Overview of Progent's Security Support Services
Progent's certified computer security engineers offer a wide range of professional services intended to help organizations of all sizes to identify and eliminate security vulnerabilities, defend against security assaults, and recover from the damage caused by a security breach. Progent can provide remote and on premises service and also has developed economical fixed-cost security evaluation packages to complement Progent's regular by-the-minute billing.

Support services delivery alternatives offered by Progent include:

  • Remote Security Services
    Most security issues can be handled online via a mix of phone-based support and remote Internet connections between Progent's Help Desk and a customer's computer system. Progent's Help Desk support group includes security engineers with the experience and technical resources to fix some of the most challenging problems quickly, making your service expenses reasonable and reducing lost productivity. Progent offers standard online security help on a per-minute model without minimum call duration and no additional charges for setup or after hours service. Progent's pricing structure avoids scenarios where simple solutions entail big charges. Progent also offers a number of fixed-price online security and compliance evaluation bundles that provide exceptional value by utilizing Progent's advanced network monitoring software as well as Progent's consulting experience to deliver an objective and thorough analysis of your network vulnerability.

  • Onsite Security Support Services
    For cases where on-site support is needed, Progent can dispatch a field service professional to major cities across the United States within one day to work in conjunction with one of Progent's online security consultants. This method can be an efficient way for delivering both high-level consulting and on-premises technical support to resolve network security crises such as disaster recovery. Progent's certified security consultants are in addition available to assist with jobs that require world-class security specialists to be on site, and Progent's most comprehensive security evaluation packages for enterprises include the participation of a team of certified security experts at your location.

  • Emergency Security Services
    To get fast assistance with critical computer security issues, your business can access professional troubleshooting online from Progent's the security professionals available at Progent's Technical Response Center. Progent's emergency remote security support consultants are ready to provide efficient and economical assistance with security emergencies that are impacting the viability of your information system. Progent's accredited security consultants are certified to provide help for systems based on Microsoft Windows, Linux, Apple Mac, Sun, and major versions of UNIX. Progent's wide range of services addresses firewall expertise, email systems, protected system architecture, and data recovery. Progent's support team has been awarded the industry's most advanced security credentials including CISA and Certified Information Systems Security Professional. Progent also can provide immediate access to online Cisco CCIE network engineers who can deliver world-class support with complex network configuration problems.
Our System Has Been Attacked: What Can We Do?
Microsoft Exchange Server 2007 ConsultingIn case you are currently faced with a security crisis and you have no formal response plan, refer to Progent's Emergency Remote Computer Support to find out how to receive fast assistance. Progent offers online help from skilled engineers and can escalate problems to high-level security specialists if required. Your company does not need to be a current Progent customer to get urgent support for a security breach, but you can sign up as a Progent customer in advance at no cost and your standing as a current client can save precious time when there is an emergency.

Typically, small companies have not created a response procedure in case of a security attack. This is unfortunate, since the damage from a serious security attack can be even more catastrophic for a small company than for a big enterprise. Progent's security engineers can assist your company to design an efficient recovery plan that minimizes the IT system disruption resulting from a security penetration. The formal incident response model promoted by GIAC is Progent's recommended method for responding to a serious security penetration.

Areas of Progent's Security Consulting Expertise
Managing data security plus staying ready for restoring vital data and systems following a successful attack demands an on-going program that entails an array of tools and processes. Progent's certified security experts can assist your business at all levels in your efforts to safeguard your information system, ranging from security audits to creating a comprehensive security program. Key areas covered by Progent's security consultants include Planning and Implementation, Information Recovery and Security Forensics, and Email Security, Encryption and Content Filtering.

