Introduction to Progent's Security and Compliance Support Services
Progent's industry certified computer security professionals can provide a broad range of support services intended to assist businesses of all sizes to identify and eliminate security weaknesses, block attacks, recover from the problems caused by a breach of protection, and meet government mandates for protecting information and reporting incidents. Progent offers a choice of service modes:
As-needed Security Consulting Services
- As-needed remote and on-site support billed by the minute
- On-going managed services invoiced at a low fixed monthly fee
- Set-price service bundles for a single security and compliance assessment
Once you register for Progent's services (signing up is free), you can receive on-demand remote or on-premises assistance from one of Progent security and compliance expert. This traditional support model is essentially reactive and optimized for rapidly resolving technical problems that are affecting your productivity or that have stumped your own support personnel. Common scenarios include configuring a firewall appliance or VPN connection, implementing a vital security update for a Cisco switch or router, setting up secure access to cloud-based resources, or restoring data after a ransomware assault. These services are invoiced by the minute, which avoids the annoying situation of getting large bills for fast fixes.
Delivery options for Progent's as-needed support services include:
Progent's security consultants are certified to provide help for environments based on Windows, Linux, macOS and OS X, Sun Solaris, and major versions of UNIX. Progent's wide array of consulting services encompasses firewall configuration, e-mail systems, secure system design, and information restoration. Progent's technical support team has been awarded the industry's top security accreditations including GIAC (Global Information Assurance Certification) and CISSP. Progent also can provide fast access to remote Cisco CCIE network engineers who can deliver world-class support with tough network technology issues.
- Online Security Services
The majority security-related problems can be resolved remotely via a mix of phone support and a remote connection between Progent's Technical Response Center (TRC) and a client's network. Progent's TRC group can provide remote security help by offering easy access to consultants with the background and technical resources to resolve many of the most challenging issues quickly, keeping your support expenses affordable and reducing lost productivity.
- On-premises Security Services
For cases where on-premises support is necessary, Progent can send a technical expert to major cities throughout the United States. Progent can also send a security specialist with high-level certifications and advanced skills to any location in the country.
ProSight Fixed-price Managed Services for Information Assurance
Progent's low-cost ProSight family of network management outsourcing services is designed to provide small and mid-size businesses with enterprise-class support and cutting-edge technology for all aspects of information assurance and compliance. Managed services offered by Progent include:
ProSight Network Audits
- ProSight Active Security Monitoring (ASM): Endpoint Protection and Ransomware Defense
ProSight Active Security Monitoring (ASM) is an endpoint protection (EPP) solution that incorporates next generation behavior-based machine learning tools to defend endpoints as well as physical and virtual servers against modern malware attacks such as ransomware and file-less exploits, which easily get by legacy signature-matching AV products. ProSight ASM safeguards on-premises and cloud-based resources and offers a single platform to manage the complete threat progression including filtering, infiltration detection, containment, remediation, and post-attack forensics. Top capabilities include single-click rollback using Windows Volume Shadow Copy Service and automatic system-wide immunization against newly discovered threats. Read more about Progent's ProSight Active Security Monitoring next-generation endpoint protection and ransomware defense.
- ProSight Enhanced Security Protection (ESP): Unified Endpoint Security
Progent's ProSight Enhanced Security Protection managed services offer economical in-depth security for physical servers and VMs, desktops, smartphones, and Exchange email. ProSight ESP utilizes contextual security and advanced heuristics for continuously monitoring and responding to cyber threats from all attack vectors. ProSight ESP offers firewall protection, intrusion alarms, device management, and web filtering through leading-edge tools incorporated within one agent accessible from a unified control. Progent's security and virtualization consultants can assist your business to design and configure a ProSight ESP environment that addresses your company's unique requirements and that allows you achieve and demonstrate compliance with legal and industry data protection standards. Progent will assist you define and implement policies that ProSight ESP will manage, and Progent will monitor your IT environment and react to alerts that require immediate attention. Progent can also assist your company to install and test a backup and restore system such as ProSight Data Protection Services (DPS) so you can recover quickly from a destructive security attack like ransomware. Read more about Progent's ProSight Enhanced Security Protection unified physical and virtual endpoint security and Exchange email filtering.
