Introduction to Progent's Security Support Services
Progent's certified computer security and compliance consultants can provide a wide range of support services intended to assist businesses of all sizes to uncover and eliminate security weaknesses, block malicious attacks, recover from the problems caused by a breach of security, and meet regulatory mandates for guarding information and reporting security incidents. Progent offers a choice of service delivery modes:

  • As-needed remote and on-premises support invoiced by the minute
  • Continual managed services billed at a low fixed monthly rate
  • Set-price service packages for a one-time security assessment
As-needed Security and Compliance Consulting Services
After you sign up for Progent's services (registration is free), you can get as-needed remote or on-premises support from a Progent security consultant. This traditional support model is primarily reactive and optimized for rapidly taking care of IT problems that are affecting your productivity or that have stumped your own support staff. Typical examples include configuring a firewall or VPN tunnel, installing a critical security update for a Cisco switch or router, designing secure access to cloud-based resources, or recovering from a ransomware assault. These services are billed by the minute, which eliminates the frustrating situation of receiving large bills for fast fixes.

Delivery options for Progent's as-needed support include:

  • Online Security Services
    The majority security-related issues can be handled online through a combination of phone-based help and a remote Internet connection between Progent's Technical Response Center (TRC) and a customer's computer. Progent's Technical Response Center can deliver online security support by offering efficient access to consultants who have the experience and resources to resolve some of the most difficult problems quickly, keeping your service expenses affordable and minimizing downtime.
  • Onsite Security Support
    For cases where on-premises assistance is required, Progent can send a technical professional to major cities across the United States. Progent can also send a security consultant with top certifications and world-class skills to any site in the U.S.
Progent's security consultants are certified to provide help for systems powered by Microsoft Windows, Linux, macOS and OS X, Sun, and popular derivatives of UNIX. Progent's broad selection of consulting services encompasses firewall technology, email and messaging systems, secure network architecture, and data restoration. Progent's technical support team has been awarded the world's most advanced security credentials including Certified Information Security Manager and Information System Security Architecture Professional. Progent also offers immediate access to remote Cisco-certified CCIE network infrastructure consultants who can deliver advanced support with tough network technology problems.

ProSight Low-Cost Managed Services for Information Assurance
Progent's value-priced ProSight family of outsourced network management services is intended to provide small and mid-size organizations with enterprise-class support and cutting-edge technology for all aspects of information assurance. Managed services available from Progent include:

  • ProSight Active Security Monitoring: Next Generation Endpoint Protection and Ransomware Defense
    Progent's ProSight Active Security Monitoring is an endpoint protection (EPP) solution that utilizes next generation behavior machine learning tools to defend endpoint devices and servers and VMs against modern malware assaults like ransomware and email phishing, which routinely get by legacy signature-matching AV tools. ProSight ASM protects local and cloud resources and offers a single platform to manage the entire malware attack lifecycle including blocking, infiltration detection, containment, cleanup, and post-attack forensics. Key features include one-click rollback with Windows VSS and real-time network-wide immunization against new threats. Learn more about Progent's ProSight Active Security Monitoring (ASM) endpoint protection and ransomware defense.

  • ProSight Enhanced Security Protection (ESP): Unified Endpoint Security
    ProSight Enhanced Security Protection (ESP) managed services offer ultra-affordable multi-layer security for physical servers and VMs, workstations, mobile devices, and Microsoft Exchange. ProSight ESP uses contextual security and advanced machine learning for round-the-clock monitoring and responding to security assaults from all attack vectors. ProSight ESP delivers two-way firewall protection, intrusion alerts, device control, and web filtering through cutting-edge tools incorporated within one agent managed from a single console. Progent's data protection and virtualization experts can assist you to plan and configure a ProSight ESP environment that meets your organization's unique requirements and that helps you demonstrate compliance with government and industry data protection standards. Progent will help you define and implement security policies that ProSight ESP will manage, and Progent will monitor your IT environment and react to alerts that require immediate attention. Progent's consultants can also help you to install and test a backup and disaster recovery system such as ProSight Data Protection Services (DPS) so you can recover quickly from a potentially disastrous security attack like ransomware. Find out more about Progent's ProSight Enhanced Security Protection unified endpoint security and Microsoft Exchange filtering.