  • Designing, Implementing, and Testing Secure Environments
    Every business ought to have a carefully thought out security plan that incorporates both proactive and responsive activity. The pre-attack strategy is a collection of steps that helps to reduce vulnerabilities. The reactive strategy defines activities to assist IT staff to assess the losses resulting from a breach, repair the damage, document the experience, and restore business activity as quickly as feasible. Progent can advise you how to build protection into your business operations, configure scanning utilities, create and build a safe IT infrastructure, and propose processes and policies to enhance the protection of your information system. Progent's security professionals are available to help you to set up a firewall, design safe remote access to e-mail and data, and configure practical VPN connections. If your company is looking for an affordable way for outsourcing your network security administration, Progent's 24x7 Network Support Options include automated online network tracking and fast response to emergencies.
  • Data Recovery and Failure Analysis
    Progent has skill in recovering systems and servers that have been hacked, are quarantined, or have stopped working because of a security penetration. Progent can help determine the damage caused by the attack, return your company to ordinary functions, and recover information compromised owing to the event. Progent's security specialists can also perform a thorough forensic evaluation by examining activity logs and utilizing other advanced assessment tools. Progent's background with security problems minimizes your downtime and allows Progent to propose effective ways to avoid or mitigate new assaults.
  • Email Security with Inbound and Outbound Spam and Virus Filtering
    Progent has worked with top data security companies to offer Email Guard, a hybrid solution that combines cloud and on-premises resources to defend against spam, viruses, Denial of Service (DoS) attacks and other email-based threats. Email Guard offers both inbound and outbound filtering. Data Loss Protection (DLP) and cloud-assisted encryption use custom policies for automatically keeping sensitive information from leaking from your organization via intentional or careless emails. By blocking outbound spam and viruses, Email Guard also helps keep your organization off spam block lists. To assure consistent system performance, Email Guard offers adjustable, threshold-based rate control for inbound and outbound email traffic. Learn more about Progent's Email Guard Spam and Virus Filtering.
Advanced Security Services Offered by Progent
Progent's veteran engineers can provide world-class expertise in vital facets of computer compliance such as:
  • Security Vulnerability Evaluation and Security Compliance Testing
    Progent provides expertise with security auditing tools such as Microsoft Baseline Security Analyzer and LANguard for conducting a variety of automatic system tests to identify potential security holes. Progent has extensive skills with these utilities and can assist you to analyze assessment reports and react efficiently. Progent's security engineers also can perform web software testing and can conduct objective evaluations of enterprise-wide security to validate your organization's compliance with major global security specifications such as FISMA, NIST, and ISO. In addition, Progent can assess the effectiveness of your wireless protection covering stationary wireless appliances as well as mobile devices. Find out more about Progent's Security Vulnerability Evaluation and Compliance Testing.
  • Security Inventory Service Bundles for Small Companies
    Progent has put together two ultra-affordable security inventory scanning packages designed to allow small businesses to get a professional security assessment from an accredited security engineer. With Progent's External Security Inventory Checkup, an engineer administers an extensive examination of your network from beyond your firewalled perimeter to determine potential risks in the security posture you present to the outside world. With Progent's Internal Security Inventory Scan, a security expert executes a system scan from an authorized machine inside your company firewall to assess your exposure to internal assaults. The two security inventory services are configured and run from a secured external site. The project is managed by an engineer who has earned high-level security accreditations who produces a document that details and interprets the data captured by the scan and suggests practical improvements where appropriate.
  • Security Vulnerability Evaluation Packages for Large Businesses
    Progent's certified security engineers can deliver a selection of set-price security evaluation service bundles designed for enterprises who need to meet security standards required by state regulators or by vendors. Progent's security assessment service packages offer larger businesses a chance to get a professional look at the strength of their protection profile. For each security evaluation bundle, Progent engineers with top security credentials analyze and report on collected data and provide recommendations for efficient remediation. The various network security audit packages include an added-cost option for onsite engineers anywhere in the U.S.
  • Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Firewalls, and PIX Firewalls Configuration and Debugging