- ProSight DPS: Managed Backup and Recovery
ProSight Data Protection Services from Progent provide small and mid-sized businesses an affordable and fully managed solution for reliable backup/disaster recovery (BDR). For a fixed monthly price, ProSight Data Protection Services automates and monitors your backup activities and allows rapid restoration of critical files, apps and VMs that have become unavailable or corrupted due to hardware breakdowns, software glitches, disasters, human mistakes, or malicious attacks like ransomware. ProSight Data Protection Services can help you back up, retrieve and restore files, folders, apps, system images, as well as Microsoft Hyper-V and VMware images/. Critical data can be protected on the cloud, to a local device, or to both. Progent's backup and recovery specialists can provide world-class expertise to set up ProSight Data Protection Services to to comply with government and industry regulatory standards like HIPAA, FIRPA, PCI and Safe Harbor and, whenever needed, can assist you to recover your business-critical data. Read more about ProSight Data Protection Services Managed Backup and Recovery.
- ProSight Email Guard: Inbound and Outbound Spam Filtering, Data Leakage Protection and Email Encryption
ProSight Email Guard is Progent's email filtering and encryption platform that uses the technology of leading information security vendors to provide web-based control and comprehensive security for all your email traffic. The hybrid architecture of Progent's Email Guard integrates cloud-based filtering with an on-premises gateway device to provide complete defense against spam, viruses, Dos Attacks, DHAs, and other email-based threats. Email Guard's cloud filter acts as a preliminary barricade and keeps the vast majority of unwanted email from reaching your security perimeter. This reduces your vulnerability to external threats and conserves network bandwidth and storage. Email Guard's onsite gateway appliance adds a further level of inspection for inbound email. For outbound email, the local security gateway provides AV and anti-spam protection, protection against data leaks, and encryption. The on-premises security gateway can also assist Microsoft Exchange Server to monitor and safeguard internal email traffic that originates and ends inside your corporate firewall. Find out more about Progent's ProSight Email Guard spam filtering, virus defense, content filtering and data loss protection.
- ProSight WAN Watch: Network Infrastructure Management
ProSight WAN Watch is an infrastructure monitoring and management service that makes it easy and affordable for smaller organizations to map, track, optimize and troubleshoot their networking appliances like routers, firewalls, and load balancers plus servers, printers, endpoints and other networked devices. Using state-of-the-art RMM technology, ProSight WAN Watch makes sure that infrastructure topology diagrams are kept current, captures and manages the configuration of virtually all devices on your network, tracks performance, and generates notices when issues are detected. By automating time-consuming management activities, ProSight WAN Watch can knock hours off common tasks like making network diagrams, expanding your network, finding devices that need critical software patches, or isolating performance problems. Learn more about ProSight WAN Watch network infrastructure monitoring and management consulting.
- ProSight LAN Watch: Server and Desktop Remote Monitoring and Management
ProSight LAN Watch is Progentís server and desktop monitoring managed service that incorporates advanced remote monitoring and management techniques to keep your network operating efficiently by checking the health of vital assets that power your information system. When ProSight LAN Watch uncovers an issue, an alarm is transmitted automatically to your designated IT personnel and your Progent consultant so that any potential problems can be resolved before they have a chance to disrupt your network Find out more details about ProSight LAN Watch server and desktop monitoring services.
- ProSight Virtual Hosting: Hosted VMs at Progent's Tier III Data Center
With ProSight Virtual Hosting service, a small or mid-size organization can have its key servers and applications hosted in a secure fault tolerant data center on a high-performance virtual machine host set up and managed by Progent's network support professionals. With the ProSight Virtual Hosting model, the customer retains ownership of the data, the operating system software, and the applications. Because the system is virtualized, it can be ported immediately to a different hardware environment without requiring a time-consuming and technically risky reinstallation process. With ProSight Virtual Hosting, you are not tied one hosting provider. Find out more about ProSight Virtual Hosting services.
- ProSight IT Asset Management: Network Documentation Management
Progent's ProSight IT Asset Management service is an IT infrastructure documentation management service that allows you to capture, maintain, find and safeguard information about your network infrastructure, procedures, business apps, and services. You can quickly find passwords or IP addresses and be warned automatically about upcoming expirations of SSL certificates or warranties. By cleaning up and organizing your IT documentation, you can save up to half of time thrown away looking for critical information about your IT network. ProSight IT Asset Management features a centralized repository for holding and sharing all documents related to managing your business network like standard operating procedures (SOPs) and How-To's. ProSight IT Asset Management also offers a high level of automation for collecting and relating IT data. Whether youíre making improvements, performing regular maintenance, or responding to a crisis, ProSight IT Asset Management gets you the data you need when you need it. Learn more about Progent's ProSight IT Asset Management service.
Progent's ProSight Network Audits are a quick and low-cost way for small and medium-size businesses to obtain an unbiased assessment of the health of their network. Powered by a selection of the leading remote monitoring and management tools in the industry, and supervised by Progent's certified team of information technology professionals, ProSight Network Audits help you see how well the configuration of your core infrastructure assets conform to industry best practices. Both the Basic and Advanced versions of ProSight Network Audit services are offered at a budget-friendly, one-time cost and deliver instant benefits such as a more manageable Active Directory (AD) environment. Both also include one year of cutting-edge remote network monitoring and management (RMM). Benefits can include easier management, better compliance with data security regulations, more efficient utilization of network assets, quicker troubleshooting, more reliable backup and recovery, and increased uptime. Learn more information about Progent's ProSight Network Audits IT infrastructure review.
The ProSight Ransomware Preparedness Report
Progent's ProSight Ransomware Preparedness Report service is an affordable service centered on a brief phone discussion with a Progent backup/recovery consultant. The interview is designed to help evaluate your organization's ability either to stop or recover rapidly after an attack by a ransomware variant like Ryuk, WannaCry, MongoLock, or Hermes. Progent will work with you directly to collect information about your existing AV defense and backup platform, and Progent will then deliver a custom Basic Security and Best Practices Report document describing how you can follow industry best practices to create an efficient security and backup environment that aligns with your company's needs. For more information, refer to The ProSight Ransomware Preparedness Report.
Fixed-price Security Assessment and Validation Packages
Progent offers a number of flat-rate security and compliance assessment bundles that provide exceptional value by utilizing Progent's enterprise-class system monitoring and analysis tools plus Progent's technical experience to produce an objective and thorough evaluation of your IT environment security profile.
Our Network Has Been Hacked: What Are We Supposed to Do?
- Security Assessment Service Bundles for Small Organizations
Progent offers two value-priced security inventory scanning packages designed to allow small organizations to obtain an objective security assessment from a certified security engineer. With Progent's External Security Inventory Scan, an engineer administers a comprehensive examination of your network from outside your firewalled perimeter to identify possible gaps in the security posture you expose to the outside. With Progent's Internal Security Inventory Scan, a security consultant executes a network scan using an authorized machine within your company firewall to assess your vulnerability to internal threats. These two security inventory services are configured and executed from a secured external site. The scan is administered by an engineer who has been awarded high-level security certifications and who produces a report that describes and evaluates the information collected by the scan and recommend practical enhancements where appropriate.
- Security Vulnerability Assessment Packages for Large Businesses
Progent offers three levels of flat-rate security evaluation service bundles intended for enterprises who want to meet compliance standards required by government or industry agencies. Progent's security assessment service packages offer larger organizations an opportunity to obtain a professional assessment at the strength of their security posture. For each security assessment package, Progent consultants with advanced security credentials analyze and report on collected data and offer recommendations for cost-effective improvements. All the network security audit packages include an extra-cost option for onsite engineers anywhere in the U.S.
- Stealth Penetration Testing Services
Stealth penetration testing, often called PEN testing, is a critical tool for helping organizations to determine how vulnerable their network environments are to modern attacks. Progent's stealth penetration testing test how well your existing security procedures and platforms resist authorized but unannounced intrusion attempts managed by Progent's experienced security specialists using advanced hacking methods. Find out about Progent's stealth penetration testing (PEN Test) services.
If you are currently faced with a network security crisis and you do not have a formal response procedure, refer to Progent's Online Technical Help to find out how to receive fast help. Progent provides online help from skilled network technicians and can refer problems to high-level security specialists if necessary. Your company does not need to be a current Progent customer to receive urgent support for a security breakdown, but you can sign up as a Progent client ahead of time at no cost and your status as a current customer can save valuable time when there is a crisis.
Typically, smaller companies do not have a recovery plan in case of a damaging penetration. This is risky, since the cost of a serious security assault can be even more catastrophic for a small business than for a big enterprise. Progent's security specialists can help your you to design an effective recovery and incident reporting procedure that minimizes the network disruption following an attack. The step-by-step incident handling model promoted by Global Information Assurance Certification is Progent's recommended procedure for reacting to a major security penetration.
Advanced Security Expertise Available from Progent
Progent's seasoned consultants offer specialized help in vital facets of network protection including:
Progent's Security Credentials
- Vulnerability Evaluation and Security Compliance Assessment
Progent offers expertise with security auditing software such as MS Baseline Security Analyzer and LANguard from GFI for conducting a set of comprehensive system tests to uncover possible security problems. Progent has extensive experience with these and similar tools and can help you to analyze audit results and react efficiently. Progent's security engineers also can perform web application testing and can conduct thorough evaluation of corporate-wide security to validate your organization's compliance with major global security standards such as FISMA, NIST, and ISO 17799. Also, Progent can assess the effectiveness of your wireless protection including fixed wireless appliances plus mobile handsets. Read additional details concerning Progent's Information Risk Audits and Security Compliance Testing.
- Designing, Implementing, and Validating Secure Environments
Any business should develop a thoroughly considered security plan that incorporates both proactive and reactive activity. The proactive strategy is a collection of steps that works to minimize security holes. The post-attack strategy specifies activities to help IT staff to assess the damage resulting from a breach, repair the damage, record the experience, and restore business activity as quickly as feasible. Progent can show you how to incorporate protection into your company operations, set up scanning software, create and implement a safe network architecture, and propose processes and policies that will maximize the protection of your information system. Progent's security experts are available to assist you to configure a firewall, deploy safe remote access to e-mail and files, and configure an efficient virtual private network (VPN). If you are interested in an economical option for jobbing out your security administration, Progent's 24x7 Monitoring Services feature non-stop online system tracking and fast resolution of problems.
- Data Restoration and Security Forensics
Progent has expertise in recovering systems and computers that have been hacked, are in question, or have stopped working as a result of a security attack. Progent can show you how to determine the damage caused by the assault, restore normal functions, and recover information compromised as a result of the assault. Progent's security specialists can also oversee a thorough forensic evaluation by going over activity logs and using a variety of proven assessment tools. Progent's background with security consulting minimizes your off-air time and permits Progent to suggest effective ways to prevent or mitigate future assaults.
- Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Firewalls, and PIX Security Appliances Configuration and Troubleshooting
The current Cisco ASA 5500-X Series Next-Generation Firewalls with Firepower Services offer substantially more bang for the buck than Cisco's previous firewalls and have replaced the ASA 5500 and PIX 500 security appliances for all new deployments. Since Cisco's purchase of Sourcefire, the entire line of ASA 5500-X devices can be configured to enable Firepower Services, based on Sourcefire's Snort technology, which is the world's most popular intrusion protection system (IPS). Firepower services provide enhanced features such as advanced malware protection (AMP), URL filtering, real-time threat analytics, and automation. Progent's Cisco-certified CCIE network consultants can help you to manage your legacy PIX or ASA 5500 firewalls and upgrade efficiently to ASA 5500-X firewalls with Firepower Services. Progent's consultants can provide remote and onsite support for ASA 5500-X firewalls with Firepower Services and can assist you to design, configure, tune, manage and debug firewall solutions based around Cisco ASA 5500-X firewalls with Firepower Services. See additional details about ASA Firewalls with Firepower configuration and debugging services.
- Additional Firewall and Virtual Private Network Solutions Provided by Progent
In addition to offering support for a wide array of protection solutions available from Microsoft and Cisco, Progent offers small businesses expert support for security products from other important firewall and Virtual Private Network (VPN) vendors by offering services such as:
- SIEM Security Information and Event Management Integration and Support
Security information and event management (SIEM) software and services are intended to make sense the enormous amounts of data represented by security event logs generated by multiple sources such as network infrastructure appliances, servers, and application software and tools. SIEM applications organizes the security event records from these diverse sources and creates summary reports of security incidents as required by government regulations and industry compliance guidelines. Progent's GIAC-certified network security consultants and Cisco-certified network experts can help organizations to plan, install and manage a SIEM system that helps them to understand the progress of attacks and comply with security incident reporting requirements. (See Progent's Security information and Event Management (SIEM) solutions.)