  • ProSight DPS: Managed Cloud Backup and Recovery
    ProSight Data Protection Services provide small and medium-sized organizations a low cost and fully managed solution for secure backup/disaster recovery (BDR). Available at a fixed monthly price, ProSight DPS automates your backup processes and enables fast restoration of critical files, applications and VMs that have become unavailable or corrupted due to hardware failures, software glitches, natural disasters, human mistakes, or malicious attacks like ransomware. ProSight Data Protection Services can help you back up, recover and restore files, folders, apps, system images, as well as Hyper-V and VMware images/. Important data can be protected on the cloud, to an on-promises device, or mirrored to both. Progent's cloud backup specialists can deliver advanced expertise to set up ProSight DPS to to comply with regulatory standards like HIPPA, FINRA, PCI and Safe Harbor and, when necessary, can assist you to recover your critical information. Find out more about ProSight Data Protection Services Managed Backup and Recovery.

  • ProSight Email Guard: Spam Filtering, Data Leakage Protection and Email Encryption
    ProSight Email Guard is Progent's email filtering and encryption solution that uses the services and infrastructure of top information security vendors to deliver centralized control and world-class protection for all your inbound and outbound email. The hybrid structure of Progent's Email Guard combines cloud-based filtering with an on-premises gateway device to offer advanced defense against spam, viruses, Denial of Service (DoS) Attacks, Directory Harvest Attacks, and other email-borne threats. The cloud filter serves as a first line of defense and keeps the vast majority of threats from reaching your security perimeter. This reduces your exposure to inbound threats and conserves system bandwidth and storage space. Email Guard's onsite gateway appliance adds a deeper level of inspection for incoming email. For outgoing email, the onsite security gateway offers anti-virus and anti-spam protection, policy-based Data Loss Prevention, and email encryption. The local gateway can also help Exchange Server to monitor and safeguard internal email that originates and ends within your security perimeter. Find out more about Progent's ProSight Email Guard spam filtering, virus defense, email content filtering and data leakage protection.

  • ProSight WAN Watch: Network Infrastructure Management
    ProSight WAN Watch is an infrastructure monitoring and management service that makes it simple and affordable for smaller businesses to diagram, monitor, enhance and troubleshoot their connectivity appliances like switches, firewalls, and access points as well as servers, client computers and other networked devices. Using cutting-edge Remote Monitoring and Management technology, WAN Watch ensures that infrastructure topology diagrams are always current, copies and displays the configuration of almost all devices connected to your network, tracks performance, and generates notices when issues are detected. By automating complex management and troubleshooting activities, WAN Watch can cut hours off ordinary tasks such as making network diagrams, expanding your network, locating appliances that require critical updates, or isolating performance problems. Find out more about ProSight WAN Watch infrastructure monitoring and management services.

  • ProSight LAN Watch: Server and Desktop Monitoring
    ProSight LAN Watch is Progentís server and desktop remote monitoring managed service that uses advanced remote monitoring and management (RMM) technology to help keep your network operating at peak levels by checking the health of vital assets that drive your business network. When ProSight LAN Watch detects a problem, an alert is transmitted automatically to your designated IT management staff and your assigned Progent consultant so all looming problems can be addressed before they have a chance to disrupt your network Find out more details about ProSight LAN Watch server and desktop monitoring services.

  • ProSight Virtual Hosting: Hosted VMs at Progent's Tier III Data Center
    With Progent's ProSight Virtual Hosting service, a small organization can have its key servers and applications hosted in a protected Tier III data center on a fast virtual host configured and managed by Progent's network support professionals. With Progent's ProSight Virtual Hosting service model, the client owns the data, the operating system software, and the applications. Because the system is virtualized, it can be moved immediately to an alternate hardware solution without requiring a time-consuming and technically risky reinstallation procedure. With ProSight Virtual Hosting, you are not locked into a single hosting provider. Find out more details about ProSight Virtual Hosting services.

  • ProSight IT Asset Management: Network Documentation Management
    ProSight IT Asset Management service is an IT infrastructure documentation management service that makes it easy to create, update, retrieve and protect information about your IT infrastructure, procedures, applications, and services. You can instantly locate passwords or serial numbers and be warned automatically about impending expirations of SSLs ,domains or warranties. By updating and organizing your network documentation, you can save up to 50% of time wasted trying to find critical information about your network. ProSight IT Asset Management includes a common repository for storing and sharing all documents required for managing your business network such as standard operating procedures (SOPs) and How-To's. ProSight IT Asset Management also offers a high level of automation for collecting and relating IT data. Whether youíre making improvements, performing maintenance, or responding to a crisis, ProSight IT Asset Management gets you the data you require as soon as you need it. Learn more details about ProSight IT Asset Management service.
ProSight Network Audits
Progent's ProSight Network Audits offer a fast and low-cost alternative for small and mid-size organizations to obtain an unbiased evaluation of the overall health of their network. Powered by some of the leading remote monitoring and management (RMM) platforms in the industry, and supervised by Progent's certified group of IT professionals, ProSight Network Audits show you how closely the configuration of your core infrastructure assets conform to industry leading practices. The Basic and Advanced versions of ProSight Network Audit services are offered at a low, one-time cost and deliver instant benefits like a cleaner Active Directory system. Both versions also include one year of state-of-the-art remote network monitoring and management (RMM). Benefits can include lower-cost management, improved compliance with government and industry security regulations, more efficient utilization of network assets, quicker problem resolution, more reliable backup and recovery, and higher availability. Learn more about Progent's ProSight Network Audits IT infrastructure assessment.

The ProSight Ransomware Preparedness Report
Progent's ProSight Ransomware Preparedness Report service is a low-cost service built around a brief interview with a Progent backup/recovery consultant. The fact-finding interview is designed to help assess your organization's preparedness to stop or recover quickly after an attack by a ransomware variant like Ryuk, WannaCry, NotPetya, or Locky. Progent will work with you personally to collect information concerning your current antivirus tools and backup/recovery system, and Progent will then deliver a custom Basic Security and Best Practices Report describing how you can follow industry best practices to build an efficient security and backup environment that aligns with your company's requirements. For additional information, see The ProSight Ransomware Preparedness Report.

Fixed-price Security Assessment and Validation Packages
Progent offers a portfolio of set-price security and compliance evaluation packages that provide high value by utilizing Progent's enterprise-class system monitoring and analysis software plus Progent's technical experience to create an unbiased and comprehensive assessment of your IT environment security posture.

  • Security Assessment Service Bundles for Small Organizations
    Progent offers two ultra-affordable security inventory packages designed to allow small businesses to obtain an objective security evaluation from an accredited security consultant. With Progent's External Security Inventory Scan, an engineer administers an extensive assessment of your network from outside your firewalled perimeter to identify possible risks in the security posture you expose to the public. With Progent's Internal Security Inventory Scan, a certified security expert executes a network scan using an authorized computer within your corporate firewall to evaluate your vulnerability to internal threats. These two security inventory scans are set up and run from a secured offsite location. The project is administered by an engineer who has earned high-level security certifications and who produces a report that details and interprets the data collected by the security scan and recommend various enhancements where appropriate.
  • Security Vulnerability Assessment Packages for Large Organizations
    Progent has developed three levels of set-price security evaluation service bundles intended for large organizations who need to meet compliance standards required by government or industry agencies. Progent's security evaluation service bundles offer larger organizations an opportunity to get a professional look at the viability of their security profile. For each security assessment package, Progent consultants with top security credentials study and report on captured data and provide suggestions for efficient improvements. All the network security assessment packages include an extra-cost option for onsite consultants at any location in the United States.
  • Stealth Penetration Testing Services
    Stealth penetration testing, commonly known as PEN testing, is a critical technique for allowing organizations to determine how vulnerable their network environments are to modern threats. Progent's stealth penetration testing check how well your existing security policies and technologies resist authorized but unannounced penetration attempts managed by Progent's experienced security specialists utilizing advanced hacking methods. Find out about Progent's stealth penetration testing (PEN Test) services.
Our Network Has Been Hacked: What Are We Supposed to Do?
Network Security ConsultantsIf your company is currently experiencing a network security emergency and you have no formal response procedure, refer to Progent's Online Computer Support to see how to receive fast assistance. Progent provides online help from skilled network technicians and can escalate problems to certified security experts if necessary. Your company does not need to be a current Progent customer to get emergency support for a security breach, but you can sign up as a Progent client ahead of time for free and your standing as a current client can save precious time in case of an emergency.

Typically, smaller organizations have not documented a recovery plan in case of a successful attack. This is risky, because the cost of a serious security assault can be more catastrophic for a small company than for a large enterprise. Progent's security consultants can assist your you to create a sensible response and event reporting procedure that minimizes the network disruption following a security breach. The formal incident response procedure outlined by Global Information Assurance Certification is Progent's recommended method for responding to a serious security attack.

High-value Security Expertise Available from Progent
Progent's certified engineers can provide world-class consulting in key areas of computer compliance such as:

  • Security Vulnerability Evaluation and Compliance Assessment
    Progent provides experience with security evaluation software such as MS Baseline Security Analyzer and LANguard for conducting a variety of automatic system tests to reveal potential security holes. Progent has extensive skills with these utilities and can assist your company to understand audit reports and react efficiently. Progent's security engineers also offer web software validation and can conduct thorough evaluation of corporate-wide security to confirm your company's compliance with major global security specifications such as FISMA, PCI, and ISO 17799. In addition, Progent can evaluate the effectiveness of your wireless security covering stationary wireless appliances as well as mobile handsets. Find out more details concerning Progent's Vulnerability Audits and Security Compliance Testing.
  • Designing, Building, and Validating Secure Environments
    Any organization ought to have a carefully thought out security strategy that includes both preventive and responsive steps. The pre-attack strategy is a set of precautions that works to minimize vulnerabilities. The reactive strategy defines activities to assist security personnel to assess the losses caused by an attack, repair the damage, document the event, and restore business activity as quickly as possible. Progent can advise you how to design protection into your business operations, install auditing utilities, create and build a secure computer architecture, and propose processes and policies that will optimize the safety of your computing environment. Progent's security professionals are available to assist you to configure a firewall, design safe remote access to email and data, and configure an effective virtual private network. If your company is interested in an affordable way for jobbing out your network security administration, Progent's Round-the-clock Monitoring Services include continual remote server monitoring and quick resolution of emergencies.
  • Data Restoration and Security Forensics
    Progent has skill in recovering systems and devices that have been hacked, are suspect, or have ceased to function as a result of a security penetration. Progent can show you how to assess the damage resulting from the assault, return your company to normal business operations, and retrieve information lost owing to the assault. Progent's certified specialists can also perform a comprehensive forensic analysis by examining event logs and using other proven forensics tools. Progent's background with security issues minimizes your downtime and allows Progent to recommend effective measures to avoid or mitigate new attacks.
  • Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Series Firewalls, and PIX 500 Firewalls Integration and Debugging
    Cisco CCIE Network Security EngineersThe latest generation of ASA 5500-X Family Next-Generation Firewalls with Firepower Services provide substantially more bang for the buck than Cisco's previous PIX and ASA 5500 firewalls and have replaced the ASA 5500 and PIX 500 security appliances for new deployments. Following Cisco's purchase of Sourcefire, the entire line of Cisco ASA 5500-X firewalls can be provisioned to enable Firepower Services, based on Sourcefire's Snort technology, which is the world's most deployed intrusion protection system (IPS). Firepower services provide enhanced features such as advanced malware protection (AMP), URL filtering, dynamic threat analytics, and automation. Progent's Cisco-premier CCIE network experts can help your company to maintain your legacy PIX or ASA 5500 security appliances or upgrade efficiently to Cisco ASA 5500-X firewalls with Firepower Services. Progent's consultants offer online and onsite support for ASA 5500-X firewalls with Firepower Services and can help your company to design, configure, optimize, administer and debug firewall solutions built around Cisco ASA 5500-X firewalls with Firepower Services. Find out additional details about ASA Firewalls with Firepower integration and troubleshooting support.
  • Other Firewall and Virtual Private Network (VPN) Solutions
    In addition to being expert in a wide array of network security technologies available from Microsoft and Cisco, Progent offers small and mid-size organizations top-level support for products from other major firewall and Virtual Private Network vendors including:
  • SIEM Security Information and Event Management Integration and Support
    Security information and event management (SIEM) applications and services are intended to make sense the enormous quantity of information collected in security incident logs created by a wide range of sources such as network appliances, servers, and application software and monitoring tools. SIEM applications organizes the security logs from these various sources and creates summary reports of security events as required by state regulations and business compliance standards. Progent's GIAC-certified information assurance experts and Cisco-certified network infrastructure consultants can assist businesses to design, deploy and manage a SIEM solution that enables them to understand the progress of security incidents and comply with event reporting regulations. (Visit Progent's Security information and Event Management solutions.)
Progent's Security Accreditations
Progent's security specialists have been awarded some of the most respected certifications offered in the industry. These accreditations require exhaustive testing and demonstrated field background to ensure that candidates have mastered a significant amount of security information and methodologies and can provide advanced consulting to information environments of any complexity.
  • Certified Information Security Manager Security Support Expertise
    CISM defines the basic competencies and worldwide standards of performance that IT security professionals are expected to master. It offers executive management the confidence that consultants who have been awarded their certification possess the background and knowledge to offer efficient security management and engineering services. Progent can provide a CISM consultant to help your organization in critical security disciplines such as information security governance, risk management, data security program control, and crisis handling support. Find out more information concerning Progent's Certified Information Security Manager Security Consulting Expertise.