    Cisco Certified CCIE Security ConsultantsThe new ASA 5500-X Series of firewalls with Firepower Services deliver substantially more performance than Cisco's earlier firewalls and have replaced the ASA 5500 and PIX 500 firewalls for all new deployments. Following Cisco's acquisition of Sourcefire, the entire family of ASA 5500-X firewalls can be provisioned to support Firepower Services, built on Sourcefire's Snort product, which is the market's most popular network intrusion protection system (IPS). Firepower services bring powerful new features such as advanced malware protection (AMP), URL filtering, dynamic threat analytics, and security automation. Progent's Cisco-qualified CCIE network consultants can help you to manage your existing PIX or Cisco ASA 5500 firewalls and migrate to ASA 5500-X firewalls with Firepower Services. Progent's consultants can provide online and onsite support for ASA 5500-X firewalls with Firepower Services and can assist your business to design, deploy, tune, manage and debug firewall environments based around Cisco ASA 5500-X firewalls with Firepower Services. Find out more information about ASA Firewalls with Firepower Services configuration and debugging support.
  • Other Firewall and Virtual Private Network (VPN) Technologies
    In addition to being expert in a broad array of security solutions from Microsoft and Cisco Systems, Progent can provide small and mid-size businesses top-level consulting for technologies from other important firewall and Virtual Private Network (VPN) vendors including: — Check Point Software Technologies
    WatchGuard
    Juniper Networks/NetScreen
    SonicWALL
    Symantec Corp
  • Stealth Penetration Testing Services
    Stealth penetration testing is a vital technique for allowing businesses to find out how vulnerable their IT environments are to real-world threats by testing how well corporate security procedures and technologies stand up to authorized but unannounced intrusion attempts launched by veteran security specialists using advanced hacking methods. Get additional information about Progent's Stealth Intrusion Testing Services.
Progent's Security Accreditations
Progent's security professionals have been awarded the most respected accreditations offered in the security industry. These certifications require exhaustive examinations and demonstrated work background to guarantee that candidates have mastered a significant body of security information and methodologies and can offer advanced solutions to computer networks of any complexity.
  • Certified Information Security Manager (CISM) Security Support Expertise
    CISM identifies the fundamental competencies and worldwide standards of service that IT security professionals are required to master. CISM provides executive management the confidence that those who have earned their certification have the experience and knowledge to offer effective security administration and consulting support. Progent can offer a CISM expert to assist your organization in critical security areas such as data security governance, vulnerability assessment, data security program control, and crisis response management. Get more details concerning Progent's CISM Security Support Expertise.
  • Certified Information Systems Security Professionals (CISSP) Security Support Expertise
    Progent's CISSP experts are security specialists who have been awarded CISSP accreditation as a result of verified experience, extensive study, and formal testing. CISSP qualification indicates expertise in an international standard for information security. ANSI has given the CISSP status official recognition in the field of information security under ISO/IEC 17024. Areas of expertise included within CISSP include security administration practices, security design and models, connection control systems, applications development security, operations security, hardware security, cryptography, telecommunications, Internet security, and disaster recovery planning. Read more about Progent's CISSP Consulting Assistance.
  • Information Systems Security Architecture Professionals (ISSAP) Engineering Services
    Progent's ISSAP certified security consultants are experts who have earned ISSAP certification as a result of rigorous testing and significant experience. field experience with information security design. ISSAP security experts have acquired in-depth understanding of access management mechanisms and techniques, phone system and network infrastructure security, cryptography, requirements analysis, BCP and DRP, and physical security. Progent's ISSAP-certified security consultants can assist your business with all aspects of secure network architecture. Learn the details about Progent's ISSAP Certified Protected Network Architecture Engineering Services.
  • Certified Information Systems Auditor (CISA) Support Expertise
    The CISA credential is a recognized achievement that represents expertise in information system security auditing. Certified by the American National Standards Institute (ANSI), the CISA accreditation requires that consultants undergo an extensive examination given by the ISACA professional group. Progent can provide the expertise of a CISA-certified security professional able to assist companies in the areas of information systems audit process, information technology governance, systems and architecture lifecycle, information technology support, protecting data resources, and business continuity planning. Get more details concerning Progent's CISA Consulting Expertise.
  • Global Information Assurance Certification (GIAC) Support Expertise
    Global Information Assurance Certification was established in 1999 to certify the knowledge of information technology security professionals. GIAC's mission is to verify that an accredited professional has the knowledge needed to provide services in key categories of system, data, and software security. GIAC accreditations are acknowledged by businesses and institutions around the world including and the U.S. National Security Agency (NSA). Progent offers the assistance of certified security engineers for any of the network security capabilities addressed within GIAC accreditation programs such as assessing perimeters, incident handling, traffic analysis, and web application security. Learn more about Progent's GIAC Support Assistance.
Depend on Progent for Network Security Help
If you need computer security expertise, telephone Progent at 800-993-9400 or visit Contact Progent.
















© 2002- 2017 Progent Corporation. All rights reserved.

More topics of interest: