommend practical improvements where appropriate.
  • Security Vulnerability Assessment Bundles for Enterprises
    Progent has developed three levels of set-price security assessment service bundles intended for large organizations who need to meet security standards required by government or industry regulators. Progent's security evaluation service packages offer larger organizations an opportunity to get a professional assessment at the viability of their security posture. For every security evaluation bundle, Progent engineers with advanced security credentials analyze and report on collected data and offer recommendations for cost-effective improvements. All the network security assessment packages include an added-cost option for onsite engineers anywhere in the United States.
  • Stealth Penetration Testing
    Stealth penetration testing, often known as PEN testing, is a critical tool for allowing organizations to find out how open their network environments are to modern threats. Progent's stealth penetration testing test how well your corporate security policies and technologies stand up to authorized but unannounced intrusion attempts managed by Progent's veteran security experts utilizing cutting-edge hacking methods. Read about Progent's stealth penetration testing (PEN Test) services.
Our Network Has Been Hacked: What Are We Supposed to Do?
Network Security ConsultantsIf your business is currently experiencing a network security crisis and you have no detailed response plan, refer to Progent's Online Technical Help to find out how to get immediate help. Progent offers remote assistance from experienced network technicians and can refer trouble tickets to certified security specialists if necessary. Your organization does not need to be a current Progent client to receive urgent help for a security breach, but you can sign up as a Progent customer ahead of time for free and your standing as a current client could save precious time in case of an emergency.

Usually, smaller businesses have not documented a recovery procedure in case of a successful security breach. This is risky, since the damage from a successful security assault can be even more devastating for a small company than for a large enterprise. Progent's security engineers can help your company to create an efficient recovery and incident reporting procedure that minimizes the IT system downtime resulting from a security breach. The formal incident handling model promoted by GIAC (Global Information Assurance Certification) is Progent's recommended procedure for handling a major security penetration.

Advanced Security Expertise Offered by Progent
Progent's certified engineers can provide consulting support in vital facets of network compliance such as:

  • Vulnerability Audits and Compliance Assessment
    Progent offers experience with security evaluation software like MS Baseline Security Analyzer or LANguard from GFI for performing a set of automatic network scans to reveal potential security holes. Progent has extensive skills with monitoring tools and can assist you to understand assessment reports and react appropriately. Progent's certified security engineers also provide web application validation and can conduct thorough assessments of enterprise-wide security to verify your organization's compliance with major worldwide security standards including HIPAA, NIST, and ISO 17799. In addition, Progent can evaluate the effectiveness of your wireless security covering stationary wireless equipment as well as mobile devices. Get additional details concerning Progent's Security Vulnerability Audits and Compliance Testing.
  • Designing, Building, and Validating Protected Networks
    Any business should develop a thoroughly thought out security strategy that includes both proactive and reactive elements. The proactive plan is a collection of steps that works to reduce security holes. The reactive plan specifies activities to assist IT staff to assess the losses resulting from an attack, repair the damage, record the experience, and restore network activity as soon as possible. Progent can advise you how to design protection into your business operations, install scanning utilities, create and build a secure network infrastructure, and recommend processes and policies to enhance the safety of your network. Progent's security experts are ready to help you to set up a firewall, deploy secure remote access to e-mail and data, and install an effective virtual private network (VPN). If your company is looking for an economical option for jobbing out your network security management, Progent's 24x7 Monitoring Services feature continual remote system tracking and fast resolution of emergencies.
  • Data Recovery and Failure Analysis
    Progent provides skill in restoring systems and computers that have been compromised, are in question, or have stopped working because of a security attack. Progent can show you how to evaluate the damage caused by the attack, restore normal functions, and recover data lost owing to the attack. Progent's certified specialists can also manage a comprehensive forensic analysis by going over activity logs and utilizing other proven assessment techniques. Progent's experience with security problems reduces your business disruption and allows Progent to recommend efficient strategies to avoid or mitigate new assaults.
  • Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Series Firewalls, and PIX 500 Firewalls Configuration and Debugging
    Cisco CCIE Security ConsultantsThe new ASA 5500-X Series of firewalls with Firepower Services provide substantially more bang for the buck than Cisco's previous firewalls and have replaced the ASA 5500 and PIX firewalls for all new deployments. After Cisco's acquisition of Sourcefire, the whole family of Cisco ASA 5500-X devices can be provisioned to enable Firepower Services, built on Sourcefire's Snort technology, which is the market's most popular network intrusion protection system. Firepower services provide powerful new features including advanced malware protection (AMP), URL filtering, dynamic threat analytics, and security automation. Progent's Cisco-qualified CCIE network consultants can help your company to maintain your legacy PIX or Cisco ASA 5500 security appliances and upgrade to Cisco ASA 5500-X firewalls with Firepower Services. Progent's consultants offer remote and onsite support for ASA 5500-X firewalls with Firepower Services and can help your organization to plan, deploy, tune, administer and troubleshoot firewall solutions based on Cisco ASA 5500-X firewalls with Firepower Services. Read additional information about ASA Firewalls with Firepower Services integration and debugging services.
  • Additional Firewall and VPN Solutions
    As well as supporting a broad array of network security technologies from Microsoft and Cisco, Progent offers small and mid-size companies expert engineering services for products from other important firewall and VPN vendors such as:
  • SIEM Solutions
    Security information and event management (SIEM) applications and services are designed to interpret the enormous quantity of information represented by security event logs created by multiple sources including network infrastructure appliances, operating systems, and application software and monitoring tools. SIEM applications analyzes the security logs from these diverse sources and produces summary reports of security events as required by government regulations and business compliance standards. Progent's GIAC-certified information assurance experts and Cisco CCIE certified network consultants can assist businesses to design, deploy and operate a SIEM solution that enables them to understand the progress of attacks and comply with event reporting regulations. (Visit Progent's Security information and Event Management solutions.)
Progent's Security Accreditations
Progent's security consultants have earned some of the most prestigious certifications offered in the industry. These accreditations demand extensive testing and proven field background to guarantee that recipients have acquired expertise with a substantial body of security knowledge and methodologies and can offer advanced security solutions to information networks of any complexity.
  • Certified Information Security Manager (CISM) Security Support Services
    CISM defines the basic competencies and worldwide benchmarks of service that IT security managers are required to master. CISM offers executive management the assurance that consultants who have been awarded their accreditation have the experience and skill to provide effective security administration and engineering services. Progent can offer a CISM-certified consultant to assist your organization in key security areas such as information security governance, vulnerability management, information protection program management, and crisis handling support. Read additional information about Progent's Certified Information Security Manager (CISM) Security Support Assistance.