  • CISSP Security Support Expertise
    Progent's Certified Information Systems Security Professionals (CISSPs) are security specialists who have earned CISSP certification as a result of demonstrated experience, rigorous study, and exhaustive testing. CISSP qualification recognizes expertise in an international standard for IT security. ANSI has given the CISSP credential official recognition in the field of IT security under ISO/IEC 17024. Fields of expertise included under CISSP include security management procedures, security design and test systems, connection permission methodology, software development security, operations security, hardware security, encryption, telecommunications, Internet security, and business continuity planning. Learn additional information concerning Progent's Certified Information Systems Security Professionals (CISSP) Consulting Expertise.

  • CISSP-ISSAP} Cybersecurity Architecture Consulting Expertise
    Progent's CISSP-ISSAP Certified cybersecurity architecture experts have been awarded ISSAP accreditation following thorough testing and significant hands-on work with network security design. ISSAP consultants have acquired comprehensive understanding of access control systems and techniques, phone system and network infrastructure security, cryptography, needs evaluation, business continuity planning (BCP) and disaster recovery, and physical security integration. Progent's CISSP-ISSAP-certified security specialists can help your business with all aspects of secure network architecture. Find out more details concerning Progent's ISSAP Certified Protected System Architecture Consulting Services.

  • Certified Information Systems Auditor (CISA) Professional Services
    The Certified Information Systems Auditor (CISA) credential is an important qualification that represents mastery in IS security auditing. Accredited by ANSI, the CISA accreditation has candidates pass an exhaustive test administered by the ISACA professional group. Progent can provide the expertise of a CISA-Certified security audit engineer trained to help companies in the fields of IS audit process, IT administration, network assets and infrastructure lifecycle, IT support, safeguarding information resources, and disaster recovery planning. Read additional details concerning Progent's CISA Support Expertise.

  • CRISC-certified Network Risk Mitigation Consultants
    The CRISC program was initiated by ISACA to validate an IT professional's skills to design, deploy, and support IS control mechanisms to mitigate network risk. Progent offers the services of a CRISC-certified consultant to help you to create and carry out a business continuity plan that follows leading practices promoted by CRISC and geared to match your organization's risk appetite, business objectives, and IT budget. Progent's network risk mitigation expertise is complementary to the services available from Progent's CISA-Certified consultants for objectively evaluating your IT control mechanisms and with the services of Progent's CISM-certified support professionals for designing company-wide security policies and procedures. Get more information concerning Progent's CRISC Network Risk Management Consulting.

  • Global Information Assurance Certification Consulting Services
    GIAC was established in 1999 to certify the skill of information technology security engineers. GIAC's mission is to assure that a certified professional possesses the knowledge needed to deliver services in vital categories of system, information, and application software security. GIAC certifications are acknowledged by companies and government organizations all over the world including and the United States National Security Agency. Progent can provide the support of GIAC certified professionals for all of the security capabilities addressed under GIAC certification topics such as auditing networks, security incident handling, intrusion detection, and web services security. Get additional information about Progent's GIAC (Global Information Assurance Certification) Consulting Services.
Get in Touch with Progent for Computer Security Support
If you're looking for security consulting, telephone Progent at 800-993-9400 or go to Contact Progent.