Progent's security specialists have been awarded the most prestigious certifications available in the security industry. These accreditations demand extensive examinations and demonstrated work background to ensure that recipients have mastered a substantial amount of security information and techniques and can offer advanced solutions to information networks of any size.
Depend on Progent for Computer Security Consulting Services
- Certified Information Security Manager Security Consulting Expertise
CISM defines the core skills and international benchmarks of service that computer security managers are required to master. CISM provides executive management the confidence that consultants who have earned their certification have the experience and knowledge to provide effective security administration and engineering support. Progent can offer a CISM-certified support professional to help your organization in key security disciplines such as information protection governance, risk management, information security process control, and incident handling support. Find out additional information about Progent's Certified Information Security Manager (CISM) Security Support Expertise.
- CISSP Security Consulting Services
Progent's CISSP consultants are security engineers who have earned CISSP accreditation as a result of demonstrated experience, extensive study, and formal examination. CISSP Certification indicates mastery of an international standard for IT security. American National Standards Institute has granted the CISSP credential official recognition in the field of information security under ISO/IEC 17024. Fields of knowledge included under CISSP include security management procedures, security design and test systems, connection permission methodology, software development security, operations security, physical security, encryption, communications, Internet security, and business continuity planning. Get additional information concerning Progent's CISSP Consulting Assistance.
- CISSP-ISSAP} Security Architecture Consulting Support
Progent's CISSP-ISSAP Certified security architecture consultants have earned ISSAP accreditation following rigorous testing and extensive experience. field experience with network security architecture. ISSAP security experts possess comprehensive knowledge of access control mechanisms and methodologies, telecommunications and network infrastructure protection, cryptography, requirements analysis, business continuity and disaster recovery planning (DRP), and physical security. Progent's CISSP-ISSAP-certified security specialists can help your business with all phases of secure network architecture. Read additional details about Progent's ISSAP Accredited Secure IT Architecture Consulting Services.
- Certified Information Systems Auditor Support Services
The CISA credential is a recognized qualification that signifies expertise in IS security audit and control. Certified by the American National Standards Institute, the CISA credential has candidates undergo an extensive examination given by the ISACA international professional association. Progent can provide the expertise of a CISA-Premier security professional trained to assist businesses in the fields of IS audit process, IT administration, systems and architecture planned useful life, IT service delivery, protecting data assets, and business continuity planning. Learn more information about Progent's Certified Information Systems Auditor (CISA) Support Assistance.
- CRISC IT Risk Mitigation Experts
The Certified in Risk and Information Systems Control (CRISC) certification program was initiated by ISACA in 2010 to validate an IT professional's skills to design, deploy, and support information system control mechanisms to reduce risk. Progent offers the expertise of a CRISC-certified consultant to help your company to create and execute a business continuity or disaster recovery strategy that follows leading practices promoted by CRISC and geared to match your company's risk tolerance, business goals, and IT budget. Progent's risk mitigation services are a good fit the services provided by Progent's CISA-Premier consultants for objectively auditing your IT control mechanisms and also with the services of Progent's CISM support professionals for designing company-wide security policies. Learn more details about Progent's CRISC IT Risk Management Services.
- GIAC (Global Information Assurance Certification) Support Services
GIAC (Global Information Assurance Certification) was established in 1999 to validate the knowledge of computer security professionals. GIAC's goal is to make sure that a certified professional has the knowledge appropriate to deliver support in key categories of network, information, and application program security. GIAC accreditations are acknowledged by companies and institutions all over the world including and the U.S. NSA. Progent can provide the assistance of certified professionals for any of the security capabilities addressed within GIAC certification topics including assessing perimeters, incident response, intrusion detection, and web services security. Read additional details about Progent's Global Information Assurance Certification Consulting Services.
If you're trying to find computer security consulting, telephone Progent at 800-993-9400 or go to Contact Progent.