  • Certified Information Systems Security Professionals (CISSP) Security Support Services
    Progent's Certified Information Systems Security Professionals (CISSPs) are security specialists who have earned CISSP accreditation through demonstrated professional work, rigorous study, and exhaustive testing. CISSP Certification recognizes expertise in an international standard for IT security. American National Standards Institute has granted the CISSP status accreditation in the field of information security under ISO/IEC 17024. Fields of expertise included under CISSP include security management practices, security architecture and models, connection control systems, applications development security, operations security, physical security, encryption, communications, Internet security, and disaster recovery planning. Get additional information about Progent's CISSP Consulting Expertise.

  • Information Systems Security Architecture Professionals (ISSAP) Consulting Support
    Progent's ISSAP certified security experts are consultants who have been awarded ISSAP accreditation as a result of thorough examination and significant experience. field experience with network security architecture. ISSAP security experts have comprehensive knowledge of access management systems and techniques, phone system and network infrastructure security, cryptography, requirements analysis, business continuity and DRP, and physical security. Progent's ISSAP-qualified security experts can assist your company with all phases of architecture security. Get more details concerning Progent's ISSAP Certified Protected System Architecture Consulting Support.

  • Certified Information Systems Auditor (CISA) Consulting Services
    The Certified Information Systems Auditor accreditation is an important achievement that represents mastery in IS security audit and control. Certified by the American National Standards Institute (ANSI), the CISA credential requires that candidates pass an extensive examination given by the ISACA international professional association. Progent offers the expertise of a CISA-qualified security engineer able to assist companies in the fields of information systems audit process, information technology enforcement, systems and architecture lifecycle, IT support, protecting data assets, and disaster recovery planning. Learn additional information concerning Progent's CISA Professional Services.

  • GIAC (Global Information Assurance Certification) Professional Expertise
    Global Information Assurance Certification was founded in 1999 to certify the skill of IT security experts. GIAC's goal is to ensure that an accredited security consultant has the skills needed to provide support in vital areas of system, data, and software security. GIAC certifications are recognized by companies and institutions all over the world including and the U.S. National Security Agency (NSA). Progent can provide the help of GIAC certified professionals for any of the network security disciplines covered under GIAC accreditation programs such as assessing networks, security incident response, traffic analysis, and web application security. Read more information about Progent's Global Information Assurance Certification Support Expertise.
Contact Progent for Computer Security Consulting Services
If you need network security help, telephone Progent at 800-993-9400 or go to Contact Progent.
















© 2002- 2018 Progent Corporation. All rights reserved.